January, 2020

article thumbnail

What are Seven Types of Big Data Debt

Social, Agile and Transformation

As more organizations have embarked on agile software development over the last five years as part of digital transformation programs, the term technical debt is more widely understood. Teams that develop code leave artifacts behind that require improvements, reengineering, refactoring, or wholesale rewriting. Some technical debt is done purposefully to deliver applications faster, while.

Big Data 281
article thumbnail

The Future Of The CISO – Six Types Of Security Leaders

Forrester IT

When starting a project like the Future of the CISO – it’s a daunting exercise. While we don’t always share the background inspiration for our research, this time it’s quite important and will shed some light on how we arrived here. When we started planning this research in 2018 and working on it in 2019, […].

Exercises 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs Need To Get Ready For Continuously Learning Models

The Accidental Successful CIO

CIOs need to prepare for a world where models run everything Image Credit: Bander AlMutlaq. If you are the person with the CIO job, the rest of the company is looking at you for help in making your company more competitive. What this means is that the company needs to always be improving how they do things – they need to become quicker, better, and faster.

Data 147
article thumbnail

3 Expert Questions to Focus on Winning Digital Transformations

Social, Agile and Transformation

About a year ago, around this time a year, I spoke to a CIO about how to best kickoff digital transformation initiatives. His question, "How do I start? How do I find opportunities that will make a business impact and have the potential to drive transformation?" I don't recall the specifics of the call and his circumstances but can answer these questions.

How To 147
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

This One Little Configuration Change Will Make It Harder For People To Steal Your Information

CTOvision

Editor’s note: We are aiming this tutorial at the non-technical person. Please share with anyone in your life who could benefit from this. -bg Cyberspace is a complex domain and our adversaries are always seeking new ways to steal information or spread their malicious code or hold our data for ransom. This is the big reason […].

Data 376
article thumbnail

IIS Troubleshooting Tips for SCCM Admins|MP DP IIS Error Codes

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Really quick one to segregate the IIS HTTP Error Codes which will be useful at time of troubleshooting SCCM/ConfigMgr/MEMCM Management Point and Distribution Point – server related communication issues. In this post you will more IIS Troubleshooting Tips. IIS is integration part of SCCM/Configuration Manager server roles like MP, DP, and SUP.

Windows 218

More Trending

article thumbnail

Guess what? GDPR enforcement is on fire!

Forrester IT

Yes, you read the title of this blog well: GDPR enforcement is on fire! Fines might not always be particularly high, but our analysis shows that – at least in terms of volume – Data Protection Authorities (DPAs) are rapidly increasing their GDPR enforcement activities. And, some interesting trends are also emerging, such as: As […].

Analysis 536
article thumbnail

The Changing Role of IT in the Customer Experience Era

Information Week

The role of IT as just a back-office function within an organization is a thing of the past.

213
213
article thumbnail

Breakthrough Agile Transformation: The Important Leadership Roles

Social, Agile and Transformation

I've written several posts on the CIO and leadership roles in agile transformation, agile adoption, and agile practices. For example, in the CIO's role in agile transformation, I stress the following four leadership roles: Asking questions to drive collaboration on business, tech, and data Taking one for the team and challenging the status quo Driving iterative thinking and minimally.

Agile 224
article thumbnail

Cloudera: Extract Benefit From All Your Data And Work Across Clouds

CTOvision

We have tracked Cloudera from the very beginning and have watched as it has continually innovated in ways that help both enterprises and the open source community deliver more value. They started off on a mission to make Hadoop safe for the enterprise and then built upon that solid foundation to create full spectrum solutions […].

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Deploy Microsoft Edge Patches with SCCM Software Updates|ConfigMgr Part 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see how you can enable and deploy Microsoft Edge patches with Configuration Manager Software Updates. I have already published a post that explains how to Deploy Microsoft Edge Browser (client installation) to Windows 10 devices. Introduction Microsoft released the stable version of Microsoft Edge (Chromium version) on 15th Jan 2020.

Microsoft 212
article thumbnail

Data Privacy: Top trends to watch in 2020

Tech Republic Security

Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.

Trends 215
article thumbnail

What I See Coming For The Channel In 2020

Forrester IT

Preparing for this years list of future channel trends has been an immersive experience to say the least. In 2019, I was able to talk to 497 companies one-on-one about their channel strategy and programs, including 130 of those face-to-face. I received 78 briefings from the technology companies who are inventing new ways to […].

article thumbnail

Digital Innovation is Everywhere

Information Week

Here are 6 digital innovation technologies and how they could be deployed in various markets. It's not just about the customers.

