January, 2019

article thumbnail

CEOs And Software

Forrester IT

How To Lead The Most Important – and Perplexing — Corporate Domain by John R. Rymer and Jeffrey S. Hammond Summary What if CEOs — not software development and delivery leaders or CIOs — held the keys to the fast, high-quality software delivery that is so crucial to digital business?

Software 398
article thumbnail

This one skill will make you a data science rockstar

Eric D. Brown

Want to be a data science rockstar? of course you do! Sorry for the clickbait headline, but I wanted to reach as many people as I can with this important piece of information. Want to know what the ‘one skill’ is? It isn’t python or R or Spark or some other new technology or platform. It isn’t the latest machine learning methods or algorithms.

Data 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Ways Machine Learning Is Revolutionizing Sales

CTOvision

Artificial Intelligence (AI) and machine learning show the potential to reduce the most time-consuming, manual tasks that keep sales teams away from spending more time with customers. Automating account-based marketing support with predictive analytics and supporting account-centered research, forecasting, reporting, and recommending which customers to upsell first are all techniques freeing sales teams from manually […].

article thumbnail

Killing Spreadsheets and Empowering Data Driven Organizations

Social, Agile and Transformation

One of the more polarizing discussions I've had with IT leaders on Twitter chats #IdgTechTalk (Thursdays 12pm ET), #CIOChat (Thursdays at 2pm ET) or at conferences is around the use or misuse of spreadsheets. From the comments, you can guess people are either "for" or "against" using spreadsheets, but what we are really saying is, "Use them wisely" and find ways to replace them with more.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

PowerShell One-Liner to Configure the NIC Power Management Settings

Mick's IT Blog

While working on a series of one-liners for configuring the NIC on machines, I created this needed to makes changes to the power management settings of the NIC. This is something that will be implemented in the build, so I also wanted to make the script into a one-liner so the code itself can reside within the task sequence. This one-liner can check/uncheck the boxes within the Power Management tab of the network adapter.

Windows 198
article thumbnail

Windows 10 Version Numbers & Build Numbers

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, I will try to keep the Windows 10 version Numbers and Windows 10 build numbers. There was many issues about Windows 10 upgrades and quality of upgrades. There are less number of hotfixes released in the latest versions of Windows 10. So Windows 10 quality is getting stabilized with new versions.

Windows 167

More Trending

article thumbnail

Data Mining – A Cautionary Tale

Eric D. Brown

For those of you that might be new to data, keep this small (but extremely important) thing in mind – beware data mining. What is data mining? Data mining is the process of discovering information and patterns in data. Data mining is the first step taken in the Data -> Information -> Knowledge -> Wisdom conversion process. Data mining is extremely important – but can cause you a lot of problems if you aren’t aware of some of the issues that can arise from data mi

Data 192
article thumbnail

Artificial Intelligence Systems Can be Fooled

CTOvision

Read why Nidhi Singh says that artificial intelligence systems have their own severe limitations on Entrepreneur : Despite all its benefits and the ease that technology has brought in, the fear that new-age technologies like artificial intelligence (AI), machine learning and robotics would displace human jobs still looms. However, some researchers don’t agree with the idea that […].

article thumbnail

Six IoT predictions for 2019

Network World

This time of year, it can seem like the world is swimming in predictions for the new year, and the Internet of Things (IoT) is no exception. In fact, in fast-evolving areas like IoT, multitudes of trends and opportunities and challenges are in play, making predictions ridiculously easy — just about anything can happen, and probably will. [ Also read: Gartner’s top 10 IoT trends for 2019 and beyond | Get regularly scheduled insights: Sign up for Network World newsletters ].

Trends 168
article thumbnail

PowerShell One-Liner to Enable Features in Microsoft Windows 1809

Mick's IT Blog

In Windows 10 1809, I needed to enable some RSAT features that are now included in the OS. I figured this would be a good time to go from using a script to using one-liners for the build process. Mike Robbins's blog was a good start to developing this one-liner. This allows for you to manage the code within the task sequence, thereby negating the issue of storing a script and the possibility of the script accidentally being deleted.

Windows 166
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

SCCM Full Version Numbers Build Number Client Version

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. SCCM Version numbers are always confusing for me. Most confusing part is SCCM Site Version number shown near console version number and the Full version number shows near client version number in Updates and Servicing node. The post SCCM Full Version Numbers Build Number Client Version appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

article thumbnail

What I See Coming For The Channel In 2019

Forrester IT

We have seen more disruption in the channel in the past 18 months than we saw in the past 37 years combined. As a review, here were my 2018 predictions. 1. Private equity will continue its sweep of the channel software space, creating some unicorns along the way. Verdict: As mentioned in the […].

Software 418
article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning. Do you need machine learning? Maybe. Maybe not. The first question you have to ask yourself (and then answer) is this: Why do you want to be involved with machine learning?

article thumbnail

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […].

Internet 285
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

First step to becoming a hacker: Linux!

