Sat.Aug 17, 2019 - Fri.Aug 23, 2019

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Summary: Sovrin is an identity metasystem that provides the Internet's missing identity layer. By creating a general-purpose system for constructing context-specific identity systems, the metasystem represents a universal trust framework. Imagine you are planning to meet a friend for lunch. You arrive at the restaurant on time and she’s nowhere to be found.

Internet 102
article thumbnail

Have a Failing Big Data Project? Try a Dose of AI

Information Week

A growing number of AI experts are turning their attention to big data. Will that be enough to save doomed projects?

Big Data 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Adulting - CIO Style

CIO Musings

I love the Urban Dictionary. I'm not sure why, I guess it makes me feel hip to read through some of the posts. I have contributed a few along the way like the term "Camel Up", my proudest moment. The Urban Dictionary defines "adulting" like this. I like the part about being a fully developed individual. Recently I was in a difficult steering committee meeting for a major enterprise project.

Meeting 150
article thumbnail

Channel Marketers Need To Become Community Marketers – Here’s How

Forrester IT

A lot has changed in the 25+ years I have spent in the technology channel. New technologies, partner business models, shifting demographics, expanding communication vehicles, and most recently, new technology buyers with different psychology, behavior, and journey have created a whirlwind of change for vendors, distributors, and partners alike. The one constant is the […].

Strategy 419
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Getting IT Certifications and Help Desk Experience with an Apprenticeship

Association of Information Technology Professional

The students running the IT help desk at Christian Brothers High School weren’t necessarily the school’s techiest. But a new apprenticeship program gave them a life-changing opportunity to get hands-on experience … and IT certifications.

article thumbnail

Agile Planning Business Roadmaps, Architecture Standards, and DevOps Releases

Social, Agile and Transformation

Agile planning doesn't end when stories are written, accepted by the team, sized, and ready for development. Story writing is one aspect of agile planning, but it's not the only one. At StarCIO, agile planning is done at several levels depending on the complexity of the requirement. require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl":"mc.us14.list-manage.

Agile 141

More Trending

article thumbnail

Product Teams For Infrastructure And Operations

Forrester IT

As an analyst at Forrester, I talk to a lot of IT professionals. One of the most common inquiries lately goes something like this: “We’ve piloted DevOps and Agile and like the results. However. ” and then come the “what-abouts.” What about ITIL, the NOC, the auditors, the service desk, and perhaps […].

Devops 395
article thumbnail

SaaS Revenue Opportunities Flourish with New Vertical Applications

Association of Information Technology Professional

“There is a real opportunity for MSPs to plug in more advanced services and be a resource to their clients,” said Marc Haskelson, president/CEO, Compliancy Group, LLC, a member of the CompTIA Business Applications Advisory Council panel at ChannelCon 2019.

article thumbnail

Addressing Risk: Data Security Questions for CIOs

Information Week

Position your organization not just for legal and regulatory compliance, but also for safer and more effective use of information assets. Here are five questions to ask.

Security 147
article thumbnail

Don’t worry about shadow IT. Shadow IoT is much worse.

Network World

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface. That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation.

Agile 138
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

The Importance Of Defining Event ROI In The B2B Marketing Mix

Forrester IT

“If a tree falls in a forest and no one is around to hear it, does it make a sound?” This question, first attributed to philosopher George Berkeley in 1710, raises questions about observation and perception.* Both are important to consider when assessing the value that physical events deliver. While you can attribute some ROI […].

B2B 390
article thumbnail

Tech for Good: IoT Solution Helps Brings Clean Water to Sub-Saharan Africa

Association of Information Technology Professional

Using emerging technologies, such as IoT, business intelligence and automation, Britehouse is helping farmers improve their communities for the better by producing healthier crops and ensuring there’s plenty of water to drink.

article thumbnail

Top 10 Sales Enablement Tools to Empower your Sales Force

Kitaboo

What is a Sales Enablement Tool? A sales enablement tool/ platform provides your sales force with all the resources they need to engage with prospective buyers and increase the chances of a sale. A sales enablement tool should provide useful information that will expedite the sales process and result in positive outcomes, which is, converting a prospect to a client.

Tools 128
article thumbnail

Extract SCCM WIM from ISO and Configure for WDS via PowerShell

Mick's IT Blog

One issue, more like a time-waster, I have had as we are migrating to SCCM from MDT is getting the boot image on the WDS server. SCCM is not configured to manage WDS because we use it for other things, so we manually upload the WIM. SCCM creates an ISO that needs to be mounted to extract the WIM for WDS. Thanks to this blog post , it is explained. I wanted the steps automated, so I wrote the following PowerShell script that will perform all of the steps needed to extract and configure the WIM.

