A customer journey map, sometimes referred to as a customer experience map, is a visual representation of the path a customer takes when interacting with a company. Continued…
Quote of the Day
“Combining a customer journey map with the business capability maps created by many EA teams allows corporate IT to easily root-cause pain points in the customer experience.” – Mark Tonsetic
How enterprises can take advantage of social media mapping
Businesses are increasingly using social media mapping to learn more about customers. Here’s how one company addresses the growth in social media channels.
Predictive analytics improve customer experience journey
Worldwide smartphone manufacturer turns to an AI software company with the goal of delivering a stellar customer experience journey.
Why EA should take the lead on improving customer experience
CIOs are asking their EA teams to take the lead on improving customer experience. Here’s why.
Customer journey maps can stave off dismal customer experience
Customer journey maps enable companies to anticipate a customer’s needs and wants, and how they will interact through channels. They can prevent a customer experience train wreck.
Customer relationship management tools have revolutionized engagement
Customer relationship management tools are keeping pace with the rapidly evolving world of CRM by providing technology that opens new paths to customer engagement.
Data _______ is a graphical representation of numerical data.
The Fair Credit Reporting Act (FCRA) is United States federal legislation that promotes accuracy, fairness and privacy for data used by consumer reporting agencies. Continued…
Quote of the Day
“Most of the lawsuits [over the Equifax data breach] allege that Equifax violated the FCRA, which Equifax has pushed Congress to amend so that damages in class actions brought under the statute would be capped.” – Amanda Bronstad
Equifax breach response deemed insufficient in multiple ways
Experts said the Equifax breach response has been lacking due to the company being unprepared for the attack and unable to be transparent enough in the aftermath.
Apache Struts vulnerability blamed for Equifax data breach
Equifax admitted the major data breach affecting 143 million U.S. citizens was caused by a critical Apache Struts vulnerability that was left unpatched.
FTC: Analyzing big data creates discrimination risk
Companies are reaping the benefits of dissecting consumer information, but the FTC is warning companies about the discrimination risks of analyzing big data.
Data-driven decision-making in the face of catastrophe
Data-driven decision-making meets Mother Nature. Plus: Equifax breach, Amazon’s HQ2 and federal regs for driverless cars.
Risk & Repeat: Equifax data breach response called into question
This Risk & Repeat podcast episode discusses the Equifax data breach and why the company’s response to the event has raised big questions.
This a kind of malware that is designed to collect information and data on users and observe their activity without users’ knowledge.
A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV). Continued…
Quote of the Day
“Businesses adopting virtual and augmented reality technologies need a robust application development infrastructure — one that supports a variety of headgear, networking options and software.” – Paul Korzeniowski
Impact of virtual and augmented reality technologies comes into focus
Virtual reality, mixed reality and augmented reality technologies promise to reshape the IoT market by turning data into action.
Augmented and virtual reality make a play for the enterprise
Experts at Deloitte Digital explained why augmented and virtual reality are poised to shake up the enterprise: The Data Mill reports.
Virtual reality could create more immersive visual collaboration
Virtual and augmented reality could be the next step in visual collaboration. Learn how VR and AR hardware present new opportunities for enterprises.
Oculus trial: Even if Facebook loses, VR to prevail
No matter the outcome of the Oculus trial, VR will have its day in the enterprise. CIOs, take note. Also in Searchlight: U.S. DOL sues Oracle; Twitter drops Fabric.
Virtual reality devices are the next generation of computing, IDC says
When evaluating wearables, IT can’t leave out augmented and virtual reality devices, which are poised to have a major effect on the enterprise.
________ reality uses an existing environment and overlays digital information on top of it.
A graph database, also called a graph-oriented database, is a type of NoSQL database that uses graph theory to store, map and query relationships. Continued…
Quote of the Day
“Graph data modeling is an iterative process, and each attempt at devising a model and running some queries may trigger alterations in the ways that entities are linked and relationships are defined.” – David Loshin
Graph data model cements tight relationships between data elements
Graph databases offer more flexibility and better usability than relational database management systems. Learn more about the benefits of a graph data model.
Graph database technology starts to come of age beyond social media
Graph databases, based on mathematics known for three centuries, are starting to yield value for businesses beyond Facebook and Twitter.
Graph technology the beating heart of new data management tools
Graph technology is now appearing in many data applications. At Informatica World, it underlay a host of systems, including a new metadata catalog.
Semantic graph database underpins healthcare data lake
Underpinning a data lake for healthcare providers is a semantic graph database that enables predictive analytics using data from multiple sources.
Graph databases: Joining the dots
We explore why the growth of graph databases could be pointing the database market in a new direction.
What does NoSQL stand for?
a. No SQL
b. Not only SQL
Amazon Simple Notification Service (SNS) is a cloud service for coordinating the delivery of push messages from software applications to subscribing endpoints and clients. Continued…
Quote of the Day
“Push architectures can reduce CPU and network usage and bring greater energy efficiency to mobile devices.” – George Lawton
Compare Amazon SNS to other push notification services
These push notification services from the big three cloud providers enable mobile app messaging and let developers focus on coding application logic.
Can AWS push notifications improve service performance?
AWS push notifications can be harbingers of bad news, but they provide a necessary service for IT teams operating in the AWS cloud.
