Sat.Dec 28, 2019 - Fri.Jan 03, 2020

article thumbnail

9 Ways to Improve IT and Operational Efficiencies in 2020

Information Week

Facing economic uncertainty, many IT leaders are looking to become more efficient while also investing in the latest technology.

110
110
article thumbnail

As Hackers Target Mobile Payment Apps, Here’s How to Keep Them at Bay

CTOvision

Read Carlos Asuncion explain how you can prevent hackers from targeting your mobile payment apps on Dark Reading : Consumers love paying for goods and services with their smartphones. But as more retailers release their own mobile apps with in-store payment options, the threat of fraud must be carefully considered. Retailers offering in-store purchasing through […].

Mobile 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Bias: AI's Achille's Heel

Information Week

Bias can result in undesirable AI outcomes. A recent DataRobot survey says organizations are most concerned about its impact on trust and their reputations.

Survey 148
article thumbnail

Resolving or Revolving?

Forrester IT

It’s that time of year. When folks make up their minds that things are going to change. The gym is full of new members who are eager to get into their journey towards some other semblance of better health, or a beach body, or some change that they desire. Others are in that annual state […].

Security 195
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

John Cusack Practical Quotes on Strong Digital Leadership

Social, Agile and Transformation

Every once and a while, I draw inspiration from movies and actors/actresses. I have a post paying tribute to the great movie. What about Bob? Baby Steps - A Guide to Digital Transformation. I have another post comparing executive meetings with a classic Darth Vadar scene from The Empire Strike's Back. My two personal favorite movie posts are product management advice from the Tom Hanks movie.

Meeting 173
article thumbnail

The Dali Lama As A Business Strategist: His words underscore the need for informed action

CTOvision

The Dali Lama just posted some very wise thoughts for our consideration: Time never stands still, it’s always moving on. The past is beyond our control, but the future is still in our hands. To shape it we must use our intelligence and make an effort. We can change our circumstances. Becoming demoralized is of […].

More Trending

article thumbnail

Shatter The Seven Myths Of Machine Learning

Forrester IT

The best New Year’s resolution? Become machine-learning-literate! It’s good for your organization, your career, and the sanity of your data scientists. See the new “Shatter The Seven Myths Of Machine Learning” report below for a mini course on machine-learning fundamentals and terminology.

Course 462
article thumbnail

How to change the HTTP listening port in Apache

Tech Republic Security

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

How To 200
article thumbnail

FedScoop Reports Palantir’s support of the Army’s massive data problem

CTOvision

The federal government’s leading tech media brand FedScoop has just published an insightful look inside Palantir’s support to some of the Army’s most critical mission needs. The report dives into a recent contract award that aims to bring together a wide range of disparate data from unique and often totally disjointed systems to provide decision-makers […].

Report 196
article thumbnail

Feedspot Top 20 SCCM Blogs to Follow in 2020

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Great to start the year 2020 by announcing that this blog (www.anoopcnair.com) is part of Feedspot Top 20 SCCM blogs to follow in the year 2020. 😍😍😍👌👌 Subscribe to this blog NOTE! – Feedspot published this list of blogs in SCCM category even though Microsoft changed the name of SCCM to MEMCM.

Windows 148
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

A Deeper Dive Into Forrester’s Sales Enablement 2020 Predictions: A Conversation With Caroline Robertson (CR) And Mary Shea (MS)

Forrester IT

In October 2019, our team published its Predictions 2020: B2B Marketing And Sales, and in late December we recorded Webinar: B2B Marketing And Sales Predictions 2020: A Conversation With The Analysts Who Made Them. In the waning hours of 2019, Caroline Robertson and I took the opportunity to double-click into our sales enablement predictions. What […].

B2B 377
article thumbnail

How to Create a Culture of Innovation

Information Week

Here are five key techniques to support and encourage entrepreneurship in your employees -- while simultaneously keeping everyone moving in the right direction.

How To 143
article thumbnail

Citrix Vulnerability Puts 80K Companies at Risk

CTOvision

A critical flaw has been discovered in two Citrix products, placing 80,000 companies in 158 countries at risk. The easily exploitable vulnerability could allow attackers to obtain direct access to a company’s local network and to access a company’s credentials. It could also be used to launch denial of service and phishing attacks and to implant malware […].

Company 154
article thumbnail

Deciphering Intune’s Scope w.r.t Bitlocker Drive Encryption – Part 3

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. This is the 3rd article of the Bitlocker series. Links to previous parts are mentioned below. Give them a read if you have not yet! Part 1 – Bitlocker Unlocked with Joy – Behind the Scenes Windows 10 Part 2 – Device Encryption – Bitlocker made Effortless Today in this post, we will be talking […].