Windows 123
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Collective Bargaining: Your Biggest Risk In The Age Of The Customer

Forrester IT

Social media has created customer groups that coalesce around a brand — in effect, a union. They collectively can and will change your corporate policy. With collective bargaining, business as usual is no longer acceptable. Are you ready for the empowered, technically savvy, and motivated customer? It’s the age of the customer: What are you […].

Policies 388
article thumbnail

Security Awareness Training: How to Detect Phishing Attacks

Association of Information Technology Professional

After setting policies about how to choose passwords and when to update them, training end users on how to identify fake email addresses and URLs gives them the power to be vigilant against cybersecurity threats.

Training 130
article thumbnail

Netflix, Google Talk Continuous Delivery at DevOps World

Information Week

Members of the Continuous Delivery Foundation discuss the formation of the open source organization and the future of continuous integration and delivery.

Devops 143
article thumbnail

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black. VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1 billion for the security technology of Carbon Black, which includes its Predictive Security Cloud and

Vmware 125
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

VMware Signals The End Of “Endpoint” Detection And Response

Forrester IT

The acquisition of Carbon Black by VMware was a bit of a surprise to me, but once put into perspective it makes sense. In this blog, I make a few observations from a value perspective. Carbon Black brings a strong brand and technology that warranted a leader position in my last Forrester Wave on the […].

Vmware 377
article thumbnail

France Flying Solo with New Tax is Self-Inflicted Pain

Association of Information Technology Professional

France has enacted a digital services tax in an effort to hamper the growth of innovative companies based in the United States. Under the plan, those companies with at least $851 million in global revenue – of which at least $28 million is generated in France –would be slapped with a 3% tax, retroactive to Jan. 1, 2019.

Company 130
article thumbnail

Three Tips for Laying the Groundwork for Machine Learning

Information Week

While machine learning may seem overwhelming and complicated, creating an infrastructure for ML projects is more achievable than many organizations think.

135
135
article thumbnail

Cisco: 6 critical security alarms for UCS software, small-biz routers

Network World

Cisco today warned its Unified Computing System (UCS) customers about four critical fixes they need to make to stop nefarious agents from taking over or attacking their systems.The problems all have a severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System ( CVSS ). The critical bugs are found in the Cisco UCS Director and UCS Director Express for Big Data packages.

Software 118
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Chatbots Can’t Read Your Mind

Forrester IT

By Will White and Ian Jacobs Chatbots — And Why They Can’t Read Your Mind Chatbots are cropping up everywhere, from customer service to internal help desks, but what makes them tick? When we interact with chatbots, we’re often coming in from the end-user side and confronting a chatbot window. When we ask a question, […].

Windows 370
article thumbnail

Family First Prevention Services Act Takes a Proactive Approach to Child Welfare

Association of Information Technology Professional

The Family First Prevention Services Act (FFPSA) offers the framework to shift child welfare from a reactive to proactive system and underscores the important role of integrated family data.

System 100
article thumbnail

8 tips on how to save your iPhone’s battery life 

Galido

Information Technology Blog - - 8 tips on how to save your iPhone’s battery life - Information Technology Blog. The good news for iPhone users is there are a couple of tricks you can do to save your battery life on your beloved iPhone, actually in fact I know of 8 tips that can help you avoid running around looking for a place to charge up your device.

How To 113
article thumbnail

VMware spends $4.2B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are certain to be major topics next week at the VMworld user conference, but VMware took things up a notch with plans to spend $4.2 billion to acquire cloud-development firm Pivotal, and security provider Carbon Black. During its quarterly financial call VMware said it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology and another $2.1 billion for Carbon Black, which includes its Predictive Security Cloud offering and other endpoi

Vmware 110
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The State Of Influencer Marketing: Growing

Forrester IT

For all the dramatic headlines about influencers, our research states that they’re capturing steadily larger proportions of marketing budget. For our latest report we interviewed more than 30 enterprise marketers who are responsible for their brand’s influencer marketing. And the data shows: investments continue to rise and marketers’ budgets for influencer marketing are growing in […].

Budget 357
article thumbnail

What Every Solution Provider Needs to Know About Apple’s New Security Sign-In

Association of Information Technology Professional

After Apple announced two-factor authentication recently, experts like Dr. Thad Phillips predicted more Apple tech in once-dominated Windows environments. That means plenty for solution providers, especially when it comes to cybersecurity.

article thumbnail

10 RPA Vendors to Watch

Information Week

Robotic process automation offers enterprises a way to leapfrog to the benefits of digital transformation. Here are 10 vendors that can help in your efforts.

article thumbnail

Batch file wait for process using PowerShell integration

Mick's IT Blog

Recently, I wanted a simple batch file to run the ccmsetup.exe file. I could have used PowerShell, but for debugging the parameters, I wanted it quick and easy to modify. One of the issues I had was getting the batch script to wait for the ccmexec.exe to install before proceeding. I saw some batch solutions that seemed to be kind of cumbersome. I decided to write a PowerShell one-liner that would continuously loop until the desired process ended.

84
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.