February, 2019

article thumbnail

Who Are You, Citizen Data Scientist?

Forrester IT

Ugh. Everyone is talking about the citizen data scientist, but no one can define it (perhaps they know one when they see one). Here goes — the simplest definition of a citizen data scientist is: non-data scientist.

Data 333
article thumbnail

Automation and Artificial Intelligence: How machines are affecting people and places

CTOvision

At first, technologists issued dystopian alarms about the power of automation and artificial intelligence (AI) to destroy jobs. Then came a correction, with a wave of reassurances. Now, the discourse appears to be arriving at a more complicated understanding, suggesting that automation will bring neither apocalypse nor utopia, but instead both benefits and stress alike. […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Join Top Social CIO at the First #CIOChatLive!

Social, Agile and Transformation

If you're a CIO, CISO, or CTO and want to connect with the brightest, most socially vocal group of CIOs then please join us for the first ever #CIOChatLive in Boston on March 14-15th! If you are not familiar with #CIOChat, it's a twice per week gathering on Twitter that you can follow with this hashtag. On Thursday at 2pm ET, moderator Myles Suer sends out 4-5 questions around a topic while.

Social 189
article thumbnail

Top 7 Innovations in K-12 Education

Kitaboo

The education sector has undergone significant changes in the last decade. It has also evolved rapidly with the changes taking place in the digital world. Today, you would find most of the schools and universities using digital aids in classrooms. By incorporating technology into K-12 education model, institutes are aiming to improve the teaching and learning processes in schools and universities.

Education 176
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SCCM IBCM Vs CMG Changes – Revolutions – Really?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Isn’t a revolution (really?) happening with Digital Transformation? Let’s check the SCCM internet client management revolutions. In this post, I will try to give a quick SCCM IBCM Vs CMG comparison. What is SCCM Internet Client Management? Managing SCCM clients from the internet is called Internet client management.

article thumbnail

Protecting the IoT: 3 things you must include in an IoT security plan

Network World

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.

Security 148

More Trending

article thumbnail

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […].

Internet 282
article thumbnail

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Agile 169
article thumbnail

5 Ways to Create Effective Interactive Training Content

Kitaboo

Employee training is no longer limited to sitting back and watching PowerPoint slides. L&D teams are looking out for interactive training content so that the employees can learn and retain the information effectively. Interactive training content, as the name suggests, requires interaction between the trainer and the employee. But today, as mobile-based training is on the rise, the interaction now has to be between the course module and the learner.

Training 164
article thumbnail

SCCM Deprecated Features Updated List

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The post is all about the updated list of SCCM Unsupported features. Also, you will be able to check out the unsupported versions of SCCM client operating systems (Windows, Linux, Unix,etc.). I’m not planning to cover the unsupported operating systems for SCCM site system/site server/SQL roles in this post.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Mozilla Firefox One-liner Installer

Mick's IT Blog

Here is a PowerShell one-line installer for Mozilla Firefox. This allows you to download the latest version of Mozilla Firefox during the build process without having to maintain the package each time. The URI used in this is for the 64-bit version of Firefox. If you need a different version, you will need to locate the download URI and copy and paste it in the one-liner thereby changing the value of $URI.

139
139
article thumbnail

Augmented Reality, Virtual Reality, And Mixed Reality Do Bring Value To Industry

Forrester IT

Back in August of last year, I asked for good examples of augmented reality (AR), virtual reality, and mixed reality (MR), all together known as extended reality. Unsurprisingly, I saw plenty of examples of the type my original post complained about: visually stunning but almost entirely useless for anything other than showing off. Then there […].

article thumbnail

Sophisticated new phishing campaign targets the C-suite

CTOvision

A new phishing campaign to steal login credentials is being launched on businesses – specifically the C-suite. Researchers at GreatHorn first discovered the campaign which targets senior executives by claiming to be from the company’s CEO. The fake email regards the rescheduling of a board meeting. By following the link from this email and users are greeted […].

Meeting 277
article thumbnail

Understanding AI - 3 Must Read AI Books for CIO and IT Leaders

Social, Agile and Transformation

s Last year I keynoted several talks on AI in the Enterprise: Finding Quick Wins and Avoiding Speed Bumps???. This talk is on the practical side of getting started with machine learning. Among my recommendation, I suggest IT leaders invest in data quality and other data governance efforts, perform POCs with some of the more mature AI areas, and find partners that can educate and validate.

Education 152
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

IBM Takes Watson AI to AWS, Google, Azure

Information Week

IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM.