Amazon cloud services: What’s new?
Expert Chris Moyer discusses whether Amazon cloud services are new or simply updates of older services.
Find an AWS messaging service to fit your needs
AWS messaging services meet different enterprise needs. Choose carefully between Amazon SQS and SNS to ensure you’re using the right system for the job.
Real-time app development helps minimize delays
AWS provides several services for real-time app development, but developers must be careful to reduce delays throughout the development pipeline.
_______ notfications are CPU-intensive because they must continually poll a remote server.
Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. Continued…
Quote of the Day
“If we come up with a great idea today, but can’t execute it until next month, it’s worthless in real-time content marketing.” – Blair Hammond
The dos and don’ts of brand content marketing
As consumers get savvier about avoiding traditional advertising, companies are turning to brand content marketing to become trusted providers of information.
Thought leadership content marketing: How the IT channel can benefit
Learn how thought leadership content marketing can help IT channel firms build their businesses’ reputations in the industry and generate new leads.
Five common pitfalls in content marketing strategies
While it may seem hard to believe, companies aren’t yet convinced that they need content marketing strategies to be successful.
Creating an effective content marketing strategy
A content marketing strategy starts with homing in on customer experience and aligning technology and processes with it.
Content marketing strategies can soar — or fall flat
Too often, companies’ content marketing strategies lack insight into what content resonates with target audiences and prompts action like sales.
______ marketing often uses traditional offline advertising methods like flyers, magazines, television, radio and billboards.
A storage snapshot is a set of reference markers for data at a particular point in time. Continued…
Quote of the Day
“Storage snapshots act almost like a rewind feature for admins, enabling them to roll back to uncorrupted versions of data. Unfortunately, they aren’t as simple as hitting a button.” – Jim O’Reilly
Implement cloud storage snapshots to protect critical data
Cloud storage snapshots let admins roll back to uncorrupted versions of data. Learn how often to take them, and prepare for these potential issues.
Snapshot management tool adds intelligent data management
Copy data management innovator Catalogic updates ECX snapshot management tool to version 2.6, supporting a broader number of databases and file systems.
When does storage snapshot technology work best?
Learn why storage snapshot technology is best equipped for certain rollbacks, and when to use it for application server protection.
Everything you need to know about snapshotting
Jason Buffington looks at how snapshotting works, why storage snapshots matter, different snapshot mechanisms and how to get more from them.
How to choose the right snapshot method
Snapshots and replication are popular data protection tools, but they present challenges. Learn how to find the right snapshot method for your data center.
Data _____ is used for long-term data retention of information not needed for everyday operations.
Natural language processing (NLP) is the ability of a computer program to understand human speech as it is spoken. Continued…
Quote of the Day
“The new wave of enterprise interfaces will rely on natural language processing and generation, visual analytics and gesture interpretation — technologies powered by AI.” – Nicole Laskowski
Three trends to keep top of mind when crafting an AI strategy
When developing an AI strategy, CIOs should consider three trends, according to Gartner analyst Whit Andrews.
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.
Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.
Health IT experts discuss how they’re using NLP in healthcare
NLP in healthcare will become increasingly important. Two health IT experts discuss how they’re using NLP in their healthcare organizations.
The relationship between population health and NLP in healthcare
Two health IT experts discuss NLP in healthcare and the role it plays in achieving population health.
_____ learning algorithms are stacked in a hierarchy of increasing complexity and abstraction.
Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected. Continued…
Quote of the Day
“If we’re going to live in a world where things are going to be driven by algorithms, we have to be able to convey their ambiguity.” – Donald Farmer
AI analytics expected to rise, along with management complexity
The use of AI analytics applications and the complexity of managing them are both likely to grow, according to predictions by consultants and vendor execs.
Security looks to machine learning technology for a cognitive leg up
Machine learning technology has proven to work well for some information security tasks, acting as a cognitive leg up for security managers and analysts.
Right data mining data sets are a must for proper predictive modeling
To help avoid analytics errors, data scientists need to be careful when choosing the data mining data sets they use to build predictive models.
Analytics VP: AI projects must be built on a good data foundation
The less-hyped aspects of AI projects, which include data governance, can’t be rushed if companies want to take advantage of the technology.
Think different: Cognitive computing systems will bring data-led change
Cognitive computing systems will replace old programming models and devise applications based on data.
This is the simulation of human thought processes in a computerized model.
a. cognitive computing
b. machine learning
Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued…
Quote of the Day
“One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gapped networks that provide a physical line of defense.” – Ken Spinner
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers tracked the Dragonfly 2.0 hacker group as it used social engineering attacks in order to set up persistent infections on ICS networks.
Using a software-defined perimeter to create an air-gapped network
Learn how the Cloud Security Alliance’s software-defined perimeter can help enterprises build a dynamic, air-gapped network using the cloud.
Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.
Protection against ransomware requires strong backup
One of the keys in protection against ransomware is implementing a solid data protection strategy that includes having data spread across different media.
Separate but equal: Mitigating the risk of Web-borne malware infections
Web-borne malware infections are a key threat to systems, but systems have to be running to be harmed. Separation is an effective method to reduce the potential damage of a malware attack.
This is a type of malware designed to obtain administrator-level access to the victim’s system.
b. Trojan horse