Sat.Jan 19, 2019 - Fri.Jan 25, 2019

article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning. Do you need machine learning? Maybe. Maybe not. The first question you have to ask yourself (and then answer) is this: Why do you want to be involved with machine learning?

article thumbnail

CEOs And Software

Forrester IT

How To Lead The Most Important – and Perplexing — Corporate Domain by John R. Rymer and Jeffrey S. Hammond Summary What if CEOs — not software development and delivery leaders or CIOs — held the keys to the fast, high-quality software delivery that is so crucial to digital business?

Software 398
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CTOvision Publisher Bob Gourley on Risks of Unsecure Artificial Intelligence Technology

CTOvision

The risks of non-secure AI are growing. Security for AI needs to include concepts from traditional IT security but the nature of new machine learning methods and architectures brings new risks and therefore a need for new solutions. Francis Rose of Govmatters.TV interviewed Bob Gourley of OODA LLC on what is similar and different about […].

article thumbnail

Killing Spreadsheets and Empowering Data Driven Organizations

Social, Agile and Transformation

One of the more polarizing discussions I've had with IT leaders on Twitter chats #IdgTechTalk (Thursdays 12pm ET), #CIOChat (Thursdays at 2pm ET) or at conferences is around the use or misuse of spreadsheets. From the comments, you can guess people are either "for" or "against" using spreadsheets, but what we are really saying is, "Use them wisely" and find ways to replace them with more.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

PowerShell One-Liner to Configure the NIC Power Management Settings

Mick's IT Blog

While working on a series of one-liners for configuring the NIC on machines, I created this needed to makes changes to the power management settings of the NIC. This is something that will be implemented in the build, so I also wanted to make the script into a one-liner so the code itself can reside within the task sequence. This one-liner can check/uncheck the boxes within the Power Management tab of the network adapter.

Windows 198
article thumbnail

The Three Customer Service Megatrends In 2019

Forrester IT

As AI Eats Jobs, Agents Are More Valued Great customer service is not just about cutting costs or making operations more efficient. Instead, it’s a systematic reinvention of established technology, data, and operations — leveraging automation, data, and agents together to exploit each of their unique strengths. Trend 1: AI upends customer service operations.

Trends 385

More Trending

article thumbnail

How SD-WAN can improve your security strategy

Network World

Data breaches and security threats are a top concern among IT leaders, yet it’s harder than ever to hire skilled security professionals. That has organizations looking for ways to more easily improve their security strategy. One option is to implement a software-defined WAN ( SD-WAN ). I recently talked with Hamza Seqqat, director of solutions architecture at Apcela , to get his take on how SD-WAN affects security strategy.

WAN 167
article thumbnail

What You Need to Know About Augmented Analytics

Information Week

As enterprises travel on a digital transformation path, they need to stay current with analytics, but it's not a linear journey.

Travel 167
article thumbnail

China’s Tech Market Will Grow by 4% in 2019 and 7% in 2020

Forrester IT

Growth in China’s technology market will slow in 2019 due to geopolitical tensions and economic pressures but will rebound in 2020. Our just-published China Tech Market Outlook, 2019 To 2020 report forecasts that business and government purchases of technology goods and services will grow by 4% in 2019 and 7% in 2020 in US dollar […].

article thumbnail

Artificial Intelligence: Separating the Hype from Reality

CTOvision

Read why Adam Lashinsky says that it is necessary to separate hype from reality in artificial intelligence on Fortune : Like bees to honey, tech trends generate hype. Merely appending the word “dotcom” to a company’s name drove up stock prices in the Internet’s salad days. Cloud computing, big data, and cryptocurrencies each have taken […].

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Windows Autopilot Troubleshooting – Beginners Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Windows Autopilot is Azure service to provision windows 10 build. Autopilot service is to simplify Windows OOBE and it happens primarily at Windows 10 OOBE stage. You will learn about basics of Windows Autopilot Troubleshooting from this post. The Basics In the OOBE stage of autopilot deployment, there can be many issues which result in failure. […].

Windows 167
article thumbnail

Cisco patches serious SD-WAN software security holes

Network World

Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow, arbitrary file override and privilege access weaknesses that could have led to denial-of-service attacks or access problems. The first patch, called “Critical” by Cisco, fixes a vulnerability in the vContainer of the Cisco SD-WAN Solution that could let an authenticated, remote attacker cause a denial of service (DoS) and execute arbitrary code as the root user, the company wrote

WAN 166
article thumbnail

The Billion-Dollar Healthcare Problem You Can’t Just Walk Off

Forrester IT

(Caleb Ewald contributed to this blog.) Super Bowl LIII is right around the corner, and we’ve begun reading the tea leaves and perusing injury reports to divine the future with precision. Will the Pats win another one? Will the Rams start a dynasty? While tea leaves are. well. tea […].

article thumbnail

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

CTOvision

A little over two weeks have passed since we celebrated New Year without having to hear about a data breach in progress. The wait is finally over. In what’s being called the largest data breach literally ever, which in an era where data breaches are almost commonplace really means something, we have a breach that leaked almost […].