IBM 156
article thumbnail

Desktop Support Network Troubleshooting Tips for Beginners

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. This post is a continuation of my old post “How to Learn Desktop Support Engineer Skills“ Desktop support engineers are an integral part of the IT support world. In the IT support world, the real heroes are Desktop Support Engineers. In this post, you will learn troubleshooting skills for IT support with the help of […].

Network 167
article thumbnail

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Network World

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network. The vulnerability, which has an impact rating of 9.8 out of 10 on the Common Vulnerability Scoring System lets a potential attacker send malicious HTTP requests to a targeted device.

Firewall 144
article thumbnail

Shopping For AI Talent? Beware Of Unicorns

Forrester IT

At the dawn of big data, data scientists were the unicorn of the hour. Talk to any one of these rarities, and they would say there were only about 100 of them in the world. When executives woke up to the potential of big data, it was also at the same time we were dealing […].

Big Data 312
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

OpenAI’s new multitalented AI writes, translates, and slanders

CTOvision

OpenAI’s researchers knew they were on to something when their language modeling program wrote a convincing essay on a topic they disagreed with. They’d been testing the new AI system by feeding it text prompts, getting it to complete made-up sentences and paragraphs. Then, says David Luan, VP of engineering at the Californian lab, they […].

article thumbnail

Maria Lensing: The Network Platform for Healthcare’s Future

Cloud Musings

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s life, ignited a passion for healthcare. Unfortunately, that passion didn’t apply to blood, so she went into electrical engineering and biomedical engineering, eventually falling in love with networking and data.

Network 107
article thumbnail

What CIOs and CTOs Can Learn From Smart Cities

Information Week

Municipal IT leaders manage a lot of complexity; improving government efficiency, protecting citizens, and making cities attractive places to work, live and visit.

article thumbnail

MDM Diagnostics Tool – Tips & Tricks – Windows Autopilot Troubleshooting

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In my previous post, Windows Autopilot Troubleshooting basics, we discussed different troubleshooting areas like Network Activity, Registry, and Event Viewer. In this post, let’s discuss on Windows MDM Diagnostics Tool benefits, usage, and examples. [Related Posts – Windows Autopilot Step by Step Guides, Windows 10 Deployment Process Flow and Logs] What is Windows MDM Diagnostics […].

Windows 167
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

SD-WAN creates new security challenges

Network World

SD-WAN products have been available for the better part of five years. Early adopters of the technology focused primarily on transport-related issues such as replacing or augmenting MPLS with broadband. As any technology matures and moves out of the early adopter phase, the buying criteria changes — and SD-WAN is no different. In 2018, a ZK Research survey asked respondents to rank SD-WAN buying criteria, and security came out as the top response, well ahead of technology innovation and price.

WAN 142
article thumbnail

The Use of Behavioral Science Has Moved Beyond Marketing

Forrester IT

Marketers have been using behavioral economics to understand and exploit the irrationality of consumers long before the Golden Age of Advertising. By employing simple marketing tactics such as “buy now, pay later,” inflated value pricing, or decoy alternatives, marketers have been able to effectively steer or in some cases, manipulate customers to buy products or […].

article thumbnail

Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware

CTOvision

Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error […].

Malware 264
article thumbnail

How 3 Companies Increased Deployment Speed for their Oracle Tools by Up to 8x

Flexagon

The speed of software development and release today would have been almost unimaginable ten years ago. In 2018, over half of developers wanted to deploy builds more frequently than every week, with 16 percent saying they’d prefer to release builds every hour.¹ As deployment timelines speed up across the market, companies need to reduce. Read more. The post How 3 Companies Increased Deployment Speed for their Oracle Tools by Up to 8x appeared first on Flexagon.

Oracle 111
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Q&A: Where IBM Sees Growth in Hybrid Cloud

Information Week

Eager to show that it is part of the future, IBM shares some of its perspective on how cloud computing continues to evolve.

IBM 146
article thumbnail

SCCM Depreciated Features Updated List

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The post is all about the updated list of SCCM depreciated features. Also, you will be able to check out the unsupported versions of SCCM client operating systems (Windows, Linux, Unix,etc.). I’m not planning to cover the unsupported operating systems for SCCM site system/site server/SQL roles in this post.

article thumbnail

That VPN may not be as secure as you think

Network World

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure. Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently.

Security 138
article thumbnail

How CRM Will Evolve in 2019

Forrester IT

Modern CRM is delivered as software-as-a-service and microservices, is modular, and offers APIs for easy access to enterprise applications. It empowers customer-facing personnel with the right data about their customers at the right time, in context, so that they can focus on nurturing relationships across journeys even as they cross channels and devices.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.