Tue.Feb 13, 2024

article thumbnail

Is China’s Economic Dominance at an Inflection Point?

Harvard Business Review

In 2023 China lost the top spot on the list of countries whose companies populate the Fortune Global 500 list, a position it had held since toppling the USA in 2019. Is this an inflection point or will the US (one core at the top) and China exchange the position as they struggle for global economic domination in the decades ahead? This article presents six reasons for believing that China is unlikely to recover the top spot and suggests ways in which US, European, and Japanese firms can exploit

Company 101
article thumbnail

5 key metrics for IT success

CIO

IT leaders are drowning in metrics, with many finding themselves up to their KPIs in a seemingly bottomless pool of measurement tools. The result is wasted time, confusion, and, in some cases, conflicting insights. There are several important metrics that can be used to achieve IT success, says Jonathan Nikols, senior vice president of global enterprise sales for the Americas at Verizon.

Metrics 349
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Engineering Practices for LLM Application Development

Martin Fowler

LLM engineering involves much more than just prompt design or prompt engineering. Here David Tan and Jessie Wang reflect on how regular engineering practices such as testing and refactoring helped them deliver a prototype LLM application rapidly and reliably.

article thumbnail

Oracle Cloud SCM gets new capabilities to help manage logistics

CIO

Oracle is adding new capabilities to its Supply Chain and Manufacturing (SCM) Fusion Cloud to help enterprises manage their logistics. The new features appear in its Oracle Transportation Management and Oracle Global Trade Management applications, and include expanded business intelligence capabilities, enhanced logistics network modelling, a new trade incentive program, and an updated Transportation Management Mobile application.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Easily Share Google Drive Files to Google Calendar Meeting Attendees

Xebia

If you’re working on a file that you’ll need to share later during a meeting, you used to have to add it through Google Calendar, right? Well, that is no longer the only option: now you can also share your document to a calendar appointment, directly from your document. Sharing in Drive has been evolving since 2020 Since the introduction of the new sharing dialog for Google Drive, Docs, Sheets, Slides, and Forms in 2020, Google has made several enhancements to make sharing effortless

Meeting 130

More Trending

article thumbnail

Share a Link to a Specific Time in Google Drive Video

Xebia

Do you ever send links to videos stored on Google Drive? If so, there’s probably also a need to direct the people you share the link with to a specific time in the video. From now on it is possible to share a timestamped link to specific parts of a video. This will take the recipient of the link directly to the indicated timestamp in the video.

Video 130
article thumbnail

IDC Middle East CIO Summit 2024: How CIOs Are Embracing the AI Era

CIO

Get ready for the IDC Middle East CIO Summit 2024. Addressing the theme ‘The Future of IT: Rethinking Digitalization for an AI Everywhere World’. This 17th annual edition will explore the pivotal shift that is reshaping the region’s IT landscape and provide essential guidance on navigating AI’s transformative influence across industries. Expert speakers will dissect the reality of an ‘AI Everywhere’ world and empower IT leaders to understand their new roles in today’s AI-infused landscape.

article thumbnail

Eclipsing Rolodex Firms: Welcome to the Vanguard of Executive Search

N2Growth Blog

In the ever-evolving arena of executive recruitment , the quaint notion of measuring a search firm’s prowess by the girth of their Rolodex—or the extent of their social registry, if you will—is as archaic as the term “Rolodex” itself. It conjures images of dusty offices filled with towering stacks of index cards, each bearing a name and number, a relic of a bygone era.

.Net 147
article thumbnail

Preserving rainforests through innovation and collaboration

CIO

Rainforests are under threat from deforestation and climate change. Urgent action is needed to preserve these vital ecosystems, often called the lungs of the Earth. Recognizing that this will take long-term innovation and collaboration, NTT has teamed up with ClimateForce, an organization dedicated to combating climate change, to launch the Smart Rainforest project.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A Workplace to Envy: 6 Questions to Ensure Your Culture Is Values-Driven

CEO Insider

You want your working culture to say something about your organization. But what is it saying right now? Companies with a thriving and supportive workplace boast better performance. In 2022, almost half of the more culture-forward organizations experienced a significant increase in revenue, much higher than the 9% of their more conventional peers. What’s more, […] The post A Workplace to Envy: 6 Questions to Ensure Your Culture Is Values-Driven appeared first on CEOWORLD magazine.

