Sat.Jan 18, 2020 - Fri.Jan 24, 2020

article thumbnail

What are Seven Types of Big Data Debt

Social, Agile and Transformation

As more organizations have embarked on agile software development over the last five years as part of digital transformation programs, the term technical debt is more widely understood. Teams that develop code leave artifacts behind that require improvements, reengineering, refactoring, or wholesale rewriting. Some technical debt is done purposefully to deliver applications faster, while.

Big Data 272
article thumbnail

Internet of Things presents the next frontier of cyberattacks

CTOvision

Read why Asaf Ashkenazi says that the risk of cyberattacks on the Internet of Things has increased on ITProPortal : Today’s rapidly growing global network of internet of things (IoT) devices brings with it new levels of convenience to the lives of everyday consumers. In late 2019, one survey conducted by Parks Associates found that […].

Internet 285
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Don’t Make These 14 Common Big-Data Mistakes At Your Business

CTOvision

Thanks to modern technology, businesses of all sizes have access to rich, granular data about their customers and operations. However, understanding what to do with these massive amounts of data can be difficult and costly, and even with the right tools, it can be overwhelming. With so much complexity around big data, businesses can easily make […].

Big Data 280
article thumbnail

Is It Structure That’s Killing Your Pivot To Customer-Centricity?

Forrester IT

The theme of Forrester’s Predictions 2020: B2B Marketing And Sales report was “Accelerating Response To The Great Expectations For The B2B Buying Experience.” The report made 5 unique calls, one of them was mine: “Thirty percent more marketing organizations will shift toward audience-based structures in 2020.” I’ve had some robust challenges and conversations on that […].

B2B 150
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Next Evolution of Data Capture Tech Transforms Retail

Information Week

Eye-tracking, facial recognition, sensors, and digital displays gather data that retailers can use to fine-tune their strategies.

Retail 86
article thumbnail

Learning: It's a Give and Take Thing

Information Week

InformationWeek is conducting its annual State of Enterprise IT Survey, and we invite you to participate.

Survey 145

More Trending

article thumbnail

With Good Foundations, Augmented Reality Offers A Great Way To Engage With IoT Data

Forrester IT

Augmented reality (AR) and the internet of things (IoT). In principle these two hot technologies are a great match, with data streaming from IoT-connected machines to be used by AR-wielding engineers on the factory floor. My latest report, “Combine Augmented And Mixed Reality With IoT To Deliver Insight At The Point Of Need,” began with […].

Data 400
article thumbnail

How Amazon is solving big-data challenges with data lakes

All Things Distributed

Back when Jeff Bezos filled orders in his garage and drove packages to the post office himself, crunching the numbers on costs, tracking inventory, and forecasting future demand was relatively simple. Fast-forward 25 years, Amazon's retail business has more than 175 fulfillment centers (FC) worldwide with over 250,000 full-time associates shipping millions of items per day.

Big Data 209
article thumbnail

Windows 7 remains an albatross at many large organizations

Tech Republic Security

Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.

Windows 208
article thumbnail

Apple Dropped iCloud Encryption Plans After FBI Complaint: Report

CTOvision

Apple dropped plans to offer end-to-end encrypted cloud back-ups to its global customer base after the FBI complained, a new report has claimed. Citing six sources “familiar with the matter,” Reuters claimed that Apple changed its mind over the plans for iCloud two years ago after the Feds argued in private it would seriously hinder investigations. The […].

Apple 218
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What Is The ROI Of Digital Transformation In Insurance?

Forrester IT

I work with digital execs at global insurance firms that are in the throes of digital transformation. And one of the top inquiries that I’ve received from our insurance clients is: what is the ROI of digital transformation? The time has come for insurers to take a hard look at their digital investments to date. […].

Insurance 365
article thumbnail

Happy MLK Day!

The Accidental Successful CIO

Happy MLK Day! Image Credit: ???????. This week in the United States we celebrate the life of Dr. Martin Luther King. Just in case you’ve forgotten who he was, he is best known for his role in the advancement of civil rights using nonviolent civil disobedience. On Oct. 14, 1964, King received the Nobel Peace Prize for combating racial inequality through nonviolence.

130
130
article thumbnail

The Facial Recognition Debate

Information Week

One small step for tech, one giant leap for privacy? It is up to our society to create clear boundaries that will enhance the positive and control the negative.

173
173
article thumbnail

LEAK: Commission considers facial recognition ban in AI ‘white paper’

CTOvision

The European Commission is considering measures to impose a temporary ban on facial recognition technologies used by both public and private actors, according to a draft white paper on Artificial Intelligence obtained by EURACTIV. If implemented, the plans could throw current AI projects off course in some EU countries, including Germany’s wish to roll out automatic […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

B2B Marketing Should Organize Around The Customer In 2020

Forrester IT

The theme of Forrester’s “Predictions 2020: B2B Marketing And Sales” report was “accelerating response to the great expectations for the B2B buying experience.” The report made five unique calls; one of them was mine: The number of organizations with audience-based structures will more than double. Since we published the report late last year, I’ve had […].

