Sat.Mar 10, 2018 - Fri.Mar 16, 2018

article thumbnail

The GDPR and The B2B Marketer: Ready or Not, Here I Come

Forrester IT

The deadline for compliance with the GDPR is May 25, 2018, but the preparations of many B2B marketers range from nonchalant to indifferent. In our research interviews and inquiries about the GDPR, we find that many B2B marketers don’t think the regulation is a relevant concern because they think the GDPR doesn’t apply to business […].

B2B 299
article thumbnail

Could Classifying AI Research Prevent Public Harm?

CTOvision

Headlines frequently feature news about advancements in artificial intelligence (AI). These developments collectively boost public interest in AI and help people imagine what’s possible. But some individuals are concerned about what could happen if information about AI research falls into the wrong hands. Hackers Are Typically One Step Ahead The increase in cybersecurity attacks has […].

Research 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The #1 Reason Why Digital Transformations Fail

Social, Agile and Transformation

Harvard Business Review just published why so many high profile digital transformations fail highlighting some of the difficulties several high profile programs. They reviewed digital transformations from GE, P&G, and Nike and suggest several lessons learned: "No managers should view digital — or any other major technological innovation — as their sure salvation.

article thumbnail

Beware the Models

Eric D. Brown

“But… all of our models have accuracies above 90%…our system should be working perfectly!”. Those were the words spoken by the CEO of a mid-sized manufacturing company. These comments were made during a conversation about their various forecasting models and the poor performance of those models. This CEO had spent about a million dollars over the last few years with a consulting company who had been tasked with creating new methods and models for forecasting sales and manufacturing.

Data 200
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Cutting Through The Noise And Defining The Value Of The Digital Twin For Your Business

Forrester IT

There’s a lot of talk about the digital twin in the business world these days, but the definition remains murky. Think of the digital twin as a virtual mirror. If you move one way – so does your reflection. Your reflection is also unique to you.

article thumbnail

What Executives Should Know About Ethereum

CTOvision

Bitcoin was the first implementation of a working blockchain technology. The idea has been built on with several other implementations. One of the most exciting is Ethereum. In some instances Ethereum's coin, Ether, is compared with Bitcoin, and you see both cited in cryptocurrency value listings. But Ethereum's implementation of blockchain goes far beyond the […].

CTO 288

More Trending

article thumbnail

Microsoft Compatibility Reporting Tool Spectre and Meltdown Patch

Mick's IT Blog

Ever since the Spectre and Meltdown issues arose, we have been waiting on patching, at least reliable patching. Microsoft has taken it on itself to patch systems for the vulnerability. ExtremeTech wrote an excellent article on Microsoft's solution which gave me the thought to write a script for telling which systems are compatible. To determine the minimum family and model compatible with the patch, I used the data from this Intel page that associates family and model to the microarchitecture co

Tools 104
article thumbnail

The Industrial Internet Comes Of Age In China

Forrester IT

A few weeks ago, the China Industrial Internet Summit — the country’s leading industrial internet conference — was held in Beijing. Dozens of leading manufacturing firms and technology vendors from the US, Germany, and Japan shared their latest achievements and future strategies with thousands of participants. The weather was cold, but the industrial internet is […].

Internet 246
article thumbnail

Automation Apps that Will Launch Your Startup

CTOvision

Starting a business can be one of the most exciting and rewarding things you ever do in your entire life. However, there are a number of stressors that can hamper the experience and bog you down with mundanity. Luckily, through the use of automation, these tasks are simplified and executed without you ever having to […].

article thumbnail

8 Reasons to Select Intune Standalone Over Hybrid

Anoop

I understand that the decision to go with Intune standalone or Intune hybrid with SCCM is critical for all the organizations. I was part of one Intune hybrid or standalone decision-making team. And I’m happy that we took a decision NOT to go with Intune hybrid solution with SCCM integration. This post is prepared before […]. The post 8 Reasons to Select Intune Standalone Over Hybrid appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Unlocking Enterprise systems using voice

All Things Distributed

At Amazon, we are heavily invested in machine learning (ML), and are developing new tools to help developers quickly and easily build, train, and deploy ML models. The power of ML is in its ability to unlock a new set of capabilities that create value for consumers and businesses. A great example of this is the way we are using ML to deal with one of the world's biggest and most tangled datasets: human speech.

article thumbnail

The Buyer’s Guide To Cybersecurity Services

Forrester IT

During every Forrester Wave™ evaluation I conduct, I spend time sifting through vendor responses, data, client surveys, and reference interviews and develop an outline of recurring themes — the good, the bad, the new, the old, etc. After the Wave goes live, I collect all of that information, bundle it together, and produce a “Lessons” […].

