Sat.Dec 14, 2024 - Fri.Dec 20, 2024

article thumbnail

Your Tech Stack Isn’t Your Strategy

Eric D. Brown

“What’s your AI strategy?” I hear this question from business leaders, and I cringe every time. Why? It fundamentally misunderstands strategy. Your choice of ChatGPT, Claude, or any other LLM isn’t a strategyit’s a tool choice. Confusing tools with strategy is a fast track to wasted resources and missed opportunities. Let me share a quick story.

Strategy 130
article thumbnail

Building a Data-First Culture: Beyond Data Collection

Eric D. Brown

Last week, I talked to an old colleague who proudly explained that their company had collected over ten years of customer interaction data. When I asked what insights they’d gained from this information, he was silent for a minute and said, “I’m not real sure, honestly.” He had the data but wasn’t using it to make better decisions or improve his business.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 Expert Gen AI Predictions for an Ambitious 2025

Social, Agile and Transformation

Discussions with leaders from vtech companies focused on CIO's gen AI expectations for 2025, highlighting the shift towards pragmatic AI applications amidst fading LLM hype. Key predictions include the rise of agentic AI, increased focus on data privacy, and the need for effective change management to support innovation and employee engagement.

article thumbnail

How to Check SSD Health in Linux

Tech Republic Data Center

Do you use Linux machines in your data center? If so, it's probably a good idea to regularly check the health of the SSD drives used on those machines. Here's how to do it.

Linux 148
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Cisco grabs SnapAttack for threat detection

Network World

Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to expand its security portfolio. Established in 2001 by Booz Allens Dark Labs, SnapAttack is known for its threat detection and engineering technology, which melds threat intelligence, attack emulation, and behavioral analytics to help customers identify potential vulnerabilities and gaps in their networks, ideally before problems happen.

Security 149
article thumbnail

Complete Guide to Automate the Microsoft Intune Daily Tasks using of Graph X Ray

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and LinkedIn page for latest updates [link] The post Complete Guide to Automate the Microsoft Intune Daily Tasks using of Graph X Ray appeared first on HTMD Community Modern Device Management News & Guides by Sujin Nelladath.

Microsoft 133

More Trending

article thumbnail

European Cybersecurity Reflections 2024

Forrester IT

This time of year is perfect for reflectionlooking back at the challenges and successes of 2024 while anticipating the opportunities and changes that 2025 will bring.

Trends 195
article thumbnail

University of Washington researchers craft method of fine-tuning AI chatbots for individual taste

GeekWire

Natasha Jaques, an assistant professor at the University of Washington’s Paul G. Allen School of Computer Science & Engineering. (UW Photo) As artificial intelligence chatbots are popping up to provide information in all sorts of applications, University of Washington researchers have developed a new way to fine-tune their responses. Dubbed variational preference learning , the goal of the method is to shape a large language model’s output to better match an individual user acco

article thumbnail

SAP systems increasingly targeted by cyber attackers

CIO Business Intelligence

A review of four years of threat intelligence data, presented Friday at Black Hat by Yvan Genuer , a senior security researcher at Onapsis, reports a spike in hacker interest in breaking into enterprise resource planning (ERP) systems from SAP in 2020 that was sustained until the end of 2023. The vast majority (87%) of the Forbes Global 2000 list of the worlds biggest companies use SAP, according to the enterprise software firm, with the technology handling 77% of the worlds transaction revenue.

SAP 124
article thumbnail

Nvidia’s Run:ai acquisition waved through by EU

Network World

Nvidia will face no objections to its plan to acquire Israeli AI orchestration software vendor Run:ai Labs in Europe, after the European Commission gave the deal its approval Friday. The Commissions executive vice president with responsibility for competition, Teresa Ribera, said, Since Nvidia is a leading producer of key hardware for AI applications used in the EU and beyond, it was important to carefully check whether its acquisition of start-up software company Run:ai may have negatively impa

Hardware 141
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Environmental Sustainability: Even If You Change The Route, Keep The Destination

Forrester IT

Theres a school of thought that writes most sustainability efforts off as annoying virtue signaling: Consumers with time and disposable income choose to pay a green premium for products that make them feel good, and companies plant trees and recycle coffee cups to make those customers like them.

Company 352
article thumbnail

Ransomware Attack on Rhode Island Highlights Risk to Government

Information Week

State and local government agencies are common targets for threat actor groups.

article thumbnail

What is data architecture? A framework to manage data

CIO Business Intelligence

Data architecture definition Data architecture describes the structure of an organizations logical and physical data assets, and data management resources, according to The Open Group Architecture Framework (TOGAF). Its an offshoot of enterprise architecture that comprises the models, policies, rules, and standards that govern the collection, storage, arrangement, integration, and use of data in organizations.

article thumbnail

CompTIA launches expert-level cybersecurity certification

Network World

CompTIA this week made available its CompTIA SecurityX certification program, which is an updated version of the CompTIA Advanced Security Practitioner (CASP+) cert and part of CompTIAs Xpert Series of certifications. SecurityX follows CompTIAs release of DataX earlier this year, and it is designed for IT professionals with multiple years of work experience who want to validate their expert-level knowledge of business-critical technologies.

article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Your Car Is Listening To You. And So Are Hackers.

