July, 2018

article thumbnail

Accuracy and Trust in Machine Learning

Eric D. Brown

A few weeks ago, I wrote about machine learning risks where I described four ‘buckets’ of risk that needed to be understood and mitigated when you have machine learning initiatives. One major risk that I *should* have mentioned explicitly is the risk of accuracy and trust in machine learning. While I tend to throw this risk into the “Lack of model variability” bucket, it probably deserves to be in a bucket all its own or, at the very least, it needs to be discussed.

Training 124
article thumbnail

Seeking Magic Moments – Why It’s Time to Tune Up Your Digital Experience Stack

Forrester IT

The legendary R&B singer and songwriter Ben E. King got it so right in the Drifters 1960 recording of “This Magic Moment.” The song is timeless because it tells a classic tale of a first kiss. And also captures a moment in time in words and song that reminds us of the power of storytelling, […].

B2C 790
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 must-have skills of modern web application developers

mrc's Cup of Joe Blog

Summary: Web application development is quickly becoming more complex. It requires an ever-increasing, and ever-evolving skill-set. What skills must modern web application developers now possess? We explore the top 6 in this article. photo credit: geralt via pixabay cc In the past, application development had more of a specialized focus. Programmers focused on a single language (like COBOL, RPG, C++, etc.), and built applications with that language.

article thumbnail

Smart Cities Cybersecurity Challenge

CTOvision

Smart Cities will become a full-scale cyber war battleground unless Congress mandates cybersecurity. The biggest danger in Smart Cities is the assumption that IoT sensors communicating over a 5G fabric to Machine Learning and Blockchain systems will be safe from cyberattacks. To the contrary Smart Cities suffer from all the cyber vulnerabilities we have today [.].

System 343
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

What is Data Governance? Data practices that address risk and drive opportunities

Social, Agile and Transformation

I don't like the term 'data governance'. People - and especially leaders don't know what it means and often put up mental walls whenever they hear the word 'governance'. Governance is bureaucratic. It slows organizations down and creates tension. Why would anyone want to back a governance initiative especially one tied to data? But anyone leading data efforts knows data governance is a long.

article thumbnail

Learning How to Learn SCCM Intune Azure

Anoop

I still get many queries similar to “How to Start Learning SCCM Intune Azure” or “How to Learn Intune” or “How to become an expert in SCCM” or “What is the future of SCCM/ ConfigMgr”. I didn’t do much research on these topics. So my opinions could be wrong. In this post, I will provide some […]. The post Learning How to Learn SCCM Intune Azure appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 162

More Trending

article thumbnail

Making Journey Maps Useful: CX Measurement Edition

Forrester IT

Of course you should use journey maps to define CX metrics — it’s the only way to define outside-in CX metrics that: Capture important pain or peak points. Measure the right CX drivers. Align operational metrics with customers’ expectations (e.g., how you measure delivery times). But why are only 39% of CX pros using journey maps […].

Course 646
article thumbnail

Go – On The Shoulders of Giants

SPF13

This presentation was developed for Curry On and delivered as the closing keynote of the conference. The presentation describes the many inspirations and influences of the Go programming language and goes into detail about how we shaped and created the language.

article thumbnail

Blockchain in Plain English

CTOvision

We hear a lot about Blockchain these days, but how many people know what it's really about? In an attempt to make this definition as simple as possible, blockchain automates trust. It’s a software architecture that allows non-trusting parties to record transactions without requiring a trusted governing authority. In other words, it does away with [.].

article thumbnail

How to Prioritize DevOps Practices and What Applications to Apply Them

Social, Agile and Transformation

I'm not your typical DevOps evangelist. I don't believe continuous deployment is right for every business as it requires significant technical maturity to enable this level of automation. It's far more important for organizations to align their release management practices to business need and then prioritize the work on CI/CD that reduces the most manual, risky efforts tied to integrating.

Devops 156
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Fix – CMG Client Communication Failure Error 0x87d0027e

Anoop

Cloud Management Gateway (CMG) is the most talked feature these days as it became a full release feature from SCCM CB 1802 onwards. If you are looking for the deployment steps, CMG Client communication post is not the right post and you can check the detailed tutorial by Anoop on this here. Content SCCM CMG […]. The post Fix – CMG Client Communication Failure Error 0x87d0027e appeared first on SCCM Intune Real World Enterprise Experience Blog by Rajul OS.

Cloud 138
article thumbnail

CIOs Learn To Deal With Quantum Computers

The Accidental Successful CIO

Quantum Computers have almost arrived, now what? Image Credit: Steve Jurvetson. So just exactly what does any of us know about the field of quantum mechanics? If you’ve done some science fiction reading, then by now you probably know that quantum mechanics talks about a particle can exist in more than one state all at the same time. Additionally, there is the property that Einstein called “spooky” where quantum particles are able to communicate with each other over vast distanc

article thumbnail

Five Myths Of Digital Transformation

Forrester IT

Since I first wrote about digital transformation back at the end of 2012, the term has become wildly overhyped. Since CEOs are now at least asking about digital transformation, and every technology vendor now claims expertise in digital transformation, it’s time to burst a few of the myths surrounding digital transformation. But first, let’s recap […].

Strategy 348
article thumbnail

Digital Maturity or Digital Transformation?

Eric D. Brown

Everyone’s working on digital transformation projects. Much like ‘big data’ or ‘machine learning’, digital transformation is a phrase that you hear every day across just about every organization. The problem with digital transformation is that its not the end goal… you don’t set a goal of ‘being transformed’ especially when you’re looking at the digital space.

