January, 2019

The 4 Phases of the Gartner Blockchain Spectrum

CEB IT

It’s easy to be swept up in the promise and hype of blockchain, but the reality is that most solutions marketed as “blockchain” are missing key components — particularly tokenization and decentralization.

CEOs And Software

Forrester IT

How To Lead The Most Important – and Perplexing — Corporate Domain by John R. Rymer and Jeffrey S. Hammond Summary What if CEOs — not software development and delivery leaders or CIOs — held the keys to the fast, high-quality software delivery that is so crucial to digital business?

This one skill will make you a data science rockstar

Eric D. Brown

Want to be a data science rockstar? of course you do! Sorry for the clickbait headline, but I wanted to reach as many people as I can with this important piece of information. Want to know what the ‘one skill’ is?

Data 200

2 big mistakes to avoid in edge computing

David Linthicum

More things are being pushed to the edge. Think of the edge as the space between the cloud and whatever device or system is tossing off data. The idea is to do most of the processing at the edge, close to where the data is produced. This approach, called edge computing , provides a much better response time, because there’s no need to send the data back to a central cloud-based data-storage system where it’s processed and then returned all the way back to the device. What is cloud computing?

10 Ways Machine Learning Is Revolutionizing Sales

CTOvision

Artificial Intelligence (AI) and machine learning show the potential to reduce the most time-consuming, manual tasks that keep sales teams away from spending more time with customers. Automating account-based marketing support with predictive analytics and supporting account-centered research, forecasting, reporting, and recommending which customers to upsell first are all techniques freeing sales teams from manually […]. Artificial Intelligence News

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

Antivirus software can help but it’s not invincible Image Credit: Gabriel Salvadó. Almost every person with the CIO job currently has some form of antivirus software deployed within their company.

More Trending

Channel Data Is A Competitive Differentiator

Forrester IT

Leverage Channel Data To Give Partners A Better Experience: Winning In The Channel Requires Data-Driven Program Innovation Brands that provide an enhanced partner experience grow faster than their peers, are more profitable, and drive higher customer satisfaction and retention downstream.

Data 216

Data Mining – A Cautionary Tale

Eric D. Brown

For those of you that might be new to data, keep this small (but extremely important) thing in mind – beware data mining. What is data mining? Data mining is the process of discovering information and patterns in data.

Data 209

Now is the time to get serious about your cloud strategy

David Linthicum

IT loves its enterprise data centers. Who can blame IT? Data centers are LED light works of modern art these days. Indeed, I like visiting data centers just to enjoy how they are designed and watch the lights blink. The move away from enterprise data centers has been less aggressive than predicted. It seems that many applications and data sets can’t live anywhere else according to enterprise IT, and while cloud computing is an option, IT views it as a tactical solution. [

Artificial Intelligence Systems Can be Fooled

CTOvision

Read why Nidhi Singh says that artificial intelligence systems have their own severe limitations on Entrepreneur : Despite all its benefits and the ease that technology has brought in, the fear that new-age technologies like artificial intelligence (AI), machine learning and robotics would displace human jobs still looms. However, some researchers don’t agree with the idea that […]. Artificial Intelligence News

How "Big Iron" Does "Big Regulation"

Cloud Musings

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those identified as confirm data breaches. A Ponemon Institute study also showed that companies experiencing a data breach took an average of 147 days to detect that breach.

HP 160

Speed Up Your Digital Business Transformation

CEB IT

Eighty-seven percent of senior business leaders say digitalization is a company priority and 79% of corporate strategists say it is reinventing their business — creating new revenue streams in new ways. But so far, digital change has been slow and disappointing.

You’ve Still Got Mail

Forrester IT

It has been more than two decades since AOL popularized email with the catchy “you’ve got mail” greeting. So ubiquitous was it in its heyday that it was the title of a romcom starring Tom Hanks and Meg Ryan.

The Data Mining Trap

Eric D. Brown

In a post titled Data Mining – A Cautionary Tale , I share the idea that data mining can be dangerous by sharing the story of Cornell’s Brian Wansink, who has had multiple papers retracted due to various data mining methods that aren’t quite ethical (or even correct).

Data 161

Moving to the cloud? 3 critical data efforts you must make

David Linthicum

I’m often taken back by the number of enterprises moving the cloud that have not considered data modernization as part of their cloud migration strategy. I know why: the money. However, not doing data modernization as part of moving to the cloud will cost you much more than you think you are saving. Data should be a first-class citizen when it comes to your cloud effort. While the number of things to think for cloud migration about gets longer, don’t let data fall of your radar.