Survey 236
article thumbnail

Time for Transformational Cybersecurity!

CTOvision

One of the hardest things to change in human society is a long-standing myth. The current well accepted myth about information technology (IT) systems is that they cannot be defended against well-funded, determined hackers. Because such myths are rarely questioned, the cyber security workforce takes it as a given that even highly secured IT systems […].

Security 169
article thumbnail

What do ogres, onions and SD-WAN security have in common? Layers!

Network World

Remember this scene from the movie Shrek? The big ogre was explaining to Donkey that ogres are very complicated, and like onions, they have layers. Donkey, of course, didn’t like the analogy because not everyone likes onions and would have preferred cake as everyone likes cake, but he did seem to understand that ogres did indeed have layers after it was explained to him.

WAN 122
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Migration Guide Intune Hybrid to Intune Standalone

Anoop

We had a serious discussion about the decision making process between Intune hybrid and standalone. In that post, we discussed about 8 Reasons to Select Intune Standalone Over Hybrid. So in the nutshell the decision was to go with Intune standalone instead of jumping into slow train. In this post, we will see migration guide Intune hybrid […].

Training 108
article thumbnail

Salesforce Nicely Rounds Out Its B2B CRM With CloudCraze

Forrester IT

On March 12, Salesforce announced its intent to acquire CloudCraze, a B2B eCommerce application. This savvy and long-anticipated move nicely rounds out its broad CRM portfolio and supports B2B customers through their engagement journey. This eCommerce application is a fundamentally different one than Salesforce’s B2C eCommerce acquisition of Demandware.

B2B 232
article thumbnail

Pause And Take Note Of The Remarkable Engineering In AWS Snowball and AWS Snowball Edge

CTOvision

In a recent conversation with a friend in AWS I was reminded of the very interesting capabilities of AWS Snowball and the even more capable Snowball Edge. Snowball is a data transport solution that is designed to get large quantities of data from one place to another. It can move petabytes from legacy datacenters into […].

article thumbnail

Retrieve MSU Information

Mick's IT Blog

While working on the Windows 10 upgrade project, I ran into a situation which I needed the information from an MSU file for the task sequence. Specifically, I needed the KB number. The first thing I did was to try and use the same method used in retrieving info from MSI and MSP files by trying to query the database. That does not work with an MSU file.

Windows 83
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft MVP Summit 2018 ROI

Anoop

Microsoft MVP summit is a technical conference exclusively for “current” Microsoft MVPs. Microsoft invites all the Microsoft MVPs to attend this global event. Microsoft MVP summit 2018 is my 3rd MVP summit. This conference is hosted in Redmond (Microsoft campus) and Seattle. One section of this post covers Microsoft MVP Summit Return On Investment (ROI) […].

Microsoft 104
article thumbnail

Mobile World Congress 2018 Felt More Telco-Centric Again

Forrester IT

Now that the dust has settled from Mobile World Congress 2018, it is possible to get a better feel which mobility themes will set the tone for the coming year of mobility. These observations are of course subjective; they only reflect my observations over three days at the world’s leading mobility event. To start, the […].

