Sat.Sep 16, 2017 - Fri.Sep 22, 2017

article thumbnail

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […].

article thumbnail

How to make the right technology choice

Computer Weekly

Organisations need digital technology, but how do you decide which is the best technology for you? The answer is not to make one big decision, but many small ones.

How To 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Seven Ways ERP Can Improve Risk Mitigation

IT Toolbox

Business is no friend of risk. While fortunes are won and new markets are conquered through calculated risk, firms nonetheless try to avoid it whenever possible. Risk represents lost revenue, disrupted partnerships, idle equipment, brand damage and a host of other effects that aren’t typically advantageous to corporations.

200
200
article thumbnail

Is It Time For CIOs To Start To Apply Logic To Salaries?

The Accidental Successful CIO

Should CIOs get involved in determining how much employees get paid? Image Credit: 401(K) 2012. Psst – would you like to know a secret? It turns out that at most companies, how much any given employee gets paid is determined more by art than science. Yes, that’s right – most firms (and their IT departments) are making this stuff up on the fly.

Survey 147
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Want to Learn Big Data? These Courses Can Help

CTOvision

One of the best things about the explosion of different kinds of technology across the world, is the fact that many tech-related courses can be easily accessed. Whether you are looking to build your knowledge about big data or build a skill that could help you in your job, there are lots of ways to […].

Big Data 242
article thumbnail

Ireland mulls datacentre planning review to help others avoid Apple-like build delays

Computer Weekly

Speaking at the inaugural Datacloud Ireland event, Irish state minister Patrick Breen outlined the government’s commitment to helping other datacentre operators avoid the planning problems Apple has encountered in Athenry

Apple 227

More Trending

article thumbnail

Data Quality – The most important data dimension?

Eric D. Brown

In a recent article I wrote over on CIO.com titled Want to Speed Up Your Digital Transformation Initiatives? Take a Look at Your Data , I discuss the importance of data quality and data management in an organization’s digital transformation efforts. That article can be summarized with the closing paragraph (but feel free to go read the full version): To speed up your transformation projects and initiatives, you need to take a long, hard look at your data.

Data 147
article thumbnail

Time For A Fourth Law of Robotics

CTOvision

Science fiction fans recognize Asimov’s prescient thoughts on robot programming, captured in his three laws of robotics. In Asimov’s sci-fi world, robots were all programmed to protect their humans (the first law), to obey their humans (the second law) and to protect themselves (the third law). These laws laid the foundation for many fantastic, futuristic […].

article thumbnail

ScotRail to test ‘world’s fastest’ in-train Wi-Fi service

Computer Weekly

The train operator has teamed up with Cisco, Network Rail Telecoms and others to collaborate on an Innovate UK funded proof of concept for ultrafast Wi-Fi on board

Training 232
article thumbnail

VoIP for a Connected Business

IT Toolbox

Voice over internet protocol (VoIP) has come a long way. Today, this technology allows companies to connect their communication's systems and integrate their computing systems as well, for seamless transactions.

VOIP 166
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network.

Network 153
article thumbnail

Cyber at the Crossroads: A one day symposium on the critical cyber events of 1997 and 1998 that shaped our response to cyber war

CTOvision

There are many challenges in cybersecurity. Most challenges are due to adversaries that continue to innovate and create new means of breaking into systems. But other challenges come from leaders who do not learn the lessons from history. We have called that problem cyber threat amnesia, the observed tendency of any organization to forget the […].

System 169
article thumbnail

Enterprise SDN adoption rapidly approaching tipping point, claims report

Computer Weekly

A study commissioned by networking solutions supplier Riverbed claims that legacy networks are causing problems for businesses trying to undergo digital transformation, and more decision makers are considering SDN as a result

article thumbnail

3 Features LinkedIn Just Added to Help Your Sales Team

IT Toolbox

Top business social network site LinkedIn took a huge leap earlier this year into the customer relationship management (CRM) market with the announcement of its Sales Navigator service. Sales Navigator has multiple features designed to help salespeople use LinkedIn as a social selling platform to boost leads.

Social 150
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Aruba rolls out security fabric designed for IoT and the digital era

Network World

Aruba, a Hewlett Packard Enterprise Company, is best known for its outstanding business-grade Wi-Fi products. What’s less well known about Aruba is that it has always had excellent security products. In fact, I’ve often described the company as a security vendor dressed up as a Wi-Fi vendor, as Aruba and security have gone hand in hand like the New England Patriots and winning.

