February, 2019

article thumbnail

Who Are You, Citizen Data Scientist?

Forrester IT

Ugh. Everyone is talking about the citizen data scientist, but no one can define it (perhaps they know one when they see one). Here goes — the simplest definition of a citizen data scientist is: non-data scientist.

Data 409
article thumbnail

Automation and Artificial Intelligence: How machines are affecting people and places

CTOvision

At first, technologists issued dystopian alarms about the power of automation and artificial intelligence (AI) to destroy jobs. Then came a correction, with a wave of reassurances. Now, the discourse appears to be arriving at a more complicated understanding, suggesting that automation will bring neither apocalypse nor utopia, but instead both benefits and stress alike. […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Join Top Social CIO at the First #CIOChatLive!

Social, Agile and Transformation

If you're a CIO, CISO, or CTO and want to connect with the brightest, most socially vocal group of CIOs then please join us for the first ever #CIOChatLive in Boston on March 14-15th! If you are not familiar with #CIOChat, it's a twice per week gathering on Twitter that you can follow with this hashtag. On Thursday at 2pm ET, moderator Myles Suer sends out 4-5 questions around a topic while.

Social 189
article thumbnail

Top 7 Innovations in K-12 Education

Kitaboo

The education sector has undergone significant changes in the last decade. It has also evolved rapidly with the changes taking place in the digital world. Today, you would find most of the schools and universities using digital aids in classrooms. By incorporating technology into K-12 education model, institutes are aiming to improve the teaching and learning processes in schools and universities.

Education 176
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

SCCM IBCM Vs CMG Changes – Revolutions – Really?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Isn’t a revolution (really?) happening with Digital Transformation? Let’s check the SCCM internet client management revolutions. In this post, I will try to give a quick SCCM IBCM Vs CMG comparison. What is SCCM Internet Client Management? Managing SCCM clients from the internet is called Internet client management.

article thumbnail

Protecting the IoT: 3 things you must include in an IoT security plan

Network World

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.

Security 167

More Trending

article thumbnail

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […].

Internet 282
article thumbnail

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Agile 181
article thumbnail

5 Ways to Create Effective Interactive Training Content

Kitaboo

Employee training is no longer limited to sitting back and watching PowerPoint slides. L&D teams are looking out for interactive training content so that the employees can learn and retain the information effectively. Interactive training content, as the name suggests, requires interaction between the trainer and the employee. But today, as mobile-based training is on the rise, the interaction now has to be between the course module and the learner.

Training 164
article thumbnail

Desktop Support Network Troubleshooting Tips for Beginners

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. This post is a continuation of my old post “How to Learn Desktop Support Engineer Skills“ Desktop support engineers are an integral part of the IT support world. In the IT support world, the real heroes are Desktop Support Engineers. In this post, you will learn troubleshooting skills for IT support with the help of […].

Network 167
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

SD-WAN creates new security challenges

Network World

SD-WAN products have been available for the better part of five years. Early adopters of the technology focused primarily on transport-related issues such as replacing or augmenting MPLS with broadband. As any technology matures and moves out of the early adopter phase, the buying criteria changes — and SD-WAN is no different. In 2018, a ZK Research survey asked respondents to rank SD-WAN buying criteria, and security came out as the top response, well ahead of technology innovation and price.

WAN 167
article thumbnail

Shopping For AI Talent? Beware Of Unicorns

Forrester IT

At the dawn of big data, data scientists were the unicorn of the hour. Talk to any one of these rarities, and they would say there were only about 100 of them in the world. When executives woke up to the potential of big data, it was also at the same time we were dealing […].

Big Data 393
article thumbnail

Sophisticated new phishing campaign targets the C-suite

CTOvision

A new phishing campaign to steal login credentials is being launched on businesses – specifically the C-suite. Researchers at GreatHorn first discovered the campaign which targets senior executives by claiming to be from the company’s CEO. The fake email regards the rescheduling of a board meeting. By following the link from this email and users are greeted […].

Meeting 277
article thumbnail

Understanding AI - 3 Must Read AI Books for CIO and IT Leaders

Social, Agile and Transformation

s Last year I keynoted several talks on AI in the Enterprise: Finding Quick Wins and Avoiding Speed Bumps???. This talk is on the practical side of getting started with machine learning. Among my recommendation, I suggest IT leaders invest in data quality and other data governance efforts, perform POCs with some of the more mature AI areas, and find partners that can educate and validate.

Education 164
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

IBM Takes Watson AI to AWS, Google, Azure

Information Week

IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM.