211
211
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

11 popular IT certifications that make the most money

Tech Republic Cloud

Find out which are in demand worldwide, and which IT cross-certifications are beneficial.

209
209
article thumbnail

U.S. Healthcare Data Breach Cost $4 Billion in 2019. 2020 Won’t Be Any Better

CTOvision

Read why George V. Hulme says that healthcare data breach could be worse in 2020 than in 2019 on Security Boulevard : New research estimates, after all the breach data, is tallied, that by the end of 2019, healthcare-related data breaches will cost the industry $4 billion, and respondents to a recent survey expect those […].

article thumbnail

ConfigMgr 1910 Known Issues Bugs Fixes|SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. ConfigMgr 1910 is in slow ring now (GA’d) and 1910 update will be available for all SCCM infrastructure with online Service Connection Point. Also, you should have any of the following versions of ConfigMgr 1810 or 1902, or 1906. In this post, you will learn more about SCCM 1910 known issues.

Windows 200
article thumbnail

Security admins checklist: 10 tasks to perform every year

Tech Republic Security

Here are 10 important tasks security administrators should perform to keep devices protected and secure.

Security 215
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Cannabis Dispensaries: Security And Risk Considerations For Continued Growth

Forrester IT

In the US, cannabis is fully legal (medical and recreational) in 11 states and Washington, DC. For medical use, it is legal in 33 states. This is a flourishing industry, with one study conservatively estimating it will reach $30 billion by 2025. As dispensaries set up shop, they face many of the same risks as […].

Security 100
article thumbnail

The Facial Recognition Debate

Information Week

One small step for tech, one giant leap for privacy? It is up to our society to create clear boundaries that will enhance the positive and control the negative.

198
198
article thumbnail

How Amazon is solving big-data challenges with data lakes

All Things Distributed

Back when Jeff Bezos filled orders in his garage and drove packages to the post office himself, crunching the numbers on costs, tracking inventory, and forecasting future demand was relatively simple. Fast-forward 25 years, Amazon's retail business has more than 175 fulfillment centers (FC) worldwide with over 250,000 full-time associates shipping millions of items per day.

Big Data 196
article thumbnail

How Edge Computing Is Supercharging the Internet of Things

CTOvision

The Internet of Things is a network of smart machines and technologies that can collect and analyze data to improve decision-making and performance. Often, analytics take place through cloud computing, whereby data points are transmitted to remote servers. But this approach takes time and requires costly broadband resources. Enter edge computing. Through edge computing, data processing and […].

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Finding the Best ebook Creator | 10 Best ebook creation software

Kitaboo

Here’s a list of the best eBook creation software we compared, for all your ebook publishing, ebook creation and ebook authoring needs. Kitaboo – Award-winning cloud-based digital publishing platform to create, publish and securely delivery multimedia-enhanced interactive ebooks. Epubeemaker – Free ebook publishing software in the form of a word add-in, it helps you create epub directly from your word document.

eBook 36
article thumbnail

Windows 7 remains an albatross at many large organizations

Tech Republic Security

Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.

Windows 212
article thumbnail

Shatter The Seven Myths Of Machine Learning

Forrester IT

The best New Year’s resolution? Become machine-learning-literate! It’s good for your organization, your career, and the sanity of your data scientists. See the new “Shatter The Seven Myths Of Machine Learning” report below for a mini course on machine-learning fundamentals and terminology.

Course 463
article thumbnail

How to Create a Culture of Innovation

Information Week

Here are five key techniques to support and encourage entrepreneurship in your employees -- while simultaneously keeping everyone moving in the right direction.

How To 193
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

How to enable the OnlyOffice document server in Nextcloud 18

Tech Republic Cloud

If your Nextcloud 18 installation is missing OnlyOffice, here's how to resolve the issue.

How To 171
article thumbnail

Internet of Things presents the next frontier of cyberattacks

CTOvision

Read why Asaf Ashkenazi says that the risk of cyberattacks on the Internet of Things has increased on ITProPortal : Today’s rapidly growing global network of internet of things (IoT) devices brings with it new levels of convenience to the lives of everyday consumers. In late 2019, one survey conducted by Parks Associates found that […].

Internet 285
article thumbnail

Cisco software fortifies industrial IoT security

Network World

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments. The company rolled out what it called an overarching security architecture for Industrial IoT ( IIoT ) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio.

Industry 166
article thumbnail

How to enable facial recognition in the BitWarden mobile password manager

Tech Republic Security

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

How To 209
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.