Mobile 213
article thumbnail

A Beginner’s Intro Guide to Performing Your Own Cyber Security Audit

CTOvision

Cybersecurity remains vitally important to small businesses and private individuals alike. Once a hacker accesses information they are not supposed to have they can cause all sorts of damage. You know that. Every business is different, but all should understand their particular nightmare scenarios and take action to mitigate those threats. But how do you […].

article thumbnail

California eyes 'right to repair' smartphone law, may join 17 other states

ComputerWorld Consumerization IT

California may add its voice to a growing chorus of states seeking to enact "Right to Repair" laws that would let owners of mobile and other electronic devices get their hardware fixed by third parties without voiding manufacturer warranties. California Assemblymember Susan Talamantes Eggman (D-District 13) introduced a "Right to Repair" Act that would require electronics makers to offer diagnostic and repair information, as well as equipment or service parts, to product owners and independent

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Set Google as Default Search Engine with CSP Intune Profiles

Anoop

Most of the Organisations follow “Traditional device management approach” which use Group policy as their primary tool to set security standards and end user settings. But in modern device management approach, we should try new solutions like Windows CSPs. In this post, we will see how to deploy and monitor Default Search Engine CSP policy via Microsoft Intune. […].

article thumbnail

Palo Alto Networks acquires cloud monitoring and workload management specialist Evident.io

Forrester IT

Palo Alto Networks (PAN) today announced plans to acquire Evident.io, a predominantly API-based cloud monitoring vendor for a cash purchase price of $300m. Evident.io has a large mindshare with Forrester’s end user clients and is also mentioned by other cloud workload security management (CWS) vendors regularly as a viable competitor.

Network 186
article thumbnail

INFOGRAPHIC: How Netflix Uses Big Data to Drive Success

Dataconomy

Anyone with a Netflix subscription understands the process of finding a movie or TV show to watch. You go to the website and see the shows that you recently watched, some shows that are recommended and maybe a few show ratings. Each Netflix user has his or her unique set of options. The post INFOGRAPHIC: How Netflix Uses Big Data to Drive Success appeared first on Dataconomy.

article thumbnail

Technology Short Take 96

Scott Lowe

Welcome to Technology Short Take 96! Ahead, lying in wait, is a unique collection of links, articles, and thoughts about various data center technologies. Browse if you dare…OK, so I’m being a bit melodramatic. It’s still some good stuff here! Networking. Via Matt Oswalt and Michael Bushong, I came across this article on Juniper’s use of P4.

article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.

article thumbnail

California eyes 'right to repair' smartphone law, may join 17 other states

ComputerWorld Consumerization IT

California may add its voice to a growing chorus of states seeking to enact "Right to Repair" laws that would let owners of mobile and other electronic devices get their hardware fixed by third parties without voiding manufacturer warranties. California Assemblymember Susan Talamantes Eggman (D-District 13) introduced a "Right to Repair" Act that would require electronics makers to offer diagnostic and repair information, as well as equipment or service parts, to product owners and independent

article thumbnail

Who Owns The Data In Your IoT Platform? It Doesn’t Have To Be Confusing

Forrester IT

Software platforms to support the industrial internet of things (IoT) are becoming very credible options. But despite their appeal, I constantly hear from clients who are wary. These clients don’t doubt the technical capabilities of the platform, or the pricing strategy, or the industrial nous of their preferred vendor. But they are confused about who […].

Internet 203
article thumbnail

Technology – required but not sufficient for digital transformation

I'm not lost, I'm wondering

Digital technology is a necessary component of digital transformation. In fact, digital transformation is only possible because of digital technology. And not only possible, but inevitable. Digital transformation isn’t something you do, it’s something that happens to you. Digital transformation isn’t about getting better or more efficient at what you already know how to do.

article thumbnail

Getting Your Feet Muddy with Data Science: A Conversation with Ross Taylor

Dataconomy

As companies digitize and data occupies a more central place in our lives, corporations are struggling to find enough talented people to meet the business challenges they face. This has created exceptional opportunities for individuals who are up for tackling those challenges. Ross Taylor of ALPIMA started his career as an economist. The post Getting Your Feet Muddy with Data Science: A Conversation with Ross Taylor appeared first on Dataconomy.

Data 66
article thumbnail

Next-Gen Procurement: Transforming Processes with the Power of Generative AI

Generative AI goes beyond just automating tasks and providing real-time answers. Did you know that implementing generative AI reduces sourcing cycle times and allows for faster decision-making across procurement operations? In this whitepaper — Next-Gen Procurement: Transforming Processes With the Power of Generative AI — experts reveal how the strategic application of generative AI within procurement processes is paving the way for groundbreaking improvements.