IBM 161
article thumbnail

SCCM Deprecated Features Updated List

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The post is all about the updated list of SCCM Unsupported features. Also, you will be able to check out the unsupported versions of SCCM client operating systems (Windows, Linux, Unix,etc.). I’m not planning to cover the unsupported operating systems for SCCM site system/site server/SQL roles in this post.

article thumbnail

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Network World

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network. The vulnerability, which has an impact rating of 9.8 out of 10 on the Common Vulnerability Scoring System lets a potential attacker send malicious HTTP requests to a targeted device.

Firewall 163
article thumbnail

Forrester’s Latest Infographic: Consumers Don’t Believe the Chatbot Hype

Forrester IT

Consumers really don’t like your chatbot. It’s not exactly a relationship built to last – a few clicks here, a few sentences there – but Forrester Analytics shows us very clearly that, to consumers, your chatbot isn’t exactly “swipe right” material. That’s unfortunate, because using a chatbot for customer service can be incredibly effective when […].

392
392
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

OpenAI’s new multitalented AI writes, translates, and slanders

CTOvision

OpenAI’s researchers knew they were on to something when their language modeling program wrote a convincing essay on a topic they disagreed with. They’d been testing the new AI system by feeding it text prompts, getting it to complete made-up sentences and paragraphs. Then, says David Luan, VP of engineering at the Californian lab, they […].

article thumbnail

Mozilla Firefox One-liner Installer

Mick's IT Blog

Here is a PowerShell one-line installer for Mozilla Firefox. This allows you to download the latest version of Mozilla Firefox during the build process without having to maintain the package each time. The URI used in this is for the 64-bit version of Firefox. If you need a different version, you will need to locate the download URI and copy and paste it in the one-liner thereby changing the value of $URI.

140
140
article thumbnail

What CIOs and CTOs Can Learn From Smart Cities

Information Week

Municipal IT leaders manage a lot of complexity; improving government efficiency, protecting citizens, and making cities attractive places to work, live and visit.

article thumbnail

MDM Diagnostics Tool – Tips & Tricks – Windows Autopilot Troubleshooting

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In my previous post, Windows Autopilot Troubleshooting basics, we discussed different troubleshooting areas like Network Activity, Registry, and Event Viewer. In this post, let’s discuss on Windows MDM Diagnostics Tool benefits, usage, and examples. [Related Posts – Windows Autopilot Step by Step Guides, Windows 10 Deployment Process Flow and Logs] What is Windows MDM Diagnostics […].

Windows 167
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

That VPN may not be as secure as you think

Network World

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure. Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently.

Security 167
article thumbnail

Augmented Reality, Virtual Reality, And Mixed Reality Do Bring Value To Industry

Forrester IT

Back in August of last year, I asked for good examples of augmented reality (AR), virtual reality, and mixed reality (MR), all together known as extended reality. Unsurprisingly, I saw plenty of examples of the type my original post complained about: visually stunning but almost entirely useless for anything other than showing off. Then there […].

article thumbnail

Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware

CTOvision

Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error […].

Malware 264
article thumbnail

Maria Lensing: The Network Platform for Healthcare’s Future

Cloud Musings

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s life, ignited a passion for healthcare. Unfortunately, that passion didn’t apply to blood, so she went into electrical engineering and biomedical engineering, eventually falling in love with networking and data.

Network 107
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Q&A: Where IBM Sees Growth in Hybrid Cloud

Information Week

Eager to show that it is part of the future, IBM shares some of its perspective on how cloud computing continues to evolve.

IBM 153
article thumbnail

SCCM Depreciated Features Updated List

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The post is all about the updated list of SCCM depreciated features. Also, you will be able to check out the unsupported versions of SCCM client operating systems (Windows, Linux, Unix,etc.). I’m not planning to cover the unsupported operating systems for SCCM site system/site server/SQL roles in this post.

article thumbnail

National pen test execution standard would improve network security

Network World

As the number of cyber attacks increases, the demand for penetration tests – to determine the strength of a company’s defense – is also going up. People are worried about their companies’ networks and computer systems being hacked and data being stolen. Plus, many regulatory standards such PCI and HITRUST require these tests to be performed on at least an annual basis.

Network 167
article thumbnail

The Use of Behavioral Science Has Moved Beyond Marketing

Forrester IT

Marketers have been using behavioral economics to understand and exploit the irrationality of consumers long before the Golden Age of Advertising. By employing simple marketing tactics such as “buy now, pay later,” inflated value pricing, or decoy alternatives, marketers have been able to effectively steer or in some cases, manipulate customers to buy products or […].

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.