This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Every job, from nursing to manufacturing, is becoming more tech-focused, increasing the demand for workers who can blend technical expertise with industry-specific skills,” said Dave Treat, chieftechnologyofficer at Pearson, in a statement. “As
Let’s review a case study and see how we can start to realize benefits now. Agentic AI design: A case study When you start doing agentic AI design you need to break down the tasks, identify the roles and map those to specific functionality that an agent will perform. Do you know what the user agent does in this scenario?
As they embark on their AI journey, many people have discovered their data is garbage, says Eric Helmer, chieftechnologyofficer for software support company Rimini Street. Two thirds of the organizations included in the study of over 1,200 either dont have the right data management practices for AI or are unsure if they do.
The average large enterprise lost $104 million to digital inefficiencies in 2024, driven by productivity losses connected to employee IT frustrations and hundreds of ghost apps flying under the radar, according to a new study. Meanwhile, many enterprise employees turn to unauthorized apps and software to do their jobs, the study says.
Guest Speaker: Bob Gourley, CTOVision Publisher and Crucial Point Founder and ChiefTechnologyOfficer Bob Gourley is the publisher of CTOvision.com and is the founder and ChiefTechnologyOfficer (CTO) of Crucial Point LLC, a technology research and advisory firm where he leads efforts in due diligence assessments and strategic consulting.
“By enabling GPU sharing between multiple jobs, we achieved a remarkable near 10% reduction in overall execution time compared to running jobs sequentially on two GPUs,” observed Hisashi Ito, CTO of Morgenrot, in a press statement.
Coca-Cola was used as a case study. Ed Steinike , the CIO at Coca-Cola, and Bob Flores , the former CTO of the Central Intelligence Agency (CIA) and a partner at our parent firm Cognitio were the key presenters. One of the many topics coved at the event was software defined perimeter and cloud security alliance. legalzoom.com).
Guest Speaker: Bob Gourley, CTOVision Publisher and Crucial Point Founder and ChiefTechnologyOfficer Bob Gourley is the publisher of CTOvision.com and is the founder and ChiefTechnologyOfficer (CTO) of Crucial Point LLC, a technology research and advisory firm where he leads efforts in due diligence assessments and strategic consulting.
That’s according to a new study of enterprise cloud usage by 451 Research, which also looked at what enterprises are running across multiple public clouds, and how they measure strategy success. The study also asked enterprises what key outcomes they expected from a multicloud management platform.
Some studies tout major productivity increases , while others dispute those results. The future is now Even with some issues to work out, and some resistance from developers to AI coding assistants, AI-native coding is the future, says Drew Dennison, CTO of code security startup Semgrep. Gen AI tools are advancing quickly, he says.
Generative AI is increasingly being put into production, survey author Randy Bean and Tom Davenport, professor of IT and management at Babson College, observed in this year s study. Last year, only 5% of respondents said they had put the technology into production at scale; this year 24% have done so. Most (85%) were in North America.
However, only around a third of them actively measure both, according to a recent study by revenue intelligence leader Gong, which surveyed over 500 IT leaders and CIOs across the US and UK. This presents a significant challenge because AIs value is often multifaceted and evolves over time, says Eric Helmer, CTO at Rimini Street.
When I joined Capitec in April 2022 as CTO, the first thing I wanted to find out was whether there was a zero trust strategy in place. Learn more about Capitec’s implementation of the Zscaler Zero Trust Exchange by reading the case study. It doesn’t get any better than that!
Few would swap sunny San Francisco and the innovation of Silicon Valley for a train ticketing company serving disgruntled UK commuters, but try telling that to Trainline CTO, Milena Nikolic. For example, she says that an iOS developer could learn eCommerce, or a web developer could study back-end infrastructure.
She previously worked at Iron Mountain, where she was Executive Vice President and CTO. She co-founded Trend Micro in 1988 and has been leading the company ever since; first as executive vice president, CTO in 1996, and CEO since 2005. She has worked in media, communications, and networking industries.
The group recently completed a study on AI automation for the NOC that has not yet been publicly released. Mark Berly, CTO, data center networking at Aruba, a Hewlett Packard Enterprise company, noted that things like zero touch provisioning have expanded the use of automation in recent years.
Michael Beckley, CTO and founder of Appian, says document processing is a boring gen AI use case with significant business potential. Even simple contracts like non-disclosure agreements can require 30-day turnarounds, according to a Bloomberg Law study. Why should CIOs bet on unifying their data and AI practices?
The DOE cybersecurity team hosted its first cohort of eight students, five assigned to the CISO team and three assigned to the CTO team. Interns complete a curriculum for a minimum of three technical certifications in areas of their choice and build relationships with technology vendors like Zscaler. Read the case study.
The 2024 Security Priorities study shows that for 72% of IT and security decision makers, their roles have expanded to accommodate new challenges, with Risk management, Securing AI-enabled technology and emerging technologies being added to their plate.
“Legacy systems — especially core systems in such key areas as human resources, finance, and sales — start to creak and just can’t keep pace with evolving business needs,” says Alex Galbraith, CTO for cloud services at cloud services provider SoftwareOne. He recommends building a user feedback loop and carefully studying satisfaction metrics.
