Sat.Oct 08, 2016 - Fri.Oct 14, 2016

article thumbnail

Emerging Technologies To Power Your Systems Of Insight

Forrester IT

In 2014, I recognized something was a bit off with all the big data excitement and I started interviewing companies to get to the bottom of it. In 2015, Ted Schadler and I published the first of my ideas in the report " Digital Insights Are The New Currency Of Business." In that report, we pointed out what was wrong - big data only focused on how to turn more data into more insight.

System 307
article thumbnail

Curating a Digital Life

CTOvision

Roger Hockenberry. Many times when I speak at conferences I talk about how each of us is now two people. There is first, the analog version of our self and now, with increasing emphasis and importance, our digital self that is leading more and more of an independent life without us. The Analog Self. Every one of us still exists in the analog (non-digital) world.

Social 270
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Number of women working in IT to rise by 2020

Computer Weekly

The proportion of women choosing to work in the IT profession is set to increase over the next four years as businesses adopt digital technology, according to a major study by the CEB

Study 215
article thumbnail

Cloud by the Megawatt: Inside IBM’s Cloud Data Center Strategy

Data Center Knowledge

All major US hardware vendors have tried and failed to become formidable rivals to Amazon in the cutthroat cloud infrastructure market; all except IBM. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Manufacturing Firms Could Do Better With A Focus On Customer Experience

Forrester IT

Companies are turning to digital to do one of the three things: improve customer experience (CX) using digital technologies; improve their operational efficiency to better serve customers; and launch new business models. The manufacturing and industrial sectors are undergoing a similar transformation. In my recent discussions with leaders in this market, Industry 4.0 and smart factory dominate the conversations, but the discussions quickly shift to the Internet of things (IoT).

Infosys 297
article thumbnail

Better Cyber Security Through Cyber Intelligence: Information Session Oct. 28

CTOvision

Bob Gourley. Friends at the highly regarded Carnegie Mellon University Software Engineering Institute (SEI) provided us the information below with a request that we get it into your hands. Please consider engaging with CMU SEI on this important topic, either in person or by getting others from your organization to attend. Better Cyber Security Through Cyber Intelligence: Information Session Oct. 28.

Security 234

More Trending

article thumbnail

Stop Thinking of Compliance as a Checkbox

Data Center Knowledge

Many of today’s executives view compliance as a check-box – and move on after the main requirements are met. However, financial compliance standards only scrape the surface of what proper protection should be Read More.

Financial 175
article thumbnail

Can Salesforce Really Prescribe An End-to-End Sales Process?

Forrester IT

Last week, nearly 170,000 business and technology professionals descended onto San Francisco for Salesforce's annual conference, Dreamforce. The event itself was ripe with discussions on social responsibility and charity, but most attendees, including myself, attended for other reasons. We wanted Salesforce to pull back the curtains on what it saw for the future of sales.

article thumbnail

WIT Connect: The Internet of Things – New Opportunities, New Risks

CTOvision

Bob Gourley. Women In Technology Presents: WIT Connect: The Internet of Things - New Opportunities, New Risks. Thursday, October 20, 2016. 6:00-8:30 PM. Tegna/Gannett Building. 7950 Jones Branch Drive, McLean VA. The Internet of Things (IoT) is creating unprecedented opportunities for business innovation and personal convenience. Connected devices seem to be everywhere and are impacting our lives on a daily basis, changing everything from the way we deliver healthcare and track fitness, to heati

Internet 233
article thumbnail

G7 sets financial sector cyber defence guidelines as attacks grow

Computer Weekly

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Facebook and Google to Build Transpacific Submarine Cable

Data Center Knowledge

The partnership is the latest sign of ongoing power balance shift in the world of transcontinental connectivity. Read More.

Google 202
article thumbnail

Google’s Next Play: Your Assistant For Everything - Not Just Answers

Forrester IT

This blog post is co-authored by VP and Principal Analyst Julie Ask and Analyst Andrew Hogan at Forrester. Google held an event in San Francisco this week to announce several new consumer products - a smartphone, a wireless speaker, Wi-Fi routers, a virtual reality headset and an updated Chromecast solution. All showcased an emerging strategic direction for Google and some killer engineering and design skills.

article thumbnail

Thank you to all who could make it to The Synergy Forum

CTOvision

Bob Gourley. We were so pleased to see so many business partners, friends and associates at Cognitio's second annual Synergy Forum on 4 Oct. To all who could make it, thank you very much for deciding to invest your personal time and energy into this event. We will be providing more detailed summaries of event sessions over the next few weeks. For now here are a few highlights: Cognitio CEO Roger Hockenberry provided actionable context on the coming age of digitization, where data has become the

article thumbnail

Three-quarters of UK policing websites lack secure encryption

Computer Weekly

A quarter of UK policing websites have secure foundations, but half have room for improvement, and the remaining quarter are in need of serious and urgent improvement, according to the Centre for Public Safety

Security 191
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Impacts of Cooling and Energy Efficiency on Today’s Data Center Design

Data Center Knowledge

Before and after computational fluid dynamics (CFD) models can assist customers in predicting their energy savings and building an ROI model that improves the value of the containment investment. Read More.

