July, 2018

article thumbnail

Accuracy and Trust in Machine Learning

Eric D. Brown

A few weeks ago, I wrote about machine learning risks where I described four ‘buckets’ of risk that needed to be understood and mitigated when you have machine learning initiatives. One major risk that I *should* have mentioned explicitly is the risk of accuracy and trust in machine learning. While I tend to throw this risk into the “Lack of model variability” bucket, it probably deserves to be in a bucket all its own or, at the very least, it needs to be discussed.

Training 124
article thumbnail

Seeking Magic Moments – Why It’s Time to Tune Up Your Digital Experience Stack

Forrester IT

The legendary R&B singer and songwriter Ben E. King got it so right in the Drifters 1960 recording of “This Magic Moment.” The song is timeless because it tells a classic tale of a first kiss. And also captures a moment in time in words and song that reminds us of the power of storytelling, […].

B2C 790
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 must-have skills of modern web application developers

mrc's Cup of Joe Blog

Summary: Web application development is quickly becoming more complex. It requires an ever-increasing, and ever-evolving skill-set. What skills must modern web application developers now possess? We explore the top 6 in this article. photo credit: geralt via pixabay cc In the past, application development had more of a specialized focus. Programmers focused on a single language (like COBOL, RPG, C++, etc.), and built applications with that language.

article thumbnail

Smart Cities Cybersecurity Challenge

CTOvision

Smart Cities will become a full-scale cyber war battleground unless Congress mandates cybersecurity. The biggest danger in Smart Cities is the assumption that IoT sensors communicating over a 5G fabric to Machine Learning and Blockchain systems will be safe from cyberattacks. To the contrary Smart Cities suffer from all the cyber vulnerabilities we have today [.].

System 343
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

What is Data Governance? Data practices that address risk and drive opportunities

Social, Agile and Transformation

I don't like the term 'data governance'. People - and especially leaders don't know what it means and often put up mental walls whenever they hear the word 'governance'. Governance is bureaucratic. It slows organizations down and creates tension. Why would anyone want to back a governance initiative especially one tied to data? But anyone leading data efforts knows data governance is a long.

article thumbnail

Learning How to Learn SCCM Intune Azure

Anoop

I still get many queries similar to “How to Start Learning SCCM Intune Azure” or “How to Learn Intune” or “How to become an expert in SCCM” or “What is the future of SCCM/ ConfigMgr”. I didn’t do much research on these topics. So my opinions could be wrong. In this post, I will provide some […]. The post Learning How to Learn SCCM Intune Azure appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 162

More Trending

article thumbnail

Five Myths Of Digital Transformation

Forrester IT

Since I first wrote about digital transformation back at the end of 2012, the term has become wildly overhyped. Since CEOs are now at least asking about digital transformation, and every technology vendor now claims expertise in digital transformation, it’s time to burst a few of the myths surrounding digital transformation. But first, let’s recap […].

Strategy 348
article thumbnail

CIOs Need To Know: Will AI Be A Good Or A Bad Thing For Their Company?

The Accidental Successful CIO

Sure AI is powerful, but can it be too powerful? Image Credit: A Health Blog. As the person with the CIO job, it is our responsibility to stay on top of all of the new technology that is out there because we understand the importance of information technology. Our goal has to be to understand how the new technology works and to determine whether or not it can be useful for our company.

Company 140
article thumbnail

Blockchain in Plain English

CTOvision

We hear a lot about Blockchain these days, but how many people know what it's really about? In an attempt to make this definition as simple as possible, blockchain automates trust. It’s a software architecture that allows non-trusting parties to record transactions without requiring a trusted governing authority. In other words, it does away with [.].

article thumbnail

How to Prioritize DevOps Practices and What Applications to Apply Them

Social, Agile and Transformation

I'm not your typical DevOps evangelist. I don't believe continuous deployment is right for every business as it requires significant technical maturity to enable this level of automation. It's far more important for organizations to align their release management practices to business need and then prioritize the work on CI/CD that reduces the most manual, risky efforts tied to integrating.

Devops 153
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Fix – CMG Client Communication Failure Error 0x87d0027e

Anoop

Cloud Management Gateway (CMG) is the most talked feature these days as it became a full release feature from SCCM CB 1802 onwards. If you are looking for the deployment steps, CMG Client communication post is not the right post and you can check the detailed tutorial by Anoop on this here. Content SCCM CMG […]. The post Fix – CMG Client Communication Failure Error 0x87d0027e appeared first on SCCM Intune Real World Enterprise Experience Blog by Rajul OS.

Cloud 138
article thumbnail

While no one was looking, California passed its own GDPR

Network World

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance. Well, there is no weaseling out now.

Data 133
article thumbnail

Introducing the Forrester Automation Framework

Forrester IT

It is impossible to overstate the impact automation has on digital transformation. Automation directly impacts customer experience (CX). Software like Reflexis can automate price checks and cut customer wait times by 80%. Robots like Lowesbot can guide customers to the proper aisle to pick up home goods. Automation contributes directly to your bottom line.

article thumbnail

Google Chrome Installation One-Liner

Mick's IT Blog

Instead of wanting to keep up with the latest Google Chrome installers, I wanted to create a one-liner that can download Chrome from the Google URI and then silently install it in the reference image build process. This one-liner does just that. It will download the latest Chrome version and install it. This means you no longer have to take time keeping up with the latest installer and the code is compacted down to a one-liner so it is only in the task sequence.

