Evaluate And Adjust Your VoC Program To Improve CX During COVID-19

Forrester IT

Earlier this week, CX research directors David Truog and Harley Manning published a blog post that highlights two key points that I urge CX leaders who manage VoC programs to consider: understanding your customers is critical right now, and it is time to adapt your approach to CX.

Baidu open-sources Paddle Quantum toolkit for AI quantum computing research

Venture Beast

Tech giant Baidu has released Paddle Quantum, a toolkit for AI quantum computing research that's available in open source on GitHub. Read More.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Facebook’s chief AI scientist: Deep learning may need a new programming language

CTOvision

Deep learning may need a new programming language that’s more flexible and easier to work with than Python, Facebook AI Research director Yann LeCun said today. It’s not yet clear if such a language is necessary, but the possibility runs against very entrenched desires from researchers and engineers, he said. LeCun has worked with neural networks […]. Artificial Intelligence News

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

3 Mistakes Organizations Make While Developing ABM Programs

While B2B research suggests organizations are thriving through successful ABM programs, getting just one campaign off the ground is more difficult than it seems. From building an account universe to understanding to orchestrating sales and marketing alignment around touchpoint and messaging, there are a number of variables to consider before launching a program.

8 Steps for a High-Impact Enterprise Architecture Program

CEB IT

Much of the growth and interest is being driven by the demands of digital business and the need for CIOs to start, restart or renew their EA programs. Saul Brand , Senior Research Director, Gartner, outlines eight steps that successful EA and technology innovation leaders follow to build a high-impact EA program. Step 1: Adopt a business-outcome-driven EA program. Start or restart the EA program by adopting a business-outcome-driven EA (BODEA) approach.

Thinking About “Data Program Governance”

CTOvision

One phrase in regular rotation in my elevator pitch is “data program governance." Program means an organized set of activities designed to accomplish a defined set of objectives. Governance means the program is planned and managed in an organized and sustainable way. Creating a data program governance strategy is not unlike creating other types of enterprise business strategies. Managing Data-Intensive Programs and Projects: Selected Articles. Dennis D.

CTOvision Pro: A Subscription Based Research and Analysis Service

CTOvision

CTOvision Pro is our subscription based research and analysis service. CTOvision Pro provides subscribers with more in-depth research, analysis and reporting on topics that matter to enterprise IT.

An update on the bounty programs

IT Pros Rock!

Back in June of this year, we announced three new bounty programs that will pay researchers for techniques that bypass built-in OS mitigations and protections, for defenses that stop those bypasses and for vulnerabilities in Internet Explorer 11 Preview. This past Friday, we provided some additional details about the results of the IE11 Preview bounty program, which covered the first 30 days of the preview period. BlueHat Prize Bounty Programs BlueHat Challenge

CIT Announces Commonwealth Research Commercialization Fund (CRCF) FY2014 Fall Solicitation Awards and Upcoming Solicitation

CTOvision

Awards target academic research and commercialization activities in the Commonwealth . million in funding for 14 awards to Virginia’s colleges, universities, and research organizations as part of the FY2014 fall solicitation of the Commonwealth Research Commercialization Fund (CRCF).

James Madison University Seeks Professor – Intelligence Analysis Program

CTOvision

Please look it over and share it with others that may have an interest: Assistant / Associate Professor - Intelligence Analysis Program. General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). Bob Gourley.

David Shoultz seeks tech and science solutions as Washington Research Foundation grants director

GeekWire

As the new director of the grants program at the Washington Research Foundation , David Shoultz joins at a unique time for an organization dedicated to accelerating innovation in science and technology in the state. Website: Washington Research Foundation.

Uber open-sources automated design framework for experiments

Venture Beast

AI Big Data Dev ai artificial intelligence category-/Computers & Electronics/Programming category-/Science/Computer Science experimental design machine learning Pyro research UberUber open-sourced an AI framework for automating experimental design.

Leveraging Interactive Tools to Transform Your Training Program

Kitaboo

Let’s talk about leveraging interactive training tools to transform training program. By incorporating interactive training tools , you can transform your regular training program and ensure that it meets its end objectives.

27 Jan Webinar With SEI’s Cyber Intelligence Research Consortium: Learn how to have intelligence successes instead of security failures

CTOvision

A key collector of lessons learned and best practices is the Carnegie Mellon University Software Engineering Institute, who has been applying their community focused talent into building a coalition of researchers and practitioners around this discipline. By Bob Gourley.