Windows 143
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

2020: The Year Of Digital Products

Forrester IT

Is your firm ready for the roaring twenties? Nigel Fenwick predicts the winners in the next decade will be the businesses that master digital product management.

388
388
article thumbnail

3 security tips to protect yourself from skimming attacks

Tech Republic Security

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice.

Security 117
article thumbnail

AI and robotics execs look back at tech trends of 2019

CTOvision

As 2019 winds down, every news media and technology site is pausing to reflect on the biggest trends of the past year. Some aspects of robotics and artificial intelligence are advancing rapidly; others, not so much. What should AI and robotics developers recall as they prepare for a new year? Sudhir Jha, senior vice president […].

Trends 152
article thumbnail

Install Configuration Manager PowerShell Module

Mick's IT Blog

I wanted to install the Configuration Manager PowerShell module on my admin machine. After investigating a little, the module does not exist in the Microsoft PowerShell gallery. The PowerShell script below will create the module directory under the WindowsPowerShellmodule directory within %PROGRAMFILES%. It will then copy over all of the necessary files.

Microsoft 147
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Three Key Drivers That Alibaba Enables Brands’ Business Growth

Forrester IT

My colleagues Danny Mu, Guannan Lu and I attended Alibaba ONE Business Conference on December 18 in Hangzhou. The conference attracted 2,000 business leaders from brands across industries and focused on how Alibaba enables brands’ business growth with its digital ecosystem, data and technology capabilities, and business methodologies. Alibaba wrapped these tools, methods, and capabilities […].

article thumbnail

How to change the HTTP listening port in Apache

Tech Republic Security

If you find port 80 is a security risk on your network, you can change the Apache listening port to something non-standard.

How To 130
article thumbnail

Future Returns: How to Invest in Industrial Internet of Things

CTOvision

Read Rob Csernyik’s article about how to invest in the Industrial Internet of Things on Barrons : Smart home products like Google Nest, Ring, and smart refrigerators have kept consumers ahead of the curve of the Internet of Things (IoT), which refers to the interconnection of everyday objects via the internet. As household and commercial […].

Internet 152
article thumbnail

5 important tasks for G Suite administrators

Tech Republic Cloud

Review your organization's G Suite settings to ensure they reflect company user, device, and app needs.

Company 135
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI is transforming fraud detection in FSI

Forrester IT

I believe most people who own credit cards have experienced fraud or false positives (non-fraud transaction declined), so did I. Three months ago, I have experienced an overseas credit card fraud with amount around 3,000 USD and my bank is still investigating the case now. What gave me a deeper impression was the complicated procedures […].

Banking 239
article thumbnail

Leveraging assets: Walmart's new venture has lessons for us all

Tech Republic Data Center

Your best competitive asset might just be the one you already own. Walmart is using edge computing to compete against Amazon with data centers. Could your company use its assets to try something new?

article thumbnail

Research Report: How Data Breaches Affect the Enterprise

CTOvision

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading’s annual Strategic Security Survey, […].

article thumbnail

How to gather feedback with a Google Site

Tech Republic Cloud

Learn five ways to assemble information via a Google Site in this tutorial.

Google 149
article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.

article thumbnail

PayPal officially enters China: Challenges vs Opportunities

Forrester IT

A week ago before Christmas, PayPal has officially finished its acquisition of a Chinese licensed payment company GoPay, a deal has started since the end of September. This deal signals PayPal’s official entry to China’s domestic payment market and made it the first foreign payment company to own the domestic payment license. I have followed […].

Licensing 221
article thumbnail

10 Tips for the Localization of Your Content in 2020

Galido

Information Technology Blog - - 10 Tips for the Localization of Your Content in 2020 - Information Technology Blog. Modern business has the best chance of growing to a global level. Never before has it been so easy to connect people from all over the world with leading brands using online technologies, and never before has it been so easy to give them the experience they want – with the help of developed logistics and delivery systems.

article thumbnail

How the Humanities Can Help Us See What's Next in Tech

Information Week

Skills like communication, observation, empathy and logical thinking are key for developing the next-gen of leadership and equipping employees for the future.

article thumbnail

3 security tips to protect yourself from skimming attacks

Tech Republic Security

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice.

article thumbnail

Next-Gen Procurement: Transforming Processes with the Power of Generative AI

Generative AI goes beyond just automating tasks and providing real-time answers. Did you know that implementing generative AI reduces sourcing cycle times and allows for faster decision-making across procurement operations? In this whitepaper — Next-Gen Procurement: Transforming Processes With the Power of Generative AI — experts reveal how the strategic application of generative AI within procurement processes is paving the way for groundbreaking improvements.