A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements. Continued…
Quote of the Day
“In addition to strong collaboration between technology teams and business units, the gig economy will factor heavily into the future of IT jobs.” – Mary K. Pratt
Tips to build a successful digital customer service strategy
Learn how to create a successful digital customer service and support strategy with insights from Wendy’s, Chamberlain Group and DoorDash on how they integrated Salesforce AI and added social media channels.
Embedded IT, global talent to define future of IT jobs
What’s the future of IT jobs in the enterprise? Corporate IT departments aren’t likely to disappear anytime soon, experts said, but much about them will change, including how people will work and where talent is sourced.
Top five markets disrupted by sharing economy apps
Sharing economy apps can thrive and disrupt incumbent industries. Explore the five top markets that could become the next frontier of digital disruption.
New tech trends in HR: Josh Bersin predicts employee experience ‘war’
Noted HR analyst Josh Bersin, formerly of Bersin by Deloitte, outlined new tech trends in HR at the 2018 HR Technology Conference, which runs from Sept. 11 to 14. Bersin spoke on AI and employee experience and predicted a ‘war’ for which system employees use first.
Eight human capital management functions every HR department needs
Learn the eight must-have human capital management functions that every successful HR department needs in the age of contingent labor, employee engagement, people analytics and AI.
The CEO sighed and shook her head. “Your whole department only brought in three new accounts last month. I need you guys to be __________.”
b. purple squirrels
DNA storage is the process of encoding and decoding binary data onto and from synthesized strands of DNA (deoxyribonucleic acid). Continued…
Quote of the Day
“Despite the challenges that come with DNA-based data storage, the technology shows enough promise for scientists to continue to look for practical solutions.” – Robert Sheldon
DNA data storage developments demonstrate serious potential
DNA data storage may sound like something out of a science fiction novel, but it is nonetheless becoming a rising possibility for the future of data storage media. See what developments have occurred and where the technology could still use some improvements.
Could DNA storage be the future of data storage technology?
The scope of data storage technology is moving well beyond the realm of magnetics and solid-state electronics and into the world of biology, particularly DNA storage.
Another Breakthrough in Microsoft DNA Storage
Microsoft is trying to take the lead in commercial DNA storage with the goal of having a Microsoft DNA storage appliance by the end of the decade.
Molecular memory could boost HDD density
New molecular memory promises to boost density, save drive size and add a third bit state for hard disks. Increased storage density is becoming more important as the amount of data continues to grow.
Atomic storage offers speed and capacity, lacks intelligence
Though atomic storage could make it possible to store terabytes of data on single atoms, the process has to occur at minus 300 degrees Celsius, making its promise far from reality.
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
Robotics quotient (RQ) is a way of scoring a company or individual’s ability to work effectively with robots, just as intelligence quotient (IQ) tests provide a score that helps gauge human cognitive abilities. Continued…
Quote of the Day
“Robotics quotient enables CIOs to identify gaps or areas where you need to prioritize resources before you make a big bet on automation and AI.” – J.P. Gownder
Success with automation and AI requires a high ‘RQ’
CIOs who want to succeed with deploying automation and AI in the enterprise need to develop their robotics quotient if they want to be successful.
IoT and robotics, evolving together
Though still in early adoption stages, IoT and robotics work hand in steel hand. Read on to learn the benefits of adding smarts to robotics for automation.
Forget Hollywood’s AI promises, results are what inspires next-gen tech pros
A new generation of workers flocked to HubWeek 2018 to hear panelists tackle the stigma of AI in the workplace. Their tip? Lose the glamour and focus on the scope of technology.
New deep learning algorithms could improve robot sight
The world is filled with unpredictable events. Self-driving cars and other real-world robot navigators are not very good at dealing with that kind of complexity. Carnegie Mellon’s David Held is developing deep learning algorithms to do something about that.
Robotic process automation can speed payer claims processing
Robotic process automation can make claims processing more efficient for health insurance payers and providers by minimizing the human labor factor.
Before I invest time and money in a certification for mechatronics, I want to seek ______ from someone at the Robotic Industries Association (RIA).
