Sat.Jan 12, 2019 - Fri.Jan 18, 2019

article thumbnail

How do you talk to your boards about cybersecurity? An old problem in a new world

Forrester IT

Talking to our firms’ Board of Directors about security isn’t a new responsibility for most security leaders, it’s been on our collective agenda’s for many years. And yet, many security leaders still second guess the content and messages they share with their Board.

Security 378
article thumbnail

The Data Mining Trap

Eric D. Brown

In a post titled Data Mining – A Cautionary Tale , I share the idea that data mining can be dangerous by sharing the story of Cornell’s Brian Wansink, who has had multiple papers retracted due to various data mining methods that aren’t quite ethical (or even correct). Recently, Gary Smith over at Wired wrote an article called The Exaggerated Promise of so-called Unbiased Data Mining with another good example of the danger of data mining.

Data 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Artificial Intelligence Systems Can be Fooled

CTOvision

Read why Nidhi Singh says that artificial intelligence systems have their own severe limitations on Entrepreneur : Despite all its benefits and the ease that technology has brought in, the fear that new-age technologies like artificial intelligence (AI), machine learning and robotics would displace human jobs still looms. However, some researchers don’t agree with the idea that […].

article thumbnail

Windows 10 Version Numbers & Build Numbers

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, I will try to keep the Windows 10 version Numbers and Windows 10 build numbers. There was many issues about Windows 10 upgrades and quality of upgrades. There are less number of hotfixes released in the latest versions of Windows 10. So Windows 10 quality is getting stabilized with new versions.

Windows 167
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

What I See Coming For The Channel In 2019

Forrester IT

We have seen more disruption in the channel in the past 18 months than we saw in the past 37 years combined. As a review, here were my 2018 predictions. 1. Private equity will continue its sweep of the channel software space, creating some unicorns along the way. Verdict: As mentioned in the […].

Software 418
article thumbnail

Foto Friday - Rocky Mountain National Park

Eric D. Brown

Late last year I had the opportunity to spend a week in Rocky Mountain National Park (RMNP).  Strangely, I’d never actually been to RMNP although I’ve been just about everywhere else around RMNP. The trip was part of a trip to nearby Denver for a conference so I didn’t get as much time to spend in the park and surrounding areas as I’d wanted to, but I did spend every morning in the park for sunrise – and loved every second that I had there.

Cloud 130

More Trending

article thumbnail

SCCM Management Pack – How to Fine Tune SCOM Alerts

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. SCOM alerts for SCCM components are always a pain point for the operation team. SCCM alerts are a bit noisy as per most of SCCM support teams. I heard from SCOM admins that they wouldn’t prefer to install and enable SCCM Management Pack in the SCOM environment mainly because of the number of alerts which […].

How To 166
article thumbnail

It’s Time To Mainstream ABM

Forrester IT

When account-based marketing (ABM) burst onto the scene in 2015, it was positioned by a number of vendors as the death of traditional marketing. And while that controversial approach might have been great for creating buzz and drawing attention, it created significant confusion for the mainstream B2B marketer. It’s taken a couple of years to […].

B2B 405
article thumbnail

The Data Mining Trap

Eric D. Brown

In a post titled  Data Mining – A Cautionary Tale , I share the idea that data mining can be dangerous by sharing the story of Cornell’s Brian Wansink, who has had multiple papers retracted due to various data mining methods that aren’t quite ethical (or even correct). Recently, Gary Smith over at Wired wrote an article called The Exaggerated Promise of so-called Unbiased Data Mining with another good example of the danger of data mining.

Data 130
article thumbnail

How Do I Know If My Email Has Been Leaked in a Data Breach?

CTOvision

Read Emily Gray-Fow explain how you can know whether your email has been leaked in any data breach on Business2Community : Many people use their email addresses and a small set of passwords (or even just one password) to log in to their online accounts. Unfortunately, this means that any hacker with your email address […].

Data 213
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

SCCM MSIX App Deployment Guide to Deploy 7Zip.MSIX

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. I have shared my experience with MSI to MSIX conversion process in the previous blog post. In this post, you will learn how to create SCCM MSIX app deployment. [Related Post – SCCM MSIX Conversion Process 13 Steps Guide] How to Convert MSI packages to MSIX? Microsoft MSIX is future of Windows application installation technology. […].

How To 165
article thumbnail

CES 2019 Delivers Dazzling Tech But Disappointing Experiences

Forrester IT

I spent this week in Las Vegas at CES to check out the latest and greatest technology wonders, ranging from 3D printing, AI, and cryptocurrency to drones, autonomous vehicles, dancing robots, and wearables. A lot of what I saw has broad CX implications for accessibility, healthcare, and more.

3D 402
article thumbnail

First step to becoming a hacker: Linux!

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb , the force behind Hackers-Arise , Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the

Linux 167
article thumbnail

What Financial Services Executives Need To Know About Data Security

CTOvision

Read why financial services executives need to know about data security on Forbes : The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. It’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of […].

