Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

CIOs as “Chief Investment Officer”: Three Aspects of Clarifying Digital Business Model

Future of CIO

The emerging digital trends bring significant opportunities for organizations to pursuing business growth through methodical examinations of alternative business models. With emerging digital technology trend and abundant information, the new digital business model can be discovered if organizations can ride learning curve and explore the art of possibility.

Trends 40
article thumbnail

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale. Outside of well-established use cases – such as risk scoring or optimizing search results – data scientists regularly complain that their solutions can take months […].

Data 389
article thumbnail

Not all Machine Learning (ML) Is Artificial Intelligence (AI): Part II

CTOvision

No two companies define Artificial Intelligence (AI) the same way, but they all insist they are doing it. Or at least some version of it. However, if AI is to mean something and be a useful term to help delineate different technologies and approaches from others, then it has to be meaningful. A term that [.].

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How to Setup Co-Management Video Tutorials

Anoop

I have several posts related to co-management scenarios and implementation. In this post, I have collated all Co-Management Video Tutorials in one place for easy access. All these videos are recorded with SCCM CB 1802 production version. I don’t think I would be able to share all the scenarios. Let me know if you want […]. The post How to Setup Co-Management Video Tutorials appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Video 146
article thumbnail

What happens if IoT security doesn’t get solved?

Network World

Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey , 45 percent of Internet of Things (IoT) buyers say “ concerns about security remain a significant barrier and are hindering the adoption of IoT devices.

Security 144

More Trending

article thumbnail

Northern Virginia Blockchain Mixer 14 June 2018 in Reston VA

CTOvision

With this post I want to let you know about a small networking event being hosted by Matt Devost and Bob Gourley in Reston VA on 14 June from 530pm till 7:30pm. The purpose of the event is to help enhance the dialog among and between the many local players in the blockchain ecosystem. We [.].

Network 194
article thumbnail

What Do CIOs Need To Know About Status Battles At Work?

The Accidental Successful CIO

CIOs need to understand that status at work does not follow a formal hierarchy Image Credit: Eugene Kim. When a member of your department does a good job, all of a sudden you find yourself in a difficult position. You’d like to show this individual that they did a good job and that you appreciate it. However, the big question is often how best to go about doing this.

Groups 138
article thumbnail

SDNs and NFV are complementary and core components of modernized networks

Network World

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both. [ For mo

Network 141
article thumbnail

Cyber Conferences, It Shouldn’t Be This Way.

Forrester IT

I recently saw another posting/photo from a friend in the industry that showed what amounts to “booth babes” at yet another conference, this time it wasn’t in Vegas, it was in Europe. This issue is one of importance in an industry rife with failure on lots of levels, a lack of available talent, and that […].

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Blockchain Templates: Amazon Making Technology Mainstream

CTOvision

It might just be me, but the news of Amazon’s blockchain templates has got me very excited. I can assure you that it’s not the thought of a blockchain template though that is the exciting bit. What has got me jumping for joy and so should the rest of the blockchain world, is that one of the [.].

CTO 172
article thumbnail

What The World Of High Speed Trading Can Teach CIOs

The Accidental Successful CIO

High speed trading is all about having a very fast IT infrastructure Image Credit: Epic Fireworks. At most firms, the person with the CIO job plays a supporting role to the rest of the company. The company makes its blue widgets and the CIO is responsible for creating and maintaining all of the systems that allow blue widgets to be manufactured and sold.

System 113
article thumbnail

Cato Networks adds threat hunting to its Network as a Service

Network World

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future , NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.

Network 94
article thumbnail

The Five Use Cases For AI In The Contact Center

Forrester IT

Increasing channel diversity and automation will make interactions more complex, requiring highly-skilled agents and intelligent processes to assist them. Here’s my take on five valuable use cases for AI in the contact center.

article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Some of the biggest compromises of your information are by design, you just don’t know it

CTOvision

The following are some of the key cybersecurity and cyberwar topics we are following: Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence The social media giant is in trouble again for sharing sensitive user data with Chinese smartphone makers. The US authorities have found that Facebook has had data-sharing partnerships with Huawei, [.].

Media 171
article thumbnail

Azure AD Application proxy Browser Addon “My Apps Secure Sign-in”

Anoop

Azure AD Application Proxy is the recommended solution to access on premise web application from external network (outside corporate). The end user can login to My Apps portal to access all the application assigned to the user. With My Apps Browser addon installed, user can use the same Web URL to access from both internal and […]. The post Azure AD Application proxy Browser Addon “My Apps Secure Sign-in” appeared first on SCCM Intune Real World Enterprise Experience Blog by Vimal Da

article thumbnail

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Network World

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

article thumbnail

Telecom Operators Deliver Insights Services — With Network And Subscriber Data

Forrester IT

A few years ago, I met with an incumbent telecom provider in Europe, and they came across as being from “the old country.” I asked about their data strategy, and they were horrified at the thought of doing anything other than securing and protecting their data assets. Even just one year ago at Mobile World […].