3Vs (volume, variety and velocity) are three defining properties or dimensions of big data. Continued…
Quote of the Day
“Industry experts typically classify big data using the 3Vs model: volume, variety and velocity. This categorization holds up whether your business handles enterprise applications with large data sets or whether it’s a consumer-facing startup with tens of thousands of users for your social app.” – Twain Taylor
3 ways to prep microservices applications for big data
Big data management is a complex task, especially with distributed microservices applications. But by thinking carefully about database structuring and management, application management teams can get a handle on that task.
Beat the challenges of predictive analytics in big data systems
Doing predictive analytics in big data environments creates a unique set of challenges, but also presents opportunities to those who are ready to handle them.
Big data trends: What enterprise architects need to prepare for
Progress Software’s Jesse Davis says now that the notorious 3Vs have been tended to, big data trends include moving toward inquiry, insight and innovation.
Big data analytics: New patterns emerge for security
Will big data and predictive analytics really make security better? With data scientists in short supply, solution providers work on big data analytics tools for enterprise users.
Cloud-based applications must deal with quirks of big data
Developers need to add veracity to volume, velocity and variety (the 3Vs of big data) when creating cloud-based applications. All four factors are crucial for business agility.
Information extraction is a process intended to pull meaningful data from noisy text without making _________ changes in the author`s intended meaning.
COPE (corporate-owned, personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones. Continued…
Quote of the Day
“Despite the challenges associated with the COPE model, some organizations might greatly benefit from the control it returns to their IT departments, especially when it comes to protecting sensitive data.” – Robert Sheldon
How to sharpen a corporate mobile device strategy
A strong corporate mobile device strategy should take cost and security factors into consideration. Check out these best practices to ensure that employees use mobile devices effectively in an organization.
COPE devices bring big benefits to IT
Organizations that provide COPE devices to users don’t have to manage them any differently than BYOD. Learn more about the benefits of this ownership model.
Enterprise mobility: What to expect in 2018
MOBI’s Josh Garrett discusses trends for enterprise mobility in 2018, explaining why Microsoft will be relevant in mobility and why exclusive BYOD is out.
BYOD or COPE: Which enterprise mobility strategy is right for you?
Learn about the pros and cons of the BYOD and COPE models so you can make an informed decision about which enterprise mobility strategy to implement in your organization.
Compare these top EMM providers and their potential impact
The most prominent EMM providers all possess their own strengths and shortcomings. Learn which vendor would best support your system.
BYOD policies often illustrate a significant ________ between administrators and employees.
A talent pipeline is a group of job candidates who are able to immediately step in and fill an open position. Continued…
Quote of the Day
“Because jobs are changing so fast, you’re going to need talent with core skills and agility to pick up and go from one department and function to another.” – Jeanne Meister
At its Talent Connect, LinkedIn unveils ATS and broad strategy
LinkedIn announced at its Talent Connect conference an applicant tracking system that aims at small and midsize businesses. Meanwhile, for enterprise users, LinkedIn will work further on integrations, including with Oracle’s HCM cloud systems.
How HR can improve the candidate experience in recruitment
The candidate experience in recruitment is an HR trend that has larger implications for the company. Here’s what it is and how to improve it.
Foot Locker improves its candidate experience and hiring
Foot Locker, a major retailer, has adopted a new talent management system with the goal of improving its candidate experience, as well as automating some functions. It’s also using personality assessments.
Heading into 2018, HR tech market remains hot and competitive
HR tech market investments in applicant tracking systems are expected to rise in 2018 and recruiting tech to be in demand. Midmarket offers room for growth.
Talent assessment tool helps restaurants save in hiring and training
The operator of O’Charley’s and Ninety Nine Restaurant & Pub screens job applicants with the OutMatch talent assessment tool to predict the best hires.
The successful candidate will have a ___________ in Communications.
a. master’s degree
b. masters degree
PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports. Continued…
Quote of the Day
“With a PACS, a healthcare provider can access patient information or medical images essentially from anywhere in the world and review the most up-to-date scans and reports almost instantly.” – Megan Charles
How hospitals are using the cloud for medical image storage
As the amount of medical imaging data continues to grow, many healthcare organizations are turning to the cloud for their medical image storage needs.
The current state of PACS software and where it goes from here
Many healthcare organizations are still using PACS software for their medical imaging needs. However, the technology is changing due in no small part to the introduction of the cloud as a backup or replacement for on-premises systems.