We also provide a library of white papers and studies curated for the enterprise technology consumer. These include research produced by our staff and also other reputable sources we select for relevance for the technology mission.
Yet unlike his peers, Wiedenbeck’s dual roles — the top technology executive as well as the transformation lead at Ameritas — are often at odds. As chieftechnologyofficer, Wiedenbeck is driving automation and IT modernization to reduce complexity and technical debt.
Weve developed our own agentic AI for code management, says Charles Clancy, CTO at Mitre. The key challenge in our area is there are hundreds of tasks that might not be particularly well automated, says CTO Paul Gaskell. But there are already some jobs specifically in the software development lifecycle poised to be aided by AI agents.
CTO Cyber Security Cyber Threats DoD and IC Government Strategy' The incursions spurred a debate in the Obama administration over whether and how to respond, and raised alarms among lawmakers briefed on the incidents. Read more at: UglyGorilla Hack of U.S. Utility Exposes Cyberwar Threat.
Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “Net Threats”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.
Shamim Mohammad, EVP and chief information and technologyofficer at CarMax , will present a case study on how the cloud enables the company’s signature “Instant Offer” feature. Priceline ChiefTechnologyOfficer Marty Brodbeck will share how the online travel agency sped up its cloud native software production.
Many developers say AI coding assistants make them more productive, but a recent study set forth to measure their output and found no significant gains. Use of GitHub Copilot also introduced 41% more bugs, according to the study from Uplevel, a company providing insights from coding and collaboration data.
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software The information technology that enables scientific and commercial breakthroughs, from precision medicine to digital transformation, demonstrates tech’s boundless potential to improve our world.
Faced with the difficulty of attracting talent, the CIO must study the market and offer flexible working conditions to candidates. But another fundamental factor of attraction and retention is offering a technologically compelling project. Work flexibility is truly the most requested and appreciated benefit.”
We intend this to be a reference which enterprise CTOs and others can consult with to learn of the most powerful/virtuous assistive technologies. We would very much appreciate your help in our study. Analysis CTO' You can send us a Tweet , ping us on LinkedIn or Facebook , or use the form at this link (preferred).
All who track DoD technology issues have been waiting way too long to see DoD to capitalize on the benefits of Cloud Solutions. This topic has been studied for years (see, for example, DSB Report on Cyber Security and Reliability in a Digital Cloud). Building on years of work, Ms. Please sign up today at CTOvision Pro.
Analysis Analytical Tools Big Data CTO Cyber Security DoD and IC Gov2.0 For example, the rapid pre-publication of the data from the Human Genome Project , including from research centers in government, academia, industry and internationally, was responsible for the rapidity with which this ground- breaking effort was accomplished.
Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.
Women drive equality in conversations One interesting study found that in working groups of two to five individuals, groups that had more women usually had more “equality in distribution of conversational turn-taking.” This isn’t just about taking turns.
Coordinator, Strategy & Intelligence Studies. Former President of INSA and Founder of Potomac Institute for Policy Studies. ChiefTechnologyOfficer. Principal and CTO, Global Consulting Technology. Director Program Management Office. Office of Personnel Management. Dr. Randy Borum.
The information in the report can help drive strategic planning for enterprise technologists and members of the enterprise cyber security team and it is well worth a read by any CTO, CIO, CISO and most other members of enterprise technology teams. Background: - The point of this report is to support evidence-based risk management.
Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.
He recently published a study analyzing public opinion toward the Kill Switch. However, for many techies, its implications for cyber insecurity make the technology a hard sell. CTO Cyber Security Mobile California Creighton University CTIA Kill Switch Mobile phone Smartphone United States William Duckworth'
For example, developers using GitHub Copilots code-generating capabilities have experienced a 26% increase in completed tasks , according to a report combining the results from studies by Microsoft, Accenture, and a large manufacturing company.
Tyrone Grandison, chieftechnologyofficer for Pearl Long Term Care Solutions. Tyrone Grandison started his career path in math, economics and computer engineering, studying at universities in Jamaica, the West Indies and London and earning multiple degrees that culminated in a PhD in computer science.
The collaboration includes a multiphase research study using a new big data analytics platform that detects patterns in participant data collected from wearable technologies used to monitor symptoms. Bret Parker, 46, of New York, is living with Parkinson’s and participated in the study.
You’ll learn business applications of data technologies by dissecting case studies, develop new skills through in-depth tutorials, share emerging best practices in data science, and build the future of your business. Hadoop in Action Delve into real-world case studies of the Hadoop ecosystem in action.
Zuckerberg envisions virtual reality facilitating study groups, doctors visits, and calling your mother, with gaming – the most common current application of the technology – eventually taking the backseat. CTO Gadgets Facebook Mark Zuckerberg Markus Persson Minecraft Oculus VR Reddit Virtual reality WhatsApp'
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. Last summer, a faulty CrowdStrike software update took down millions of computers, caused billions in damages, and underscored that companies are still not able to manage third-party risks, or respond quickly and efficiently to disruptions.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content