What Kind of Management Structure Is Needed to Govern a Data Analytics Program?

CTOvision

When thinking about developing a new data analytics program, two questions you need to address are: What services do you need to provide? I’m assuming here that your organization already provides products or services of some sort and that, through a new or enhanced data analytics program, you want to take advantage of the data associated with these products or services. It provides support for data sharing for cancer research and the people and institutions involved.

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Track sessions will focus on: Enabling Business Results with Big Data — How to enable agency programs that will yield enormous value through big data to deliver actionable information and measureable results. Government is ever more reliant on data to deliver on mission and programs.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. manufacturing program (bizjournals.com).

Strategic Big Brain Science: NIH celebrates grand opening of John Edward Porter Neuroscience Research Center

CTOvision

Strategic Big Brain Science: NIH celebrates grand opening of John Edward Porter Neuroscience Research Center. State of the art research facility on NIH campus will foster new collaborations among scientists studying the brain. The National Institutes of Health will host a scientific symposium and a dedication ceremony March 31- April 1, 2014, to celebrate the completion of the John Edward Porter Neuroscience Research Center. By Bob Gourley.

Toward Strategic and Proactive Threat Intelligence Programs

Network World

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. The research revealed that many threat intelligence programs were relatively immature – 40% of threat intelligence programs had been in place less than 2 years at that time (note: I am an ESG employee). Cybersecurity professionals were also asked to identify the top objectives for their organization’s threat intelligence program.

Why you need a bug bounty program

Network World

Every business needs to have a process in place for handling security vulnerability reports , but some organizations take a much more proactive approach to dealing with security researchers. An increasing number of hardware and software vendors have formal bug bounty programs. Google, for example, runs its own vulnerability rewards program , and Microsoft has multiple bug bounties covering Office 365, Azure,NET and Edge as general programs covering exploits and defenses.

How To Appropriately Do Keyword Research for Your Marketing Strategy

Galido

Information Technology Blog - - How To Appropriately Do Keyword Research for Your Marketing Strategy - Information Technology Blog. Keyword research plays a significant role in marketing. Why is keyword research essential? Research niche keywords for your company.

New Mac backdoor program steals keychain contents

Network World

Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS-encrypted keychain and give attackers control over the system. Dubbed OSX/Keydnap by researchers from antivirus vendor ESET, this is the second backdoor program targeting Macs found by antivirus firms in the past few days.

Convergence: The Catalyst to Transform Scientific Research

Cloud Musings

by Melvin Greer Greer Institute for Leadership and Innovation A new transformative research approach is gaining global attention and adoption. This is an appropriate way to characterize and address converging research in life sciences and engineering, computation, and physical sciences.

Researchers demonstrate remote attack against Tesla Model S

Network World

Tesla Motors is considered one of the most cybersecurity-conscious car manufacturers in the world -- among other things, it has a bug bounty program.

New Tor-powered backdoor program targets Macs

Network World

Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network. The new malware has been dubbed Backdoor.MAC.Eleanor by researchers from antivirus vendor Bitdefender and is distributed as a file converter application through reputable websites that offer Mac software.

Apple’s bug bounty program favors quality over quantity

Network World

After years of reluctance to pay researchers for exploits, Apple has given in and is ready to hand out up to US$200,000 for critical vulnerabilities found in the latest version of iOS and the newest iPhones. Apple announced the program Thursday at the Black Hat security conference in Las Vegas. It starts in September, and unlike bounty programs run by other large technology companies it will be invite only.

Streaming: The Growing Threat to Cable Companies

CTOvision

Architecture Cloud Computing CTO Research The Future Trends Video Cable television Experian Internet access Multichannel video programming distributor Netflix Television United States Wall Street TV watchers and moviegoers, CEOs and Wall Street, marketers and techies – we have all theorized about Internet video’s threat to cable companies at one time or another.

New White Paper, “The Public Sector Improves Security and Efficiency with Hadoop”, Available in Research Library

CTOvision

A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. Hadoop drives improved efficiency and better outcomes in the delivery of public services, such as social aid programs and public works, through its ability to improve resource utilization and transparency. By Charles Hall. Interested in using Hadoop in the federal space?

DARPA semantic program seeks to glean truth from obfuscation

Network World

In this era where disinformation, alternative facts and other falsehoods are the rule of the day, the researchers at DARPA are looking to build a mechanism that can glean some truth from the obfuscation. DARPA says the program, called Active Interpretation of Disparate Alternatives (AIDA), looks to develop a “semantic engine” that generates alternative interpretations or meaning of real-world events, situations, and trends based on data obtained from an extensive range of channels.

