June, 2018

article thumbnail

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale. Outside of well-established use cases – such as risk scoring or optimizing search results – data scientists regularly complain that their solutions can take months […].

Data 389
article thumbnail

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Machine Learning Risks are real and can be very dangerous if not managed / mitigated. Everyone wants to ‘do’ machine learning and lots of people are talking about it, blogging about it and selling services and products to help with it. I get it…machine learning can bring a lot of value to an organization – but only if that organization knows the associated risks.

Data 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When they are attacked, CIOs have to decide how much they want to share Image Credit: Blogtrepreneur. The person with the CIO job, you, is the person who is responsible for securing the company against attacks from outside. We all know that try as we might, we’re not going to be able to prevent the bad guys from trying to break into our networks.

Report 138
article thumbnail

Not all Machine Learning (ML) Is Artificial Intelligence (AI): Part II

CTOvision

No two companies define Artificial Intelligence (AI) the same way, but they all insist they are doing it. Or at least some version of it. However, if AI is to mean something and be a useful term to help delineate different technologies and approaches from others, then it has to be meaningful. A term that [.].

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Beginners Guide SCCM Console Nodes Buttons

Anoop

This is my first post on SCCM Educational post series. I will provide more information about “SCCM Educational post series” in upcoming posts. In case you are a newbie to SCCM then this is the important guidelines for you. The details of SCCM Console nodes or buttons will give you an overall idea UI capabilities. […]. The post Beginners Guide SCCM Console Nodes Buttons appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Education 167
article thumbnail

A one size fits all database doesn't fit anyone

All Things Distributed

A common question that I get is why do we offer so many database products? The answer for me is simple: Developers want their applications to be well architected and scale effectively. To do this, they need to be able to use multiple databases and data models within the same application. Seldom can one database fit the needs of multiple distinct use cases.

More Trending

article thumbnail

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #.

article thumbnail

How Should CIOs Handle Data From Employee?s Wearables?

The Accidental Successful CIO

More data is always better, but what if it’s personal data? Image Credit: Timo Newton-Syms Follow. As the person with the CIO job, you are the one who is responsible for managing all of the data that the company collects. We are all pretty used to what this means. We set up databases, we create backup programs, and we create processes for acquiring, cleaning, storing, and eventually discarding data because we understand the importance of information technology.

Data 147
article thumbnail

Elon Musk, Our Kwisatz Haderach, Cites Frank Herbert

CTOvision

We have written before about how important Science Fiction can be in inspring today’s leaders to conceptualize and create. It is no coincidence that most techies are SciFi fans. Like Ray Bradbury said, "In Science Fiction we dream." And dreaming about the best use of tech is important. It is great validation of the power of [.].

CTO 186
article thumbnail

How to Promote Pre-Production Client to Production

Anoop

This is my second (2nd) post on SCCM education series of posts. Recently I received a couple of queries about the Promote Pre-Production Client on my SCCM 1802 upgrade post. This post is the reply to those queries and doubts about the promotion of pre-production SCCM client. First of all, I would recommend you to […]. The post How to Promote Pre-Production Client to Production appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 152
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Automation critical to scalable network security

Network World

Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) such as Cisco’s Firepower, which is one of the most widely deployed in the industry.

Network 145
article thumbnail

Why AT&T’s Acquisition of AppNexus Is A Big Deal

Forrester IT

The rumors were swirling during the Cannes Lions Festival last week, though I don’t think I expected it to happen so fast. But it did. Yes, AT&T has acquired adtech company AppNexus, in news confirmed today. Here are the headlines, from my point of view: AT&T + Time Warner = plugs and pipes meet content. […].

Meeting 335
article thumbnail

What Drives Agile Teams to Become Agile Organizations

Social, Agile and Transformation

Last week I moderated a panel at nGage's Enterprise Transformation Exchange on Developing an Agile IT Organization: Concepts, Culture and Concerns. The message from panelists was clear. Organizations looking to transform need to go beyond scrum practices and improving IT project execution.

Agile 116
article thumbnail

What Do CIOs Need To Know About Status Battles At Work?

The Accidental Successful CIO

CIOs need to understand that status at work does not follow a formal hierarchy Image Credit: Eugene Kim. When a member of your department does a good job, all of a sudden you find yourself in a difficult position. You’d like to show this individual that they did a good job and that you appreciate it. However, the big question is often how best to go about doing this.

Groups 138
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

The commercial impact of IoT insecurity

CTOvision

Introduction A hacker recently shut down Bycyklen, Copenhagen’s public city bikes system, forcing employees to hunt down and manually reboot the Android tablet attached to every bike. The company said that restoring all bikes to working order would "take some time". Naturally, the costs of restoration will be significant. This is just one example of [.].

Examples 219
article thumbnail

How to Setup Co-Management Video Tutorials

Anoop

I have several posts related to co-management scenarios and implementation. In this post, I have collated all Co-Management Video Tutorials in one place for easy access. All these videos are recorded with SCCM CB 1802 production version. I don’t think I would be able to share all the scenarios. Let me know if you want […]. The post How to Setup Co-Management Video Tutorials appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Video 146
article thumbnail

What happens if IoT security doesn’t get solved?