Data 225
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Top 5 Considerations When Hiring a Data Scientist

Information Week

AI is a hot term in every industry, but don't be a company that just blindly hires a group of data scientists who end up frustrated and unproductive.

Data 164
article thumbnail

Durham County goes Cisco for enterprise network ops and security proficiency

Network World

The IT department in Durham County, N.C.'s government was spending far too much time manually addressing network and security operations and turned to Cisco to help achieve the operational and security effectiveness it was looking for. The government in Durham County , N.C., was spending hours and hours manually provisioning its network and keeping security policies current, so it decided two-and-a-half years ago to upgrade for the sake of efficiency and security.

Network 163
article thumbnail

Retailers: Use In-Store Sensor Tech To Understand And Enhance Customer Experiences

Forrester IT

Sensor-based technologies have been around for a while now — remember all the beacon hype? — and are now rapidly gaining traction. In-store sensor technology, and more importantly their contribution to understanding our in-store customers and businesses, are at a point where it is now truly digitally transforming physical stores and the experiences delivered to […].

Retail 365
article thumbnail

Hybrid cloud trends offer lessons for potential adopters

CTOvision

Organizations and IT administrators hoping to follow hybrid cloud trends can save time and energy by planning ahead with these hybrid cloud design, deployment and migration guidelines. A hybrid cloud system mixes private and public cloud platforms with orchestration that enables workload flexibility between them. Hybrid cloud admins can move workloads between on-premises and third-party clouds […].

Trends 222
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Intune Version Numbers -Service Release Numbers with Feature Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, I will list down the Intune version numbers. I don’t think there is nothing called Intune version numbers. But the Intune monthly releases versions are known as Intune service releases. I will keep this Intune Service Release version list updated. Identity Intune Version Numbers?

article thumbnail

Batten down the DNS hatches as attackers strike Feds

Network World

If enterprise IT folks haven’t taken a look at their DNS ecosystem recently now may be a good time. This week the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) told all federal agencies to bolt down their Domain Name System in the face of a series of global hacking campaigns.

article thumbnail

Video: How AI is Transforming Advertising and What You Should Do About it.

Forrester IT

Did you know that artificial intelligence (AI) has infiltrated all parts of the advertising process? My guess is, probably not. But chances are, in an era of programmatic advertising where machines are making millions of decisions on billions of ad impressions every day, your advertising is being touched by AI. Awesome, right? But also risky: to your […].

article thumbnail

Trojan malware is back and it’s the biggest hacking threat to your business

CTOvision

Trojan malware attacks against business targets have rocketed in the last year, as cybercriminals alter their tactics away from short-term gain and in-your-face ransomware attacks towards more subtle, long-term campaigns with the aim of stealing information including banking information, personal data, and even intellectual property. Figures from security company Malwarebytes Labs in a new report suggest […].

Malware 219
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning.  Do you need machine learning?  Maybe. Maybe not.

article thumbnail

AI and the Next Recession

Information Week

The US may be at peak employment now, but there's an uncertain future for jobs.

113
113
article thumbnail

Telecom-Only = Disrupted

Forrester IT

My theme at PTC’19 this week was that telecommunications and colocation companies who maintain a focus on their traditional value propositions will be fully disrupted by 2025. Customers, in the era of cloud computing and embracing the shift to business agility, don’t want long-term commitments to fixed capacities of these resources. Their infrastructure consumption is […].

article thumbnail

How Blockchain Technology Can Improve America’s Infrastructure

CTOvision

Read Adam Millsap explain how blockchain technology can help improve USA’s crumbling public infrastructure on Forbes : America’s infrastructure is often described as crumbling, broken-down, and out-of-date by politicians from both sides. While the reality isn’t so dire, there are obvious infrastructure issues throughout the country, such as New York’s subway, D.C.’s metro, and almost any […].

CTO 216
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Email Marketing Tips to Improve Customer Loyalty

Galido

Information Technology Blog - - Email Marketing Tips to Improve Customer Loyalty - Information Technology Blog. With all of the new ways to reach customers online, email marketing continues to be the most effective way to find new customers and stay connected with current customers. However, while email has been around a while, the methods we use email have changed.

Mobile 112
article thumbnail

What Happens When You Add Security to DevOps? DevSecOps

Information Week

Implementing DevSecOps means taking your existing DevOps initiative to the next level, and getting security teams involved at the start of the Dev process.

Devops 114
article thumbnail

Retailers: Extend Omnichannel Capabilities To The Customer, Not Just Operations

Forrester IT

Omnichannel investments, including in-store pickup and endless aisle, continue to be top strategic investment for digital business professionals at retail organizations. Forrester predicts that digital touchpoints will influence 55% of total European retail sales by 2022, so a retailer’s digital presence continues to play a significant role in influencing consumer purchase decisions, both online and […].

Retail 333
article thumbnail

Tech’s Next Imperative Must Be Physical Security

CTOvision

Physical security has always taken a back seat for IT professionals. With growing attacks read why Alan Cohen says that it is imperative for the IT pros to focus on physical security on Forbes : I believe our Founding Fathers knew that the American experiment would be sorely pressed, sorely challenged over time. This foresight exercises […].

Security 215
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.