A virtual reality headset is a heads-up display (HUD) that allows users to interact with simulated environments and experience a first-person view (FPV). Continued…
Quote of the Day
“Businesses adopting virtual and augmented reality technologies need a robust application development infrastructure — one that supports a variety of headgear, networking options and software.” – Paul Korzeniowski
Impact of virtual and augmented reality technologies comes into focus
Virtual reality, mixed reality and augmented reality technologies promise to reshape the IoT market by turning data into action.
Augmented and virtual reality make a play for the enterprise
Experts at Deloitte Digital explained why augmented and virtual reality are poised to shake up the enterprise: The Data Mill reports.
Virtual reality could create more immersive visual collaboration
Virtual and augmented reality could be the next step in visual collaboration. Learn how VR and AR hardware present new opportunities for enterprises.
Oculus trial: Even if Facebook loses, VR to prevail
No matter the outcome of the Oculus trial, VR will have its day in the enterprise. CIOs, take note. Also in Searchlight: U.S. DOL sues Oracle; Twitter drops Fabric.
Virtual reality devices are the next generation of computing, IDC says
When evaluating wearables, IT can’t leave out augmented and virtual reality devices, which are poised to have a major effect on the enterprise.
________ reality uses an existing environment and overlays digital information on top of it.
A graph database, also called a graph-oriented database, is a type of NoSQL database that uses graph theory to store, map and query relationships. Continued…
Quote of the Day
“Graph data modeling is an iterative process, and each attempt at devising a model and running some queries may trigger alterations in the ways that entities are linked and relationships are defined.” – David Loshin
Graph data model cements tight relationships between data elements
Graph databases offer more flexibility and better usability than relational database management systems. Learn more about the benefits of a graph data model.
Graph database technology starts to come of age beyond social media
Graph databases, based on mathematics known for three centuries, are starting to yield value for businesses beyond Facebook and Twitter.
Graph technology the beating heart of new data management tools
Graph technology is now appearing in many data applications. At Informatica World, it underlay a host of systems, including a new metadata catalog.
Semantic graph database underpins healthcare data lake
Underpinning a data lake for healthcare providers is a semantic graph database that enables predictive analytics using data from multiple sources.
Graph databases: Joining the dots
We explore why the growth of graph databases could be pointing the database market in a new direction.
What does NoSQL stand for?
a. No SQL
b. Not only SQL
Amazon Simple Notification Service (SNS) is a cloud service for coordinating the delivery of push messages from software applications to subscribing endpoints and clients. Continued…
Quote of the Day
“Push architectures can reduce CPU and network usage and bring greater energy efficiency to mobile devices.” – George Lawton
Compare Amazon SNS to other push notification services
These push notification services from the big three cloud providers enable mobile app messaging and let developers focus on coding application logic.
Can AWS push notifications improve service performance?
AWS push notifications can be harbingers of bad news, but they provide a necessary service for IT teams operating in the AWS cloud.
Amazon cloud services: What’s new?
Expert Chris Moyer discusses whether Amazon cloud services are new or simply updates of older services.
Find an AWS messaging service to fit your needs
AWS messaging services meet different enterprise needs. Choose carefully between Amazon SQS and SNS to ensure you’re using the right system for the job.
Real-time app development helps minimize delays
AWS provides several services for real-time app development, but developers must be careful to reduce delays throughout the development pipeline.
_______ notfications are CPU-intensive because they must continually poll a remote server.
Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. Continued…
Quote of the Day
“If we come up with a great idea today, but can’t execute it until next month, it’s worthless in real-time content marketing.” – Blair Hammond
The dos and don’ts of brand content marketing
As consumers get savvier about avoiding traditional advertising, companies are turning to brand content marketing to become trusted providers of information.
Thought leadership content marketing: How the IT channel can benefit
Learn how thought leadership content marketing can help IT channel firms build their businesses’ reputations in the industry and generate new leads.
Five common pitfalls in content marketing strategies
While it may seem hard to believe, companies aren’t yet convinced that they need content marketing strategies to be successful.
Creating an effective content marketing strategy
A content marketing strategy starts with homing in on customer experience and aligning technology and processes with it.
Content marketing strategies can soar — or fall flat
Too often, companies’ content marketing strategies lack insight into what content resonates with target audiences and prompts action like sales.
______ marketing often uses traditional offline advertising methods like flyers, magazines, television, radio and billboards.
A storage snapshot is a set of reference markers for data at a particular point in time. Continued…
Quote of the Day
“Storage snapshots act almost like a rewind feature for admins, enabling them to roll back to uncorrupted versions of data. Unfortunately, they aren’t as simple as hitting a button.” – Jim O’Reilly
Implement cloud storage snapshots to protect critical data
Cloud storage snapshots let admins roll back to uncorrupted versions of data. Learn how often to take them, and prepare for these potential issues.
Snapshot management tool adds intelligent data management
Copy data management innovator Catalogic updates ECX snapshot management tool to version 2.6, supporting a broader number of databases and file systems.
When does storage snapshot technology work best?
Learn why storage snapshot technology is best equipped for certain rollbacks, and when to use it for application server protection.