HPE 3PAR StoreServ all-flash fixes hospital’s image problems
An Illinois health provider won an HPE 3PAR StoreServ 8450 all-flash array as part of a vendor-sponsored contest. The all-flash storage provides a flash cache to load radiology images faster.
A look at the leading medical imaging software on the market
Learn about the leading medical imaging software and how these products help blend old and new tech to promote collaborative healthcare environments.
What makes up a medical imaging system?
Learn about the technology that makes up a medical imaging system and see how it all helps healthcare organizations create, store and share medical images.
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. Continued…
Quote of the Day
“Any developer building cloud-based applications, most of which run as a service, should familiar with the 12 factors.” – Michael Maximilien
CI/CD workflows, IT roles lead to organizational disharmony
Disparate CI/CD workflows within an organization can make it more difficult to build development stages into a DevOps pipeline, but the biggest barriers to progress are culture challenges, not technological ones.
Developing cloud applications must play by the rules — all 12 of them
Scalability isn’t enough when developing cloud applications. They need to be self-healing, self-restarting and able to recover their last state.
Manage app dependencies carefully for serverless platforms
Challenges with app dependencies on serverless platforms relate to native modules, deployment packages and more. Overcome them with these tips.
Cloud Foundry users grapple with stateful cloud-native apps
Stateful cloud-native apps remain a contradiction in terms, but Cloud Foundry PaaS users envision a future where persistent data services come into the 12-factor fold.
Container backup follows data persistence to these ephemeral apps
Following the addition of data persistence, container backup is the latest enhancement to these ephemeral applications. Container application data must be protected like all other enterprise data.
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Continued…
Quote of the Day
“Device security should be incorporated into any design, and IoT deployments are not exempt. The general approach is to use the CIA triad: ensure the confidentiality, integrity and availability of the technology.” – Rick Vanover
What tactics can organizations adopt to drive cloud security practices?
In this SearchCIO Ask the Expert, Gartner research director Marco Meinardi highlights cloud security practices that CIOs can implement for effective use of public cloud services.
Now and later with IoT: What to consider regarding cost, reliability and security
While the benefits of IoT are becoming clear for many organizations, considering cost, reliability and security prior to deployment are critical. Veeam’s Rick Vanover discusses.
CISO: Data integrity and confidentiality are ‘pillars’ of cybersecurity
In this Q&A, learn how one cybersecurity industry veteran maintains what she said are the basic, fundamental aspects of information protection: ensuring data integrity and confidentiality.
Get smart with cloud backup security through ‘CIA’
IT will often wonder if backup data is safe in the cloud. Ensure cloud backup security with data confidentiality, integrity and availability.
Gartner Catalyst 2018: A future without data centers?
Advancements in cloud computing has allowed some organizations to move toward shutting down entire data centers. At the Gartner Catalyst 2018 conference in San Diego, Gartner research vice president Douglas Toombs discussed ways to determine which applications are cloud-ready.
Today’s CISO needs interpersonal skills in order to _________ others in the boardroom to support their cybersecurity vision.
A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval. Continued…
Quote of the Day
“TLB-splitting segregates the portion of a computer’s memory where a program stores its data from the portion where it stores its own code’s instructions.” – Michael Cobb
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
TLBleed exploits use Intel’s HTT feature to leak data. Learn how hackers could use this new side-channel attack to obtain sensitive memory information.
TLBleed attack can extract signing keys, but exploit is difficult
Researchers discovered a side-channel attack, named TLBleed, that abuses the Hyper-Threading feature of Intel chips. But Intel said customers should be immune, even without a patch.
Virtualization isn’t perfect, but SLAT minimizes hypervisor overhead
Second Level Address Translation can help reduce hypervisor overhead, but you may need to check for SLAT support on existing systems and enable support in the BIOS.
CPU features you need for virtualization
CPU features are critical to hypervisor performance. Choosing the right hardware can ensure your virtualized workloads run at peak performance.
Can a new encryption trick prevent reverse engineering?
Learn about Hardened Anti-Reverse Engineering System, or HARES, which cannot exactly prevent reverse engineering, but makes it a little tougher for attackers to complete.
There are three major areas of __________ network virtualization, storage virtualization and server virtualization.