Culture 131
article thumbnail

Black Tech Pipeline connects Black IT pros to DEI-committed employers

CIO

In 2018, Pariss Chandler posed a question on Twitter, asking “ What does Black Twitter in Tech look like? ” A software engineer at the time, Chandler consistently found herself to be the only Black person in the room at work and wanted to connect with others who were having similar experiences. The tweet went viral, connecting her to a large community of Black tech workers on Twitter, much to Chandler’s surprise.

article thumbnail

Microsoft’s February 2024 Patch Tuesday Addresses 73 CVEs (CVE-2024-21351, CVE-2024-21412)

Tenable

5 Critical 66 Important 2 Moderate 0 Low Microsoft addresses 73 CVEs, including two zero-day vulnerabilities that were exploited in the wild. Microsoft patched 73 CVEs in its February Patch Tuesday release, with five rated critical, 66 rated as important and two rated as moderate. This month’s update includes patches for: NET Azure Active Directory Azure Connected Machine Agent Azure DevOps Azure File Sync Azure Site Recovery Azure Stack Internet Shortcut Files Microsoft ActiveX Microsoft Azure

LAN 124
article thumbnail

A new way of working transforms Foodstuffs South Island’s digital services

CIO

When Shayne Tong took up the role of chief digital officer at New Zealand supermarket co-operative Foodstuffs South Island in 2022, it was clear there was opportunity to modernise and reset how the team worked. The organisation had conducted an independent IT capability review in the months prior, which found that the digital services team was technically strong, but that the structure of the teams and ways of working meant engagement and retention rates were lower than other parts of the co-ope

article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.

article thumbnail

Why Collaboration Is Critical in Uncertain Times

Harvard Business Review

Recent research suggests that when resources become limited, many business leaders’ inclinations are to become risk-averse and protect their own interests, fostering a culture of conservatism and prioritizing stability over innovation. In such circumstances, the emphasis often shifts toward preserving existing assets, reducing expenditures, and maintaining the status quo, which can hinder the organization’s ability to adapt, pivot, and thrive in a competitive environment.

Games 117
article thumbnail

How DEX Benefits IT & Security Operations: 5 Top Use Cases

Ivanti

I was recently explaining the importance of digital employee experience (DEX) management to a consultant who is a self-described "digital nomad" and works from wherever he pleases. The connection to DEX may not have entirely been clear, until I explained that his ability to easily do his work remotely using online tools exemplifies what good DEX is all about in the era of Everywhere Work.

article thumbnail

A Lacework perspective on recent CISA guidance on “Identifying and Mitigating Living Off the Land Techniques”

Lacework

On February 7, 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), in partnership with U.S. government agencies and Australian, New Zealand, Canadian, UK security agencies, released joint guidance for security practitioners. The guidance focuses on addressing nation-state threats, and particularly, persistent threats that utilize living off the land (LOTL) techniques to invade and persist for extended periods within networks and cloud environments.

Security 109
article thumbnail

How a Serverless Architecture Can Help You Secure Cloud-Native Applications

Tenable

Cybersecurity teams often struggle with securing cloud-native applications, which are becoming increasingly popular with developers. The good news is that deploying these applications on a serverless architecture can make it easier to protect them. Here’s why. Cloud-native architecture has opened up new avenues for developers, bringing individual components out of monolithic server configurations and making them readily available as consumable services.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The Practicalities of Open Sourcing

DevOps.com

If you're contemplating the daring act of open sourcing your projects, here are some things to know before you set out.

article thumbnail

How to Deal with a Condescending Colleague

Harvard Business Review

Working with a condescending coworker is irritating at best and career-limiting at worst. But you don’t need to sit back and suffer. In this article, the author outlines steps you can take to curb your colleague’s bluster or at least lessen its impact on you and your career.