Report 175

Why You Should Adopt the Internet of Things

CTOvision

Read why Charles Darling says that we should embrace the Internet of Thing connected devices with open arms on IOT Evolution World : You approach your front door, you tap the screen of your smartphone and hear the door unlock. When you walk into your house, your home is illuminated by your favorite shade of blue. […]. CTO News

Why CIOs Should Care About Two Factor Authentication

The Accidental Successful CIO

Everybody needs two factor authentication, but just exactly what is it? Image Credit: Dave Crosby. As everyone in the CIO position knows, keeping the company’s systems and applications secure is a top priority and has a lot to do with the importance of information technology.

The 5 Digital Transformation Identities of Financial Services Organizations

CEB IT

One-third of financial services CIOs identified digital as their top business priority for 2019, up by more than 8% from last year, according to Gartner. Digital business usually means different things for financial services CIOs,” says Juergen Weiss , Practice Vice President at Gartner. “We

CES 2019 Delivers Dazzling Tech But Disappointing Experiences

Forrester IT

I spent this week in Las Vegas at CES to check out the latest and greatest technology wonders, ranging from 3D printing, AI, and cryptocurrency to drones, autonomous vehicles, dancing robots, and wearables. A lot of what I saw has broad CX implications for accessibility, healthcare, and more.

3D 202

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning.

Serverless computing’s dark side: less portability for your apps

David Linthicum

According to the “ RightScale 2018 State of the Cloud ” report, serverless computing is the No. 1 growing cloud service, with a growth rate of 75 percent. This means that many enterprises are opting for the convenience of using serverless systems that abstract you from the underlying infrastructure, the servers. However, the trade-off is that applications built on serverless public cloud systems are not easily moved to other clouds. InfoWorld explains: What is multicloud?

Cloud 159

Best Practice Response Can Mitigate Data Breaches Quickly

CTOvision

Read why Sue Poremba says that best practice response can help companies mitigate data breaches quickly on Security Boulevard : Data breaches are fairly common nowadays but it is the time that the company takes to identify the breach and notify its users that counts. It generally takes about six months for a company to […]. Cyber Security News

2018 Ascent Recap

The Investing Edge

Welcome to Ascent’s 2018 recap blog post. We couldn’t be more thankful for the opportunity to work with the smartest, most passionate and kind entrepreneurs and investors on a daily basis. 2018 was filled with lunchtime laughter, personal and professional growth, and plenty of new projects.

Future-Proof Your Data and Analytics Workforce

CEB IT

Data and analytics leaders cannot master today’s opportunities and challenges of digital business using yesterday’s roles and organization design. Chief data officers (CDOs) consistently mention lack of relevant skills or staff as one of the top internal roadblocks to success. The Gartner 2018 CEO Survey highlights a similar pattern, with respondents listing a “lack of appropriate talent and capability in the workforce” as the biggest inhibitor to digital business progress.

Data 140

Autonomous Testing Is Like Autonomous Driving: The AI Needs Human Assistance

Forrester IT

The US Society of Automotive Engineers (SAE) has defined a scale to describe the autonomous capabilities that self-driving cars have — i.e., their levels of automation. link] Level 5 is full automation, which allows self-driving cars to operate with no human assistance.

Foto Friday – On the way to Zion National Park

Eric D. Brown

I call this one “On the way to Zion” Captured with Canon 5D and Canon 17-40 handheld on the way into Zion National Park. See more photos in my 500px portfolio.

148
148

Thinking about blockchain? Do it in the cloud

David Linthicum

According to figures provided to CoinDesk from jobs site Indeed.com, searches for roles involving bitcoin, blockchain , and cryptocurrency dropped by 3.06 percent from October 2017 to October 2018. My experience is that enterprises are dealing something that turned out to be much more complex than the hype led them to believe. So, many enterprises have shelved blockchain efforts, opting instead to spend the money on cloud migration. InfoWorld explains: What is multicloud?

The Weaponization Of Artificial Intelligence

CTOvision

Technological development has become a rat race. In the competition to lead the emerging technology race and the futuristic warfare battleground, artificial intelligence (AI) is rapidly becoming the center of the global power play. As seen across many nations, the development in autonomous weapons system (AWS) is progressing rapidly, and this increase in the weaponization […]. Artificial Intelligence News

How Should CIOs Give Negative Feedback?

The Accidental Successful CIO

It’s critical the CIOs give negative feedback, but they need to do it correctly Image Credit: Daniel Friedman. We’ve all been there.

Course 130

How Digital Twins Simplify the IoT

CEB IT

Trucks today are computers on wheels. Thanks to modern telemetry systems and other technologies they are constantly communicating data points, such as location, motion or engine status, to various business units and systems of their organization. The problem: Trucks often send multiple messages containing the same data over multiple channels at different times.