Network World

Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey , 45 percent of Internet of Things (IoT) buyers say “ concerns about security remain a significant barrier and are hindering the adoption of IoT devices.

Security 144
article thumbnail

Use Text Analytics Technologies To Handle Mountains Of Unstructured Data

Forrester IT

Enterprises are sitting on mountains of unstructured data – 61% have more than 100 Tb and 12% have more than 5 Pb! Luckily there are mature technologies out there that can help. First, enterprise information architects should consider general purpose text analytics platforms. These are capable of handling most if not all text analytics use […].

Data 294
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

How to Correct Posture with Good Desk Ergonomics

Galido

Information Technology Blog - - How to Correct Posture with Good Desk Ergonomics - Information Technology Blog. Greatly improve your desk ergonomics and prevent the strain on your neck, back, and wrists by watching this quick video: Find your natural posture. Scoot your chair away from your desk and sit down comfortably. For many people, it would look a lot like sitting in a car.

How To 113
article thumbnail

CIOs Need To Learn How To Become Futurists

The Accidental Successful CIO

Futurist keep their eyes fixed on what may be coming our way Image Credit: ADiamondFellFromTheSky. I’ve got a quick question for you: how good is your ability to predict the future? If your skill in this area is anything like mine, you find yourself being constantly surprised by things that you simply didn’t see coming. As the person with the CIO job, you really can’t allow this to happen to you.

How To 124
article thumbnail

HBO?s Westworld: The Man In Black is a special kind of Twitter user

CTOvision

HBO’s Westworld is a modern take on the Michael Crichton SciFi tale of a robotic amusement park. The HBO version has a new twist. The creators/writers were all exposed to years of Twitter, which has influenced every episode and the entire arch of two seasons of the show. Now that season two is wrapping up, [.].

article thumbnail

SCCM Configure Settings for Client PKI certificates

Anoop

Setting up Client PKI certificates is one of the essential steps for HTTPs communication from CMG to MP/SUP. In this post, we will see how to complete Client PKI setup task for Co-management scenarios. Once you have Root CA, Client PKI certificates configuration is pretty straightforward. Content of this post Decision Making - Client PKI […]. The post SCCM Configure Settings for Client PKI certificates appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 132
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

SDNs and NFV are complementary and core components of modernized networks

Network World

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both. [ For mo

Network 141
article thumbnail

Customer Experience Trends In China, 2018

Forrester IT

What are the CX trends that will impact customer loyalty and help you build competitive advantage? Look at what China reveals about the future of customer experiences. Until only a few years ago, most CX pros would have scoffed at talks of China as an innovator. But this has changed at breathtaking speed. Today, China […].

Trends 290
article thumbnail

Foto Friday – Trees on Mount Scott, Wichita Mountains Wildlife Refuge

Eric D. Brown

Oklahoma isn’t known for ‘mountains’ but there are a few areas in the state that are actually quite hilly and – officially – called mountains. The Wichita Mountains are in the Southwest portion of the state near Lawton Oklahoma. Within this range is the Wichita Mountains Wildlife Refuge run by the US Fish & Wildlife Service.

22
article thumbnail

SEO for Small Businesses

Galido

It can be difficult for small businesses to fully utilize technological marketing means due to a lack of knowledge or a lack of funds. Either way, this puts small businesses at a distinct disadvantage from larger companies with deeper pockets. The good news here is that there is one digital marketing strategy that any company of any size can use without spending an arm and a leg.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Why Cybersecurity is Looking to AI to Mitigate Business Risks

CTOvision

Malicious cyber attacks against government and private businesses have increased in frequency and severity over past years. Microsoft estimates the potential cost of cyber-crime to the global community at $500 billion and that breaches of data will cost the average company around $3.8 million. The unfortunate truth is that the cybersecurity industry is largely unprepared [.].

article thumbnail

Beginners Guide for SCCM Driver Management

Anoop

SCCM Driver Management strategy is critical for each organization. This post will help you to download an eBook which gives an end to end SCCM driver management guide for beginners in IT Pros world. I don’t have much expertise in OS Deployment (OSD) as I mentioned in my AutoPilot post. Content What are Drivers and […]. The post Beginners Guide for SCCM Driver Management appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

eBook 121
article thumbnail

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Network World

With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016. Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and controlled.

Windows 135
article thumbnail

You Can?t Afford to ?Wait & See? with Emerging Tech

Forrester IT

New C-Suite Must-Read Report: “Tech Innovation Chains Create Breakthrough Opportunities” C-Suite execs responsible for driving business innovations, I highly encourage you to read Brian Hopkins‘ latest report which shows that today’s approach to emerging tech innovation is dead. If you are either investing in single technologies or are waiting for emerging technologies to mature along […].

Report 284
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.