Energy 171
article thumbnail

Field Service: Increasingly Important For Differentiated Customer Service Experiences

Forrester IT

Field service technologies are more than two decades old. Companies have leveraged them to coordinate the flow of work orders that came in as service requests to the contact center. They were able to reap real ROI by using these technologies to schedule technicians, manage their routes and their flow of work. Today, with the rise in importance of delivering differentiated customer experiences, field service technologies are become increasingly important.

Report 269
article thumbnail

Why there's a Tech Skill Shortage - A CIO's Perspective

Social, Agile and Transformation

A couple of articles published last week raised the issue of whether universities are graduating sufficient technology talent to fill positions at US companies. First, Gary Beach provided significant evidence that the skills gap is no laughing matter to CEO and CIO that recognize technology can drive transformation and growth. He quotes studies showing over 500K IT jobs remain open after the.

Study 162
article thumbnail

Encouraging kids into Stem: problems and suggestions

Computer Weekly

Influencers within the science, technology, engineering and maths (Stem) sectors describe the problems preventing children from pursuing Stem careers, and how they might be fixed

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Transition Now to an Agile Storage Infrastructure or Perish

Data Center Knowledge

Today’s business requirements bring a great opportunity for companies to transition into an agile storage architecture, that will not only meet today’s demands, but also support what’s next to come. Read More.

Agile 168
article thumbnail

Exploring The IoT Attack Surface

Forrester IT

Merritt Maxim and I just published our research on the IoT Attack Surface. This report gives a realistic, but not sensationalized, view of how enterprises need to think about IoT. Three factors motivated our research for this topic - attacks on IoT will transcend the digital-physical divide, the sheer scale of IoT will challenge security teams, and IoT devices collect massive amounts of data.

Research 270
article thumbnail

Big Data isn’t the answer

Eric D. Brown

In a recent speech, John Costello, former president of Dunkin Donuts, is reported to have said “Big data is not a strategy…” I wish I had said that sometime in the past few years. I think I’ve similar things but I haven’t come right out and said those exact words (that I can recall). Again, I wish I had. I hear people talking (and writing) about big data today.

Big Data 149
article thumbnail

Singaporean organisations face stiff competition for junior IT professionals

Computer Weekly

Singaporean multinationals are no longer the default employers of talented IT professionals in the Asean region as a vibrant startup community and growth in other countries turns heads

188
188
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cloud Fuels Unprecedented Data Center Boom in Northern Virginia

Data Center Knowledge

Real estate brokers predict Data Center Alley in 2016 see double the amount of leasing it saw last year. Read More.

article thumbnail

Introducing The Forrester Wave™: Digital Risk Monitoring, Q3 2016

Forrester IT

We recently published our Forrester Wave™: Digital Risk Monitoring, Q3 2016 report. We evaluate nine of the top vendors in this emerging market that offer solutions to continuously monitor "digital" -- i.e., social, mobile, web, and dark web -- channels to detect, prevent, and mitigate any type of risk event posing a threat to organizations today.

Social 264
article thumbnail

Do Great CIOs Need To Learn How To Be Humble?

The Accidental Successful CIO

CIOs need to learn to be humble in order to be successful Image Credit: Fr Lawrence Lew, O.P. As the CIO you feel as though you are in charge of your IT department. What this means for most of us is that we need to continuously be showing everyone that we are the person in charge. Since we’ve been asked to lead the IT team, we need to be filled with self-confidence and be willing to show that to everyone.

How To 135
article thumbnail

Almost two-thirds of US office workers unaware of ransomware threat

Computer Weekly

Nearly half of ransomware attacks are aimed at office workers, but almost two-thirds of those polled in the US are unaware of the threat

209
209
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NFL Linemen Show Business How It’s Done

Data Center Knowledge

Data and files are getting larger, yet still must get from point A to point B in an expedited fashion. It can no longer be the big, slow data it once was, but enterprises still fail to fully embrace the agility component. Read More.

Fashion 163
article thumbnail

Nokia “Connects” Network Services To Customer Experience

Forrester IT

Nokia's services division recently hosted an analyst event where it elaborated on the interlinkage between network services and network infrastructure. Of course, network services matter to businesses and telcos because they help technology managers to better manage infrastructure complexity and to modernize network infrastructure with the goal of making networks faster and more reliable.

Network 262
article thumbnail

2017 cybercrime trends: Expect a fresh wave of ransomware and IoT hacks

Tech Republic Security

This year companies were rocked by over 90 million cyberattacks. In 2017 the number could double. Cybersecurity expert Sameer Dixit explains how new innovation leads to increased vulnerability.

Trends 131
article thumbnail

Government failing to prepare UK for robotics and AI

Computer Weekly

A report produced by the Science and Technology Committee has warned that the UK is fundamentally unprepared for the changes that will come from robotics and artificial intelligence

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.