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb , the force behind Hackers-Arise , Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the

Linux 168
article thumbnail

How to Capture and Manage Technical Debt in Agile Development

Social, Agile and Transformation

If you're concerned about the technical debt accumulated by your organization, then consider developing ways to capture and measure it. In my last post, I suggest teams should target nimble architectures and leverage agile principles that enable iterating on the design. Don't plan to get it perfect, plan to get it wrong, iterate on what you learn, and recognize when the business is.

Agile 145
article thumbnail

SCCM 1810 Known Issues and FIXES

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Happy & Blessed New year 2019 to all of you! I’m trying to help SCCM community with this list of known issues which are already fixed (well, most of them) with the latest slow version of SCCM 1810. Microsoft can fix the critical issues on the fly with new cloud connected updates and servicing.

Microsoft 168
article thumbnail

Channel Data Is A Competitive Differentiator

Forrester IT

Leverage Channel Data To Give Partners A Better Experience: Winning In The Channel Requires Data-Driven Program Innovation Brands that provide an enhanced partner experience grow faster than their peers, are more profitable, and drive higher customer satisfaction and retention downstream. Smart channel professionals are looking at data across the partner journey as a […].

Data 415
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning.  Do you need machine learning?  Maybe. Maybe not.

article thumbnail

Best Practice Response Can Mitigate Data Breaches Quickly

CTOvision

Read why Sue Poremba says that best practice response can help companies mitigate data breaches quickly on Security Boulevard : Data breaches are fairly common nowadays but it is the time that the company takes to identify the breach and notify its users that counts. It generally takes about six months for a company to […].

Data 286
article thumbnail

Top 10 IoT vulnerabilities

Network World

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.

Internet 167
article thumbnail

Agile Mindsets: Don't try to get a perfect architecture; Plan to get it wrong

Social, Agile and Transformation

I still find teams that have adopted scrum and other agile practices, but still strive for perfection when trying to conceive architectures and implementation plans. Some will also try to think through every edge case to ensure that designs are fully future-proofed. This is an unrealistic proposition for most teams and people. There's too many unknowns, too much complexity, and businesses do.

Agile 145
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

How to Handle SCCM Bandwidth Issues with Branch Cache Vs Peer Cache

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In the current world of IT, organizations look for lower operating expenses are investigating technology solutions that can directly lower costs and improve productivity and value add to the business. This blog post will help you to design SCCM Bandwidth optimization tips and tricks.

How To 167
article thumbnail

It’s Time To Mainstream ABM

Forrester IT

When account-based marketing (ABM) burst onto the scene in 2015, it was positioned by a number of vendors as the death of traditional marketing. And while that controversial approach might have been great for creating buzz and drawing attention, it created significant confusion for the mainstream B2B marketer. It’s taken a couple of years to […].

B2B 405
article thumbnail

Foto Friday - Rocky Mountain National Park

Eric D. Brown

Late last year I had the opportunity to spend a week in Rocky Mountain National Park (RMNP).  Strangely, I’d never actually been to RMNP although I’ve been just about everywhere else around RMNP. The trip was part of a trip to nearby Denver for a conference so I didn’t get as much time to spend in the park and surrounding areas as I’d wanted to, but I did spend every morning in the park for sunrise – and loved every second that I had there.

Cloud 130
article thumbnail

The Weaponization Of Artificial Intelligence

CTOvision

Technological development has become a rat race. In the competition to lead the emerging technology race and the futuristic warfare battleground, artificial intelligence (AI) is rapidly becoming the center of the global power play. As seen across many nations, the development in autonomous weapons system (AWS) is progressing rapidly, and this increase in the weaponization […].

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Quantum-embedded chips could secure IoT

Network World

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.

Security 167
article thumbnail

3 Reasons Why People Aren't Using Your Data Visualizations

Social, Agile and Transformation

Are you getting the expected usage out of your BI dashboards? Are the users of your dashboards just accessing them to download the raw data only to review it as a messy, siloed, spreadsheet? If you taught people how to use one of your dashboards, would they have a basic understanding of how to use other ones developed off the same data sets? require(["mojo/signup-forms/Loader"], function(.

Data 140
article thumbnail

Windows Autopilot Troubleshooting – Beginners Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Windows Autopilot is Azure service to provision windows 10 build. Autopilot service is to simplify Windows OOBE and it happens primarily at Windows 10 OOBE stage. You will learn about basics of Windows Autopilot Troubleshooting from this post. The Basics In the OOBE stage of autopilot deployment, there can be many issues which result in failure. […].

Windows 167
article thumbnail

CES 2019 Delivers Dazzling Tech But Disappointing Experiences

Forrester IT

I spent this week in Las Vegas at CES to check out the latest and greatest technology wonders, ranging from 3D printing, AI, and cryptocurrency to drones, autonomous vehicles, dancing robots, and wearables. A lot of what I saw has broad CX implications for accessibility, healthcare, and more.

3D 402
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.