Financial 213
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

SCCM Mac Management – A Good Idea?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Mac devices should be managed in an enterprise environment. How do you want to manage Mac devices? How many of IT admins are familiar with Mac support skills? SCCM Mac Management is good for an enterprise environment? Read on to get more details! Lite Vs Full SCCM Mac Management?

article thumbnail

Gillette’s Close Shave: Its Latest Ad Is A Masterful Emotional Play Let Down By Its Execution

Forrester IT

Gillette’s Close Shave: Its Latest Ad Is A Masterful Emotional Play Let Down By Its Execution Brands are jumping into the messy arena of polarizing issues with greater fervor – and Gillette just raised the stakes. After 30 years of sitting on the sidelines, Gillette is passing its razor like a baton with an overture […].

article thumbnail

Top 10 IoT vulnerabilities

Network World

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.

Internet 165
article thumbnail

Phishing scams keep getting smarter, making them difficult to spot

CTOvision

It’s a sad reality that phishing scams are becoming increasingly sophisticated, often making it hard for even savvy users to differentiate between legitimate messages and ones designed to abscond with sensitive personal and financial information. Just a few days ago, for example, we covered an iPhone phishing scam that manages to trick users into thinking […].

Financial 206
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

How to Capture and Manage Technical Debt in Agile Development

Social, Agile and Transformation

If you're concerned about the technical debt accumulated by your organization, then consider developing ways to capture and measure it. In my last post, I suggest teams should target nimble architectures and leverage agile principles that enable iterating on the design. Don't plan to get it perfect, plan to get it wrong, iterate on what you learn, and recognize when the business is.

Agile 133
article thumbnail

Gillette’s Biggest Mistake — And How To Fix It

Forrester IT

This video gives a 2 minute summary of the biggest mistake Gillette has made with the “We Believe” campaign, and what the brand can do now to fix it. If you want more comprehensive guidance on how to manage a crisis, read the report I wrote with my colleague, Emily Collins: Brands Forget The Rules of Modern Marketing When Crisis […].

How To 372
article thumbnail

Quantum-embedded chips could secure IoT

Network World

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.

Security 162
article thumbnail

Why the Internet of Things is Taking Over the Markets

CTOvision

Read why Dr. Saarthak Bakshi says that the Internet of Things connected devices are slowly taking over the markets on Entrepreneur : The technological innovations and newness in the businesses have been suffering an amplified transformation. These originality and freshness experienced in technology is undoubtedly a boon and is a host to several opportunities for the […].

Internet 196
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Retail is Advancing AI, IoT

Information Week

Combining computer vision, IoT, and AI creates a system that delivers more value than those three technologies in isolation, as the retail industry is highlighting.

Retail 152
article thumbnail

Gillette Just Admitted That It Has No Values

Forrester IT

I’ve held off blogging about Gillette’s “We Believe” campaign, as there are plenty of pundits praising and trashing its strategy, execution, and use of the term “toxic masculinity.

Social 359
article thumbnail

Foto Friday – Rocky Mountain National Park

Eric D. Brown

Late last year I had the opportunity to spend a week in Rocky Mountain National Park (RMNP). Strangely, I’d never actually been to RMNP although I’ve been just about everywhere else around RMNP. The trip was part of a trip to nearby Denver for a conference so I didn’t get as much time to spend in the park and surrounding areas as I’d wanted to, but I did spend every morning in the park for sunrise – and loved every second that I had there.

Cloud 113
article thumbnail

How To Protect Your Data From Insider Threats

CTOvision

Read Brett Hansen explain how you can protect your data from insider threats on Forbes : If you’re not a government agency or high-profile brand, insider threats may not rank highly on your list of concerns right now. After all, employees have very little to gain and a lot to lose by sharing your sensitive data […].

Data 184
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Predictions: 2019 Data Science Jobs Market

Information Week

Take a look at the forces shaping the job market for data scientists and AI experts, according to a leading quantitative executive recruitment specialist.

Data 145
article thumbnail

My Top NRF 2019 Takeaways (AKA, News Vs. Nonsense)

Forrester IT

I say this as both an analyst and a recovering retail professional: NRF is like drinking Red Bull. from a 50′ beer bong. for three days straight. on Jupiter.

Retail 369
article thumbnail

First step to becoming a cybersecurity pro: Linux

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from No Starch Press was written with people like you in mind. Authored by OccupyTheWeb, Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali provides everything from basic Linux command-line skills through to scripting, manipulating logging, network scanning, using and abusing system servi

Linux 113
article thumbnail

How to protect backups from ransomware

CTOvision

Read Maria Korolov’s article about how you can protect your backups from ransomware on CSO Online : Despite a recent decline in attacks, ransomware still poses significant threats to enterprises, as the attacks against several major newspapers demonstrated this month. It is also becoming more capable. In particular, ransomware writers are aware that backups are […].

Backup 184
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.