Data 257
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Scary Words For Anyone: Microsoft and Amazon Are Entering Your Market

CTOvision

These are some of the enterprise IT stories we are following: Microsoft’s GitHub takeover sends shockwaves through the open-source developer ecosystem The worlds largest git repository is getting a second lease of life. GitHub has been struggling with revenues even as it is facing new rivals. The knight in shining armor for GitHub is none [.].

article thumbnail

Learn about Journey to Cloud Micro Services

Anoop

The journey to cloud is not a straightforward path for most of the organizations. It involves a different mix of computing styles depending on the requirements. The cloud journey for an organization which has loads of complex infrastructure is entirely different from startup organization. Best Start Private or Public or Hybrid Cloud? I think the […].

Cloud 92
article thumbnail

A Quadruple-Provider Vagrant Environment

Scott Lowe

In October 2016 I wrote about a triple-provider Vagrant environment I’d created that worked with VirtualBox , AWS , and the VMware provider (tested with VMware Fusion ). Since that time, I’ve incorporated Linux ( Fedora , specifically) into my computing landscape, and I started using the Libvirt provider for Vagrant (see my write-up here ).

.Net 60
article thumbnail

Risk Tech, Reg Tech — All The 2018 Tech

Forrester IT

The Forrester Tech Tide™: Risk And Compliance Management, Q2 2018 We recently published our Tech Tide™ report outlining 14 key risk and compliance technologies to track in 2018. One of the challenging parts of this research is setting the right scope. We found risk and compliance technology everywhere, covering every industry, region, and niche use case. […].

Research 255
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

INFOGRAPHIC: Data Scientist vs. Data Engineer by Cognilytica

CTOvision

As AI increasingly gains popularity among enterprises, companies are actively seeking data scientists who possess data science skills. Many enterprises confuse the roles of data scientists and data engineers. Even though some traits, skills, programming languages and tools are shared by both roles, the overall roles and core skill sets are different and are not [.].

article thumbnail

The Weekly Insight of the “Future of CIO” 6/8/2018

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 2.5 million page views with 4600+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc. The content richness is not for its own sake, but to convey the vision and share the wisdom.

article thumbnail

Technology Short Take 101

Scott Lowe

Welcome to Technology Short Take #101! I have (hopefully) crafted an interesting and varied collection of links for you today, spanning all the major areas of modern data center technology. Now you have some reading material for this weekend! Networking. Kirk Byers discusses the direct TextFSM integration he added to the 2.0 release of Netmiko. David Gee provides a walkthrough on creating a self-signed root certificate for use with mutual SSL for gRPC on JunOS.

article thumbnail

Apple Continues To Empower The Patient To Be An Informed Consumer

Forrester IT

Apple Takes Record Sharing To The Next Level Consumers demand access to their medical information, and Apple has answered the call. In January, Apple released an update to the Health app, enabling customers of 12 hospitals and clinics to see their medical records right on their iPhone. Months late, Apple now allows patients from over […].

Apple 246
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Apple’s new Core ML 2 Framework promises faster and smaller AI, Google opts out of Project Maven, Nvidia launches two AI Platforms

CTOvision

The following are some of the Artificial Intelligence topics we are following: Apple’s Core ML 2 is 30% faster, cuts AI model sizes by up to 75% The iPhone maker is training its guns on artificial intelligence with its new Core ML 2 Framework which promises to help devs cut AI model sizes by 75 [.].

article thumbnail

Digital Fusion: How to Unleash the Full Business Potential

Future of CIO

Uncertainty, ambiguity, unpredictability, velocity etc., are the digital new normal. With increasing pace of changes, the emergence of potential opportunities for exploiting digitization is likely to follow a nonlinear pattern as the pervasiveness of an organization's digitization journey increases. Business leaders need to be both bold and cautious, take multifaceted management disciplines to drilling down the critical success factors that underpin each of the higher level performance dimension

How To 51
article thumbnail

Exploring Kubernetes with Kubeadm, Part 1: Introduction

Scott Lowe

I recently started using kubeadm more extensively than I had in the past to serve as the primary tool by which I stand up Kubernetes clusters. As part of this process, I also discovered the kubeadm alpha phase subcommand, which exposes different sections (phases) of the process that kubeadm init follows when bootstrapping a cluster. In this blog post, I’d like to kick off a series of posts that explore how one could use the kubeadm alpha phase command to better understand the different com

Linux 60
article thumbnail

Building The Language Bridge Between Security and the C-Suite

Forrester IT

If you had half an hour with a board member, and you wanted to get coaching from them about how to communicate with them about security, what would you ask them? In a few weeks’ time, I will have just that opportunity when I facilitate a panel with some prominent board directors. Getting inside the […].

Security 236
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.