Apple’s bug bounty program favors quality over quantity

Network World

After years of reluctance to pay researchers for exploits, Apple has given in and is ready to hand out up to US$200,000 for critical vulnerabilities found in the latest version of iOS and the newest iPhones. Apple announced the program Thursday at the Black Hat security conference in Las Vegas. It starts in September, and unlike bounty programs run by other large technology companies it will be invite only.

Researchers dismantle decade-long Iranian cyberespionage operation

Network World

The infrastructure used by an Iranian cyberespionage group to control infected computers around the world has been hijacked by security researchers. Researchers from Palo Alto Networks came across the group's activities earlier this year, but found evidence that it has been operating since at least 2007. Its main tool is a custom malware program dubbed Infy, which was repeatedly improved over the years.

Fiat Chrysler launches bug bounty program for connected vehicles

Network World

Fiat Chrysler Automobiles has launched a bug bounty program to attract white-hat hackers to spot out cybersecurity flaws in its products and connected services. The program is focused on FCA's connected vehicles, including systems within them and external services and applications that link to them. The move follows the remote hack and control of a Jeep Cherokee, one of the company’s products, by security researchers.

Security training programs don't do enough to mitigate insider risk

Network World

Last month, security research firm Ponemon Institute , sponsored by Experian Data Breach Resolution , surveyed 601 individuals at companies with a data protection and privacy training program on the issue of negligent and malicious employee behaviors for the Managing Insider Risk through Training & Culture report.

New Mac Trojan uses the Russian space program as a front

Network World

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry. Interestingly, the Trojan will also save a PDF document to the infected system concerning the Russian space program. The Trojan, called Komplex, can download, execute, and delete files from an infected Mac, according to security firm Palo Alto Networks.

Microsoft invests $2.5M in CREATE, a new center for accessible tech at the University of Washington

GeekWire

The University of Washington is launching a new Center for Research and Education on Accessible Technology and Experiences (CREATE) and Microsoft is helping to fund the effort with a $2.5 “We need more research investment thought leadership when it comes to accessibility.

Shine The Spotlight On Consumer Insights With Video

Forrester IT

None of us are new to watching video content, thanks to over a century of “moving pictures” through cinema and many decades of television programming. market research emotion MROC qualitative videoFast-forward to the past few years when video content has largely gone online. Video has become just as ubiquitous for companies as it has for self-made vloggers and YouTube prodigies. In […].

Video 175

Researchers release free decryption tools for PowerWare and Bart ransomware

Network World

Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare. Researchers from security firm Palo Alto Networks have recently found a new version of this threat that imitates a sophisticated and widespread ransomware program called Locky.

How to Avoid Overloading Your IT Project Team

CEB IT

Gartner research shows that teams with lower utilization can reduce the time it takes to deliver business value by 30% or more. According to Gartner, program and portfolio management (PPM) leaders can follow four basic steps to optimize project resource utilization. Learn more: The Program and Portolio Management Leader Role. Imagine your project team as traffic on a freeway.

Artificial intelligence is evolving all by itself

CTOvision

Researchers have created software that borrows concepts from Darwinian evolution, including “survival of the fittest,” to build AI programs that improve generation after generation without human input. The program replicated decades of AI research in a […]. Read Edd Gent explain how artificial intelligence is evolving by itself on Science Mag: Artificial intelligence (AI) is evolving—literally.

Pew Reports on American Digital Habits Post-Snowden

CTOvision

A recent report from the Pew Research Center provides an interesting look into Americans’ online habits following Edward Snowden’s revelations about surveillance practices in the United States. By Shannon Perry.

Report 305

Strategic Agile Thinking: Balancing Value, Innovation and Research

Social, Agile and Transformation

Strategic Agile Thinking: Balancing Value, Innovation and Research. Shifting to a Market, Program, and Platform Organization. Social, Agile, and Transformation.

Agile 167

The Navy’s Disconnected Refresh Strategy: Delivering Yesterday’s IT Tomorrow

CTOvision

To fix that, the US Navy has made their Consolidated Afloat Network and Enterprise Services (CANES) program one of their highest priorities. CTO Cyber Security DoD and IC Government Organizations Mobile Research microsoft Navy United States Navy US Navy Windows 8 Windows XP I''m going to spell out a challenge in hopes that someone fixes this (if you have a way to fix this issue you will be a hero to us all and probably make a billion dollars at the same time).