Everything you need to know about snapshotting
Jason Buffington looks at how snapshotting works, why storage snapshots matter, different snapshot mechanisms and how to get more from them.
How to choose the right snapshot method
Snapshots and replication are popular data protection tools, but they present challenges. Learn how to find the right snapshot method for your data center.
Data _____ is used for long-term data retention of information not needed for everyday operations.
Natural language processing (NLP) is the ability of a computer program to understand human speech as it is spoken. Continued…
Quote of the Day
“The new wave of enterprise interfaces will rely on natural language processing and generation, visual analytics and gesture interpretation — technologies powered by AI.” – Nicole Laskowski
Three trends to keep top of mind when crafting an AI strategy
When developing an AI strategy, CIOs should consider three trends, according to Gartner analyst Whit Andrews.
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.
Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.
Health IT experts discuss how they’re using NLP in healthcare
NLP in healthcare will become increasingly important. Two health IT experts discuss how they’re using NLP in their healthcare organizations.
The relationship between population health and NLP in healthcare
Two health IT experts discuss NLP in healthcare and the role it plays in achieving population health.
_____ learning algorithms are stacked in a hierarchy of increasing complexity and abstraction.
Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected. Continued…
Quote of the Day
“If we’re going to live in a world where things are going to be driven by algorithms, we have to be able to convey their ambiguity.” – Donald Farmer
AI analytics expected to rise, along with management complexity
The use of AI analytics applications and the complexity of managing them are both likely to grow, according to predictions by consultants and vendor execs.
Security looks to machine learning technology for a cognitive leg up
Machine learning technology has proven to work well for some information security tasks, acting as a cognitive leg up for security managers and analysts.
Right data mining data sets are a must for proper predictive modeling
To help avoid analytics errors, data scientists need to be careful when choosing the data mining data sets they use to build predictive models.
Analytics VP: AI projects must be built on a good data foundation
The less-hyped aspects of AI projects, which include data governance, can’t be rushed if companies want to take advantage of the technology.
Think different: Cognitive computing systems will bring data-led change
Cognitive computing systems will replace old programming models and devise applications based on data.
This is the simulation of human thought processes in a computerized model.
a. cognitive computing
b. machine learning
Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued…
Quote of the Day
“One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gapped networks that provide a physical line of defense.” – Ken Spinner
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers tracked the Dragonfly 2.0 hacker group as it used social engineering attacks in order to set up persistent infections on ICS networks.
Using a software-defined perimeter to create an air-gapped network
Learn how the Cloud Security Alliance’s software-defined perimeter can help enterprises build a dynamic, air-gapped network using the cloud.
Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.
Protection against ransomware requires strong backup
One of the keys in protection against ransomware is implementing a solid data protection strategy that includes having data spread across different media.
Separate but equal: Mitigating the risk of Web-borne malware infections
Web-borne malware infections are a key threat to systems, but systems have to be running to be harmed. Separation is an effective method to reduce the potential damage of a malware attack.
This is a type of malware designed to obtain administrator-level access to the victim’s system.
b. Trojan horse
Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold. Continued…
Quote of the Day
“Tackling the inventory challenge requires investment, but it can be attained quickly via real-time connectivity and sophisticated orchestration across different systems.” – Oliver Guy
What can a materials planner do to better manage inventory?
A materials planner is in the tricky position of ensuring the right balance of inventory. Here’s some advice on striking the balance of enough, but not too much.
Three ways IoT is transforming inventory management
The connectivity and real-time analytics inherent in the internet of things could be the game changer for retailers’ inventory woes.
The essential guide to supply chain management best practices
Supply chain management best practices include collaboration, strategy and technology. This guide provides essentials on all three.
Top four supply chain strategies to create the omnichannel experience
Transforming your supply chain to deliver an omnichannel experience is key to gaining a competitive edge. Here are four ways to make that happen.
Eight keys to supply chain sustainability
Supply chain sustainability is critical to businesses looking to build a competitive edge and brand image. Here’s some guidance you need to know.
__________ management is primarily about specifying the quantity and placement of stocked goods.
On-demand computing is a delivery model in which computing resources are made available to the user as needed. Continued…
Quote of the Day
“Cloud computing has shifted the technology model, giving customers on-demand computing services over the Internet…” – Nicole Lewis
Curb on-demand self-service risks with cloud inventory management
Cloud’s on-demand self-service model can lead to shadow IT risks. Fortunately, admins can use cloud inventory management to regain control.
Autonomic computing may pave the way to software-defined data centers
With larger IT shops under increasing pressure to deliver competitive applications and services, many see autonomic computing as a solution.
The true definition of cloud computing is still lost on some IT pros
The true definition of cloud computing, in many cases, has been lost on businesses and even some IT teams. Expert Mark May clears up the confusion.
Cloud BI projects: Partners finding BI work, but not profits
Cloud BI work is growing for channel partners, who find ample consulting opportunities. But they must make do without traditional BI income sources, such as servers and storage.
Which cloud model is best for your big data project?
While public, private and hybrid cloud can all play a role in your big data project, public cloud is emerging as the most popular option. But that doesn’t mean it’s right for you.
Cloud ___________ is the exercise of administrative control over public, private and hybrid clouds.