Survey 113
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure

CTOvision

The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. We believe this webinar will be of interest to technical teams operating [.].

article thumbnail

While no one was looking, California passed its own GDPR

Network World

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance. Well, there is no weaseling out now.

Data 133
article thumbnail

???Go, a global phenomenon (????)

SPF13

This presentation was given in ??? China, July 2018 as part of the InfoQ ArchSummit conference. It covers why Go was created and it’s impact across the globe.

article thumbnail

How Can CIOs Help Their Company Modify Its Products For Unique Customers?

The Accidental Successful CIO

Some customers require the company to change its products Image Credit: 10ch. A CIOs focus is more often than not on the internal workings of the company. We spend our time using the importance of information technology to try to figure out how more things within the company can be automated or how we can keep the bad guys out. However, in this day and age in which we are living, there is a new role that is being thrust upon the person with the CIO job.

Company 113
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Empower Autonomous Teams To Accelerate Digital Delivery

Forrester IT

The need for speed has never been greater. Empowered customers are fickle. Big tech is disintermediating you. Disruptors lurk in the darkest corners of your markets, ready to rise kraken-like to swallow your floundering ship whole. Your prospects are bleak. A depressing way to end the week? Perhaps not. Speed of execution is more vital […].

article thumbnail

Cleaning Up and Automating the Backup of Bitlocker Passwords to Active Directory

Mick's IT Blog

Recently, I was reviewing the bitlocker recovery password backups. We still use active directory to store them, and yes, we are planning on moving to MBAM. That is a ways off as we're in the process of the Windows 10, Exchange 2016, and Office 2016 migrations. While looking over the AD backups, I noticed some machines stored multiple recovery passwords due to systems being reimaged and then some had duplicates.

Backup 111
article thumbnail

What Is DNSSEC and Why Is It Important?

CTOvision

Meta description: DNSSEC is an essential part of modern enterprise DNS security. We discuss how DNSSEC contributes to security and privacy for your business, its communications, and its customers. What Is DNSSEC and Why Is It Important? The Domain Name System (DNS) is responsible for converting URLs like www.example.com into IP addresses like 192.0.2.123.

Security 186
article thumbnail

Could Budget Sweeps Fix Your Cybersecurity Problem?

Cloud Musings

A recent roundtable discussion in Washington, DC with Federal IT and Cyber leaders focused on the business drivers, challenges and evolving strategies around cybersecurity in government. After an opening presentation by Jim Quinn, the lead systems engineer for the Continuous Diagnostics and Mitigation program at the Department of Homeland Security, the discussion highlighted the need for data security.

Budget 112
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Fix – SCCM 1802 Known Issues

Anoop

Microsoft released a couple of update rollups and hotfixes for the latest production version of SCCM 1802. In this post, we will see the SCCM 1802 known issues and how to fix those known issues. The Video tutorial will help you to understand which update rollup you want to install in your SCCM 1802 environment and […]. The post Fix – SCCM 1802 Known Issues appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 118
article thumbnail

The Lottery Run on Blockchain

Galido

Information Technology Blog - - The Lottery Run on Blockchain - Information Technology Blog. ETH93 is a lottery game running off the Ethereum blockchain. Every day, a lottery is held, and a random number is generated to determine the winner. The smart contract behind ETH93 is completely transparent, unlike other lotteries in which users have no idea what happens to their money.

Internet 113
article thumbnail

Real-Time Customer Experience

Forrester IT

When I first saw buttons at Heathrow that let travelers give instant feedback on how they were feeling, I laughed. Measuring and refining customer experience is about long-term strategy, not raw takes on what’s happening now. I was wrong. Forrester’s Customer Experience Index shows that most companies are stuck at “poor” or “very poor” levels […].

Travel 315
article thumbnail

Accessing MDT and SCCM Task Sequence Variables

Mick's IT Blog

While rewriting a PowerShell automation script to move machines in Active Directory, I had been trying to pass the MachineObjectOU task sequence variable to the PowerShell script within the command line task sequence. It constantly failed. I finally put in a cmd.exe task sequence to pause the build and allow me to interact directly with the task sequence.

101
101
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

The digital workspace is fundamental to transformation

CTOvision

The digital workspace is shaping the way we will work in the future, providing increasingly flexible work practices. Collaboration is central to its success in the long term, allowing organizations to capture good ideas and exploit efficient work processes. Organizations are today digitizing themselves to meet the needs of a connected world. Providing employees with [.].

Meeting 182
article thumbnail

What are the options for securing SD-WAN?

Network World

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows. SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. [ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ].

WAN 121
article thumbnail

Windows Enrollment Status Screen Troubleshooting

Anoop

Intune Enrollment status screen (or page) is new to some of us. Enrollment status page policy is a global policy and once enabled it’s applicable for all the users. I hope Microsoft will give us options to deploy different enrollment status screen policies to a different set of users. In this post, we will see […]. The post Windows Enrollment Status Screen Troubleshooting appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Windows 117
article thumbnail

5 Ways to Find Insp?ration for Writ?ng a Blog Article or Book

Galido

Information Technology Blog - - 5 Ways to Find Insp?ration for Writ?ng a Blog Article or Book - Information Technology Blog. Do not wait for ?nspiration. It will ?ome in a process. Any creative person knows that there w?ll always be days when inspiration leaves him. It’s good if creativity is just a hobby; in this case, you can wait for the tide of the necessary ideas and emotions.

Film 111
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.