How To 100
article thumbnail

Introducing SafeTest: A Novel Approach to Front End Testing

Netflix Tech

by Moshe Kolodny In this post, we’re excited to introduce SafeTest, a revolutionary library that offers a fresh perspective on End-To-End (E2E) tests for web-based User Interface (UI) applications. The Challenges of Traditional UI Testing Traditionally, UI tests have been conducted through either unit testing or integration testing (also referred to as End-To-End (E2E) testing).

Testing 97
article thumbnail

February 2024 Patch Tuesday

Ivanti

Microsoft Resolves 73 Unique CVEs on Patch Tuesday This Patch Tuesday, Microsoft has resolved 73 new unique CVEs, two of which are confirmed to be exploited, five of which are rated as critical. In addition, seven CVEs have been reissued, one of which dates back to 2021 and was publicly disclosed and exploited on original release. The reissue is information only, but worth giving a second look to be sure you are covered.

article thumbnail

Embedded Analytics Insights for 2024

Organizations look to embedded analytics to provide greater self-service for users, introduce AI capabilities, offer better insight into data, and provide customizable dashboards that present data in a visually pleasing, easy-to-access format. To better understand the factors behind the decision to build or buy analytics, insightsoftware partnered with Hanover Research to survey IT, software development, and analytics professionals on why they make the embedded analytics choices they do.

article thumbnail

Modern gRPC Microservices, Part 3: Managing Plugins With Buf.build

Dzone - DevOps

We concluded the last article by generating a gRPC Gateway service to act as a proxy in front of our gRPC chat service. This service would convert familiar REST/HTTP requests from clients to/from our gRPC services. We also briefly discussed how the protoc utility orchestrates various plugins to generate various artifacts: solely via stdin and stdout.

article thumbnail

Decontrol AI to Accelerate Solutions

Ooda Loop

In a previous post we asked “Is the US Government Over-Regulating Artificial Intelligence?” We followed it with some historical context and a summary of today’s government controls in “Regulations on Government Use of AI.

article thumbnail

Apple’s Dilemma: Balancing Privacy and Safety Responsibilities

Harvard Business Review

How should Apple CEO Tim Cook manage the tension between iPhone customers’ privacy and public safety?

Wireless 114
article thumbnail

3 killer apps for cloud-based generative AI

InfoWorld

I’ve been working with artificial intelligence systems since the 1980s. Back then, AI was considered a revolution in leveraging computer systems to achieve unheard-of capabilities. Things are much the same today with generative AI (genAI). But to avoid the mistakes made during the first generations of AI systems, businesses must understand what AI is valid for and what it is not.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Zero Traffic, Zero Watts

Dell EMC

We have arrived at the intersection of sustainability, energy consumption and modern (4G/5G) telecommunications networks.

article thumbnail

Microsoft Graph Toolkit 4.0 boosts search, developer experience

InfoWorld

Microsoft is shipping version 4.0 of its Graph Toolkit, a set of components for working with the Microsoft Graph. The update brings the search components to general availability, enhances the developer experience, and fixes bugs. Microsoft Graph is a set of APIs for accessing data and intelligence in the Microsoft 365 business software platform. Unveiled February 8 , Microsoft Graph Toolkit 4.0 allows users to edit To Do items directly in components and see colleagues’ presence and cards when us

article thumbnail

Security Considerations in Kubernetes

Dzone - DevOps

Kubernetes is a robust container orchestration technology that is extensively used for containerized application deployment, scaling, and management. While Kubernetes provides a number of capabilities for protecting containerized workloads, it is critical to understand and handle numerous security aspects in order to successfully safeguard your clusters and applications.