Sat.Feb 16, 2019 - Fri.Feb 22, 2019

article thumbnail

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

CIOs know that training employees is the key to keeping their network secure Image Credit: Merrill College of Journalism Press Releases. I think that we can all agree that keeping the company’s network secure is one of the person with the CIO position’s most important tasks because of the importance of information technology. However, no matter how many firewalls we put in place or how effectively we implement two-factor authentication we still need to understand the weakest link in our security

Training 113
article thumbnail

AI is Not Magic - It's Time to Demystify and Apply

Information Week

It's time for enterprises to define their artificial intelligence strategies, and they have to consider embarking on mass experimentation to achieve success.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Shopping For AI Talent? Beware Of Unicorns

Forrester IT

At the dawn of big data, data scientists were the unicorn of the hour. Talk to any one of these rarities, and they would say there were only about 100 of them in the world. When executives woke up to the potential of big data, it was also at the same time we were dealing […].

Big Data 393
article thumbnail

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […].

Internet 282
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Agile 168
article thumbnail

MDM Diagnostics Tool – Tips & Tricks – Windows Autopilot Troubleshooting

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In my previous post, Windows Autopilot Troubleshooting basics, we discussed different troubleshooting areas like Network Activity, Registry, and Event Viewer. In this post, let’s discuss on Windows MDM Diagnostics Tool benefits, usage, and examples. [Related Posts – Windows Autopilot Step by Step Guides, Windows 10 Deployment Process Flow and Logs] What is Windows MDM Diagnostics […].

Windows 167

More Trending

article thumbnail

OpenAI’s new multitalented AI writes, translates, and slanders

CTOvision

OpenAI’s researchers knew they were on to something when their language modeling program wrote a convincing essay on a topic they disagreed with. They’d been testing the new AI system by feeding it text prompts, getting it to complete made-up sentences and paragraphs. Then, says David Luan, VP of engineering at the Californian lab, they […].

article thumbnail

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer.

Security 122
article thumbnail

Maria Lensing: The Network Platform for Healthcare’s Future

Cloud Musings

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s life, ignited a passion for healthcare. Unfortunately, that passion didn’t apply to blood, so she went into electrical engineering and biomedical engineering, eventually falling in love with networking and data.

Network 107
article thumbnail

Modern (B2B) Love: Deepen Customer Relationships With Post-Sale Engagement Marketing

Forrester IT

Ah yes, anyone suffering from a chocolate hangover? Or an excess of corny romanticism? Let’s face it, we all love “love” — but with Valentine’s Day a week behind us, the last thing you probably want right now is more advice on relationships. Before you toss aside some of that abundant advice about personal relationships, […].

B2B 381
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook’s chief AI scientist: Deep learning may need a new programming language

CTOvision

Deep learning may need a new programming language that’s more flexible and easier to work with than Python, Facebook AI Research director Yann LeCun said today. It’s not yet clear if such a language is necessary, but the possibility runs against very entrenched desires from researchers and engineers, he said. LeCun has worked with neural networks […].

article thumbnail

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer.

Security 113
article thumbnail

Is Kubernetes Serverless?

Linux Academy

The Kubernetes Trend. If you take a look at where the IT industry is going, you will start to see a trend: a layer of complexity added to the relationship between applications and infrastructure. No longer can you draw a straight line from the application to the machine it runs on. Developers have been trying to get away from having to manage infrastructure for years.

article thumbnail

Small Business Banking Has Been Disrupted (And There’s No Going Back)

Forrester IT

Bankers around the world are rightly worried about the threats posed by digital disruptors getting in between them and their retail banking customers. But Forrester’s newest research reveals that executives should be just as worried — perhaps even more worried — about another market that is being upended: Small business banking. Small and medium-sized businesses […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Internet of Things will power business processes in 2019

CTOvision

Read why Virendra Chaudhari says centralized IoT systems will become a vital force to drive businesses on Financial Express : As advancing technologies integrate deeper into the everyday functions of businesses, companies are finding themselves faced with a paradigm shift towards a more intelligent and connected world. Amidst the maturing technologies leading this revolution is […].

Internet 238
article thumbnail

Directing Innovation: Course for company directors to keep ahead of disruption

Trends in the Living Networks

For many years I have been working with company directors on framing and driving innovation in their organizations. From this March I will be applying this experience as Course Director for a new program run by the Australian Institute of Company Directors (AICD), titled Directing Innovation. The one-day course is intended for experienced directors and graduates of the AICD’s foundation Company Director Course.

Course 109
article thumbnail

11 Digital Transformation Hacks That Get Results

Information Week

Organizations tend to get different results with digital transformation. To realize business value, first realize that transformation isn't just about tech.