Security 123
article thumbnail

Last Chance To Register For The Data Event Of The Year: StrataData NYC 25-28 Sep 2017

CTOvision

The yearly Strata Data conference (formerly known as Hadoop World) will be 25-28 Sep 2017. This is the place to be to network with peers, learn lessons from others in the field, and track the status of the greatest technological solutions in the Big Data field. Topics include: AI, Big data & the Cloud, Data […].

Big Data 155
article thumbnail

The Sanger Institute on using datacentre upgrades to help decode the human genome

Computer Weekly

Paul Woobey, IT director at the Wellcome Trust Sanger Institute, tells Computer Weekly why the organisation's HPC workload requirements cannot be fulfilled by a move to the cloud

Cloud 207
article thumbnail

Is It the End of Internet Startups? Or Should We Simply Rethink Our Strategies

IT Toolbox

I don't know about you, but I was one of the guys who grew up viewing Silicon Valley as tech Eden and holding those couple of guys starting companies from their lowly garage or dorm room, only to become tech giants and taking over the world.

Internet 150
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network.

Network 107
article thumbnail

Four Common Password Practices You Might Want To Reconsider

CTOvision

Every few years, the National Institute of Standards and Technology revises its Digital Identity Guidelines, which include password best practices. The revisions are greeted with consternation by some because the guidance can run counter to long-cherished beliefs about what constitutes a good password and a good authentication system. NIST takes into consideration both the theoretical […].

article thumbnail

More than one million new phishing sites created each month

Computer Weekly

Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot

Research 257
article thumbnail

Winning the Clean Data Battle

IT Toolbox

Your database is the most important part of your CRM system but it’s only effective when the entries are correct. Getting them correct and keeping them correct is a never-ending struggle. If not attended to, your database will slowly become corrupted.

Data 140
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft launches data security technology for Windows Server, Azure

Network World

Data is at its greatest risk of being compromised when it is being used, when moving from a secure database around the servers or apps in memory. So, Microsoft is launching a new technology for Windows Server and Azure that protects the data while it’s being processed. Microsoft claims the service, called Azure confidential computing, makes it the first public cloud provider to offer encryption of data while in use.

Microsoft 110
article thumbnail

RFUN: The Recorded Future Annual Threat Intelligence Conference Oct 4-5 2017

CTOvision

The 6th Annual Recorded Future Threat Intelligence Conference will be held 4-5 Oct at the Newseum in Washington DC. This event should be of interest to any threat intelligence professional, specially those in the disciplines of cyber threat intelligence and business risk. From their info site: Recorded Future customers, partners, and threat intelligence experts will […].

article thumbnail

Cyber security demands change in approach

Computer Weekly

There needs to be a change in the way technology is designed and in attitudes to data security to ensure cyber safety, say industry experts

Security 235
article thumbnail

If your Business Architecture framework does not return results follow this

IT Toolbox

Today there is no proper method to model your enterprise, no matter what they say. We haven't seen so far in the public domain models that illustrate the architecture of an enterprise so that you can understand what you would get as EA. Moreover, two different teams would usually return different EA outcomes even if they use the same method, say TOGAF.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Retrieving all Files off of the SpaceMonkey, Now the Vivint Smart Drive

Mick's IT Blog

I purchased the SpaceMonkey back when it first came out. It has been a so-so NAS device that also backed up to the cloud. Vivint bought them out and I ran into real problems when the HDD had failed on the device and the cloud backup was lost during the transition to Vivint. Luckily, I overnighted it to them and they were able to retrieve all contents and back it up to the Vivint drive.

Backup 82
article thumbnail

4 data-driven ways to digitize your business

Dataconomy

In today’s digital landscape, customers expect you to deliver products and services in a fast and efficient manner. Heavyweights like Amazon and Google have set a bar in terms of operations, and they’ve set it high. An increasing need for more streamlined and efficient processes, combined with advancing technologies has. The post 4 data-driven ways to digitize your business appeared first on Dataconomy.

Data 78
article thumbnail

Why AI success depends on IT picking the low-hanging fruit

Computer Weekly

General-purpose artificial intelligence is probably a long way off, but the rapid rate of innovation means off-the-shelf AI can kick-start many projects

article thumbnail

Why Enterprise Architecture is not delivering today

IT Toolbox

The moment we start searching for an Enterprise Architecture (EA)example we begin realising that something is fishy. There is hardly any. Yet, the media abounds in stories about the experiences we had in working towards achieving EA. Some claim success without ever showing an outcome as proof. Trust me they say, but the rest is confidential.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.