Forrester IT

Skoda and Volkswagen are the latest vehicle manufacturers who have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely and the exploits can range from tracking GPS coordinates and speed data to recording conversations in the car via the in-cabin microphone and if skilled enough, control functions like stop […]

Data 221
article thumbnail

Tech Goes Nuclear

Information Week

The tech industry is turning to new forms of nuclear energy to power data centers and address carbon challenges.

article thumbnail

Predictive Dialer vs Progressive Dialer (+ 3 Alternatives)

Tech Republic

The main tradeoff between a predictive dialer vs progressive dialer is speed vs control. Learn about both and and how they compare.

VOIP 111
article thumbnail

Time Capsule turns Apple's AirTag into a rugged tracker with 10 years of battery life

TechSpot

The latest creation out of Elevation Lab solves this issue and more, but introduces its own set of compromises.

Apple 111
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

The Average B2B Firm Invests 8% Of Revenue In Marketing — But That’s Not The Whole Story

Forrester IT

Global averages mask a great deal of nuance. Get an overview of our B2B marketing budget benchmark reports and find out how they can help you evaluate your marketing investment.

B2B 221
article thumbnail

Retailers: Learn From the Holidays To Build Year-Round Resilience

Information Week

To enhance business and operational resilience during the holidays, tech leaders should focus on four key areas.

Retail 134
article thumbnail

Equinix to end its bare-metal service

Network World

Hosting and colocation giant Equinix is sunsetting its bare-metal infrastructure-as-a-service (IaaS) offering by June 2026. New features will no longer be added to Equinix Metal , as the service was called. Rather, the company is going into maintenance mode until the service discontinues, according to a blog post by Brian Stein, senior vice president of edge infrastructure services at Equinix.

article thumbnail

How to Decide Between a Power Dialer vs Predictive Dialer

Tech Republic

When is the extra efficiency of a predictive dialer vs power dialer worth it? Learn about both types of auto dialers and when to use them.

How To 109
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

AI Agents Are Your New Coworkers: Get To Know Them Better At B2B Summit

Forrester IT

Within three years, agentic AI will impact every area of the business for both buyer and seller, transforming human and nonhuman interactions throughout the purchasing journey and post-sale customer experience. At this years B2B Summit North America, youll learn how to gain value from this powerful tech.

B2B 195
article thumbnail

How CIOs Can Contribute to Corporate Strategy

Information Week

Chief executive officers and corporate boards want their digital chief information officers on the strategic team, but what can CIOs offer to the efforts?

Strategy 143
article thumbnail

Studio founded by Diablo and Diablo II team want to revolutionize the ARPG on $4.5 million budget

TechSpot

Moon Beast Productions recently secured $4.5 million in seed money from several partners in the gaming industry. The company hopes to use the funding to design and develop a groundbreaking ARPG that goes beyond the genre's traditional design templates. $4.5 million is a fairly tight budget, but Moon Beast President.

Budget 105
article thumbnail

United Airlines sets its flight plan for gen AI success

CIO Business Intelligence

CIO Jason Birnbaum has ambitious plans for generative AI at United Airlines. With the core architectural backbone of the airlines gen AI roadmap in place, including United Data Hub and an AI and ML platform dubbed Mars, Birnbaum has released a handful of models into production use for employees and customers alike. Chief among these is United ChatGPT for secure employee experimental use and an external-facing LLM that better informs customers about flight delays, known as Every Flight Has a Stor

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Three Things To Know About How Security Team Toxicity Can Increase Breach Risk

Forrester IT

This research showsthat engaged, healthy, psychologically safe and collaborative security teams experience fewer breaches.

Security 195
article thumbnail

EU Watchdog Fines Meta $263 Million for Data Breach

Information Week

The Irish Data Protection Commission (DPC) says the Facebook parent failed to report and document a 2018 breach that impacted 29 million users, including 3 million in the European Union.

Data 134
article thumbnail

A bakery in Indiana is still using the 40-year-old Commodore 64 as a cash register

TechSpot

Photos have recently surfaced showing that Hilligoss Bakery in Brownsburg, Indiana, uses a pair of Commodore 64s as cash registers. While running a business on a 42-year-old PC might seem unusual, the device likely has sufficient processing power to ring up orders of donuts.

111
111
article thumbnail

Some Telemarketing Lists Are Garbage. Here’s How to Check

Tech Republic

Give your reps a fighting chance by buying high-quality telemarketing lists and steering clear of the junk. Learn what to look for today.

How To 103
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.