114
114
article thumbnail

Digital Out-Of-Home Advertising: Not Your Grandmother’s Roadside Billboards

Forrester IT

(Dave Novitzky contributed to this blog) It’s January, snowy, unbearably cold, and to make matters worse, a Monday. You’re trying to make it to the weekend so you don’t need to go outside. until you see an empty lounge chair on a beautiful warm beach floating down the Hudson River. Yes, you […].

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Average Ransomware Payment Is Rising

CTOvision

The average ransomware payment is growing as criminals become more sophisticated in their attacks, according to a report released by ransomware incident response company Coveware. According to Coveware’s Q4 2018 Global Ransomware Marketplace Report, the average ransom increased by 13% to $6733 in Q4 2018 compared to Q3’s $5973. It’s difficult to judge the statistical margin of […].

Report 222
article thumbnail

How AR Is Revolutionizing Advertisements

Galido

Information Technology Blog - - How AR Is Revolutionizing Advertisements - Information Technology Blog. If you are familiar with, or happen to have used McDonald’s GOL app during the 2014 FIFA World Cup or after, then you’ve interacted with augmented reality. The app, which Google says had between 50,000 and 100,000 downloads by June 6, 2014; just shortly after its release, is just one of the many ways in which popular brands are using AR and related technologies to promote sales.

article thumbnail

Machine Learning Targets the Opioid Crisis

Information Week

NewYork-Presbyterian Hospital recognized that the same kind of machine learning concepts used for cybersecurity could be used to fight the opioid crisis.

113
113
article thumbnail

If mCommerce Isn’t Mini eCommerce, What Is It?

Forrester IT

mCommerce today is often characterized as online purchases made on a smartphone or mobile payments (e.g., Apple Pay or Google Pay). As our colleague James McQuivey would say, that is simply doing old things in new ways — not doing new things. We define mobile as any device with a cellular connection.

Mobile 342
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Blockchain Can Drive Finance And Audit Performance

CTOvision

In 2017, bitcoin, a cryptocurrency based on the blockchain, skyrocketed in value and caught the eye of executives around the globe. While most of us have focused on the currency aspect, it’s no secret that blockchain, a distributed ledger technology, could see its most effective and widespread application in the corporate world, specifically in finance.

article thumbnail

Lightning-Fast Loading Times: Is Your Website Being Slowed down by One of These 7 Elements?

Galido

Information Technology Blog - - Lightning-Fast Loading Times: Is Your Website Being Slowed down by One of These 7 Elements? - Information Technology Blog. Did you know that page loading speed is one of the most important on-site SEO factors? It’s not only a matter of attaining the highest search engine rankings but also caring for the kind of user experience your visitors are having.

article thumbnail

2019: The Year IT Makes a Comeback

Information Week

It's time for IT leaders to recognize that the IT group is crucial to their companies' future growth and success, and to let the business know that IT is there to help.

Groups 106
article thumbnail

FORRward — a weekly read for tech and marketing execs

Forrester IT

A Roadmap To Lose Your Technology Mandate CIOs have historically run technology innovation efforts but that may be changing. We find CEOs understand that the future of their business depends on technology they don’t have or that hasn’t been invented yet. They recognize a need to spend at least part of their firm’s time […].

Cloud 336
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Defending Against IoT “Accidental” Insider Threats

CTOvision

Read Jason Soroko article about how to protect yourself against accidental Internet of Things insider threats on IoT for All : When considering insider threats faced by the Internet of Things (IoT) systems, few will be surprised to learn that protecting a network with a growing number of connected devices from a maliciously motivated insider […].

Internet 207
article thumbnail

FlexDeploy Loves OIC: Continuous Delivery with Pipelines and Releases

Flexagon

This blog is the fifth in the FlexDeploy Loves OIC blog series, stay tuned for subsequent entries in the series. FlexDeploy Loves OIC: Series Overview FlexDeploy Loves OIC: Manage integrations with connections FlexDeploy Loves OIC: Manage connection property replacement FlexDeploy Loves OIC: Continuous Integration FlexDeploy Loves OIC: Automated testing FlexDeploy Loves OIC: Continuous Delivery with.

SOA 79
article thumbnail

Searching For a Cloud-Native App Strategy Amid the Chaos

Information Week

As it gets easier and easier to deploy cloud-native apps, maintaining order increasingly becomes a challenge.

Cloud 132
article thumbnail

Calling CEOs: Your Software Teams Need You — Now

Forrester IT

Our research indicates that software delivery success depends on the CEO’s active leadership of strategy, culture, and metrics. That’s right: CEOs, not just CIOs. This video explains what CEOs should do. For more, see our blog.

Software 329
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.