Google 26
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Technologies To See At DoDIIS

CTOvision

The DoDIIS Conference is almost upon us. August 12-15, 2018, members of the defense intelligence community will gather in Omaha for several days to listen to the latest in mission needs and requirements from key government leaders and to witness demonstrations of cutting edge IT on a very well attended expo floor. If you have [.].

article thumbnail

CIOs Learn To Deal With Quantum Computers

The Accidental Successful CIO

Quantum Computers have almost arrived, now what? Image Credit: Steve Jurvetson. So just exactly what does any of us know about the field of quantum mechanics? If you’ve done some science fiction reading, then by now you probably know that quantum mechanics talks about a particle can exist in more than one state all at the same time. Additionally, there is the property that Einstein called “spooky” where quantum particles are able to communicate with each other over vast distanc

article thumbnail

Go – On The Shoulders of Giants

SPF13

This presentation was developed for Curry On and delivered as the closing keynote of the conference. The presentation describes the many inspirations and influences of the Go programming language and goes into detail about how we shaped and created the language.

article thumbnail

What are the options for securing SD-WAN?

Network World

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows. SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. [ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ].

WAN 121
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Empower Autonomous Teams To Accelerate Digital Delivery

Forrester IT

The need for speed has never been greater. Empowered customers are fickle. Big tech is disintermediating you. Disruptors lurk in the darkest corners of your markets, ready to rise kraken-like to swallow your floundering ship whole. Your prospects are bleak. A depressing way to end the week? Perhaps not. Speed of execution is more vital […].

article thumbnail

Windows Enrollment Status Screen Troubleshooting

Anoop

Intune Enrollment status screen (or page) is new to some of us. Enrollment status page policy is a global policy and once enabled it’s applicable for all the users. I hope Microsoft will give us options to deploy different enrollment status screen policies to a different set of users. In this post, we will see […]. The post Windows Enrollment Status Screen Troubleshooting appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Windows 121
article thumbnail

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure

CTOvision

The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. We believe this webinar will be of interest to technical teams operating [.].

article thumbnail

The Lottery Run on Blockchain

Galido

Information Technology Blog - - The Lottery Run on Blockchain - Information Technology Blog. ETH93 is a lottery game running off the Ethereum blockchain. Every day, a lottery is held, and a random number is generated to determine the winner. The smart contract behind ETH93 is completely transparent, unlike other lotteries in which users have no idea what happens to their money.

Internet 113
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Digital Maturity or Digital Transformation?

Eric D. Brown

Everyone’s working on digital transformation projects. Much like ‘big data’ or ‘machine learning’, digital transformation is a phrase that you hear every day across just about every organization. The problem with digital transformation is that its not the end goal… you don’t set a goal of ‘being transformed’ especially when you’re looking at the digital space.

Survey 113
article thumbnail

The aftermath of the Gentoo GitHub hack

Network World

Gentoo GitHub hack: What happened? Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going on, 7 minutes later a report was sent, and within 70 minutes the attack was over.

Analysis 120
article thumbnail

Real-Time Customer Experience

Forrester IT

When I first saw buttons at Heathrow that let travelers give instant feedback on how they were feeling, I laughed. Measuring and refining customer experience is about long-term strategy, not raw takes on what’s happening now. I was wrong. Forrester’s Customer Experience Index shows that most companies are stuck at “poor” or “very poor” levels […].

Travel 315
article thumbnail

Fix – SCCM 1802 Known Issues

Anoop

Microsoft released a couple of update rollups and hotfixes for the latest production version of SCCM 1802. In this post, we will see the SCCM 1802 known issues and how to fix those known issues. The Video tutorial will help you to understand which update rollup you want to install in your SCCM 1802 environment and […]. The post Fix – SCCM 1802 Known Issues appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 120
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

What Is DNSSEC and Why Is It Important?

CTOvision

Meta description: DNSSEC is an essential part of modern enterprise DNS security. We discuss how DNSSEC contributes to security and privacy for your business, its communications, and its customers. What Is DNSSEC and Why Is It Important? The Domain Name System (DNS) is responsible for converting URLs like www.example.com into IP addresses like 192.0.2.123.

Security 186
article thumbnail

How Can CIOs Help Their Company Modify Its Products For Unique Customers?

The Accidental Successful CIO

Some customers require the company to change its products Image Credit: 10ch. A CIOs focus is more often than not on the internal workings of the company. We spend our time using the importance of information technology to try to figure out how more things within the company can be automated or how we can keep the bad guys out. However, in this day and age in which we are living, there is a new role that is being thrust upon the person with the CIO job.

Company 113
article thumbnail

???Go, a global phenomenon (????)

SPF13

This presentation was given in ??? China, July 2018 as part of the InfoQ ArchSummit conference. It covers why Go was created and it’s impact across the globe.

article thumbnail

REVIEW: Best VPN routers for small business

Network World

When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation. We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each unit and weighing the relative merits of their price, features and user-friendliness. [ Learn who's developing quantum computers.].

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.