article thumbnail

Cognitive on Cloud

Cloud Musings

Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. Companies that are leveraging cloud today must also prepare for the cognitive computing era. This blend of cloud and cognitive has, in fact, created a brand new application development model.

Cloud 70
article thumbnail

Ten Symptoms/Root Causes of Poorly-Run IT Department

Future of CIO

Inconsistent approach to processes and procedures and/or does not distinguish between a PMP and an SDLC. much lower rate of mobility, the peter principle, etc.) The other key sign is an IT department that is not involved closely with the business part of the organization. Lack of policy and governance procedures that define processes.

Budget 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When least privilege is the most important thing

CIO Business Intelligence

Mobile applications provide an excellent example of the dangers of ignoring least privilege. Another problem with mobile application security is the speed with which individuals can develop and deploy new apps. Not to say that this is only a problem with mobile app development. This is a failure of least privilege.

Backup 124
article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

From the tiny microphones on our mobile devices and digital assistant, to the light detecting radars in our cars--these are single-purpose semiconductors, right? The flaw uses light- say from a laser pointer pen -- to simulate speech. But this is just the tip of the iceberg.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

From the tiny microphones on our mobile devices and digital assistant, to the light detecting radars in our cars--these are single-purpose semiconductors, right? The flaw uses light- say from a laser pointer pen -- to simulate speech. But this is just the tip of the iceberg.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

From the tiny microphones on our mobile devices and digital assistant, to the light detecting radars in our cars--these are single-purpose semiconductors, right? The flaw uses light- say from a laser pointer pen -- to simulate speech. But this is just the tip of the iceberg.