B2B 338
article thumbnail

Email malware targets U.S. senator and military

Tech Republic Security

The cybercriminals behind the powerful banking malware have turned their attention to government targets like Sen. Cory Booker.

Malware 182
article thumbnail

7 lessons learned from 20 years of professional speaking

Trends in the Living Networks

It is exactly two decades since I became a professional speaker. I had paid my dues over the previous four years speaking frequently for free at conferences. My breakthrough from ‘free to fee’ came from the publication of my first book, Developing Knowledge-Based Client Relationships , which gave me the credibility and visibility to be invited for my first professional engagement in late January 2000.

article thumbnail

How will AI transform the workforce landscape?

CTOvision

Read Mahendra Gupta explain how artificial intelligence will transform the workforce landscape on IT Pro Portal : Artificial Intelligence is known for driving the reinvention of workflows and technology. It’s rightly said that AI can enable humans to focus on parts of their role that add the most value. A plethora of applications has permeated […].

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The NRF Innovation Lab — Technology Vendors Aim To Revolutionize The Way Consumers Shop

Forrester IT

Last week at the NRF 2020 Vision show, I spent a few hours at the immersive Innovation Lab exhibit that showcased over 50 “new-to-market” technologies to transform the customer’s shopping experience. Aiming to make shopping an easier process, these solutions let the customer browse products strategically, experience the product before they buy, and tailor the […].

Retail 286
article thumbnail

11 popular IT certifications that make the most money

Tech Republic Cloud

Find out which are in demand worldwide, and which IT cross-certifications are beneficial.

205
205
article thumbnail

How to use a physical security key to sign into supported websites

Tech Republic Security

A security key is a good option to use for two-factor authentication when logging into certain websites.

Security 190
article thumbnail

How Artificial Intelligence Will Make Decisions In Tomorrow’s Wars

CTOvision

Read why Simon Chandler says that artificial intelligence can be enabled to make decisions in tomorrows wars on Forbes : Artificial intelligence isn’t only a consumer and business-centric technology. Yes, companies use AI to automate various tasks, while consumers use AI to make their daily routines easier. But governments–and in particular militaries–also have a massive […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The I&O Organization Under Pressure

Forrester IT

Whither Infrastructure and Operations? Cloud-native, DevOps, and automation are turning I&O’s world upside down. As organizations move to self-provisioning, I&O professionals are rightfully concerned about their futures. In the world of self-service consumption, the traditional tools and tasks of I&O teams are subject to constant overhaul and replacement.

Devops 284
article thumbnail

Modernizing your Contact Center for the Future

Spearline Testing

Contact centers are a fundamental aspect of modern business and have evolved to become the 'first line of defense' when it comes to customer complaints and enquiries. Ensuring that your contact center is prepared for the future of communication is imperative to remaining successful in today’s world, where consumers expect their problems to be dealt with promptly and efficiently in the first contact.

article thumbnail

iOS-based devices: Zero-touch management essentials

Tech Republic Security

Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management.

Mobile 158
article thumbnail

Why Businesses Should Start Prioritising Cybersecurity

CTOvision

Read Tim Mocan explain why businesses should start prioritizing cybersecurity on Enterprise Times : Do you have £45 million to spare? That’s how much a ransomware attack cost Norsk Hydro in the first quarter of 2019. A total of 22,000 computers had their files forcibly encrypted (made unreadable without a particular key) across 40 countries […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Great Product Experiences Start With Great Product Data

Forrester IT

Product information management tools help marketing and product teams ingest, enrich, and distribute product data—but the functional description sells the full value of PIM short. The mandate to support product experience continues to grow in prominence within the PIM world. By now, most people in the field nod along at variations of “great product data […].

Data 243
article thumbnail

How to Manage the Human-Machine Workforce

Information Week

Today's managers and executives need to oversee humans and machines in this age of AI and RPA, but should machines be managed as humans in a way that some suggest?

How To 143
article thumbnail

Hackers targeting Arabic-speaking countries with malicious Microsoft Office documents

Tech Republic Security

Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco.

Microsoft 142
article thumbnail

Building A Pentest Program To Prevent A Data Breach

CTOvision

It was a simple misconfiguration that doomed Capital One. In March 2019, former Amazon employee Paige Thompson exfiltrated the data of more than 100 million Capital One customers, culminating in one of the year’s worst breaches. Thompson exploited what’s known as a server-side request forgery (SSRF) to access credit applications, Social Security numbers and consumer […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.