|
Microsoft News
|
disable
|
The New Bing And Edge - Progress From Our First Month
It's hard to believe it's been just over a month since we released the new AI-powered Bing and Edge to the world as your copilot for the web.

In that time, we have heard your feedback, learned a lot, and shipped a number of improvements. We are delighted by the virtuous cycle of feedback and iteration that is driving strong Bing improvements and usage.
We wanted to share a bit about what we have learned on your usage of Bing and some of the early stats that are helping to shape our future product development.
|
IT News - CxO
|
disable
|
Top 100 CIOs In The USA
In this ever-dynamic world of IT, where a technology that is in vogue now becomes a thing of the past in the blink of an eye; a world where ignorance and obsolescence are imminent and ever-looming threats, knowledge is power. And CIOs are the superheroes that wield this power.

Not only do they have to be quick-witted in spotting and grabbing opportunities even before they make their presence known to the general public, but they also play a pivotal role in the development and implementation of new technologies in the organization, keeping in mind the compliance and their overall alignment with the company's objectives. The CIO makes sure that the IT resources of the company are used optimally and cost-effectively so that the company thrives.
It indeed takes a superhuman to carry so much weight on their shoulders. Here's a list of the top CIOs in the US (alphabetically), that are making their IT companies forge ahead in a blaze and ushering the rest of us to the age of advancement.
|
Think Carefully Before Considering Cloud Repatriation
After an all-out push of applications and data to the cloud over the past decade, some companies, disappointed with the results, are now considering a reverse migration-at least in part.

Most IT leaders have assets moved to the cloud to achieve some combination of better, faster, or cheaper compute and storage services. They also expect to benefit from the expertise of cloud providers - expertise that isn't easy for companies to develop and maintain in house, unless your company happens to be a technology provider.
|
Teksystems 2023 Report: Uncertainty Impacts Digital Transformation
The 2023 TEKsystems Digital Transformation report reveals some sobering trends on how the current economic uncertainty is having an impact.

IT service management vendor TEKsystems released its 2023 State of Digital Transformation report on Feb. 28, revealing how economic uncertainty is having an impact on decision-making.
Among the key findings in the report is that there are four key strategies that help separate digital transformation leaders from laggards.
|
How To Prepare For A Data Breach Before It Happens
Preparation is key in preventing the worst outcomes from a data breach, so it is important to have a plan in place ahead of time. Here are some steps you can take to prepare for a potential data breach:

Assess your risk: Conduct a risk assessment to identify sensitive data, potential sources of threats, and vulnerabilities in your systems and processes.
Strengthen your security: Implement strong security measures such as encryption, multi-factor authentication, and firewalls to protect your systems and data. Regularly update and patch your software and hardware to stay ahead of the latest threats.
Establish a breach response team: Designate a team of employees who are responsible for responding to a breach. Train them on their roles and responsibilities, as well as the latest breach response techniques.
Develop a breach response plan: Draft a plan that outlines the steps to be taken in the event of a breach. Make sure everyone on the response team is familiar with the plan and knows their part.
Test your plan: Regularly test your breach response plan to ensure it is effective and everyone knows what to do in an actual breach.
Review and update regularly: Regularly review and update your security measures and breach response plan to stay ahead of the latest threats and techniques.
Notify the relevant authorities: Be aware of the laws and regulations regarding data breaches in your jurisdiction, and have the contact information for relevant authorities readily available in case of a breach.
By taking these steps, you will be better prepared to respond to a data breach if it occurs, and you may be able to prevent it from happening in the first place.
|
From CIO To CEP: XPO's Mario Harik On Leveling Up
Since joining XPO in 2011 as CIO, Mario Harik has worked alongside founder Brad Jacobs to create a $7.7 billion business that has technology innovation in its DNA. Now he's running the show, thanks in part to a keen understanding of how IT can impact P&L.

With technology increasingly central to business value, CIOs stepping up to plus-size roles and even making the leap from CIO to CEO is no longer the rare feat it once was. Still, earning that corner office is an achievement few IT leaders can list among their career accomplishments.
As XPO's first CIO, Mario Harik played a key role in making the logistics company an industry leader and innovation powerhouse. Now, as XPO looks to capitalize on that foundation, Harik's deep understanding of both IT and the business has made him the perfect candidate to helm the company in its next phase, having become CEO and a member of the board last August.
|
For Successful Transformations, CIOs Must Evolve
Our world is hybrid and becoming increasingly digitized - a study from McKinsey suggests that the pandemic accelerated companies' adoption of digital or digitally enabled products by seven years.

The ability to connect with one another like never before is exciting, but those connections don't come without their challenges. For example, each new device communicating with the central network is a potential cybersecurity vulnerability, and replicating in-person collaboration among a remote workforce is daunting. Tasked with managing information flows, CIOs have a responsibility to address these challenges without sacrificing the employee experience.
|
Digital Transformation: 3 Guiding Principles For 2023
Looking to do more with less in the coming months? Let these key transformation concepts guide your strategy

Since the onset of the pandemic, we've seen companies innovate at an unprecedented speed. Many of these advances have increased productivity while allowing teams to collaborate more seamlessly. Businesses that have been slow to make these shifts face a competitive disadvantage as they remain behind the tech curve.
The good news is it's not too late to embrace this new era. Here are three things to keep in mind as you level up your transformation in 2023.
|
CISOs Share Their 3 Top Challenges For Cybersecurity Management
The biggest dilemmas in running a modern cybersecurity team are not all about software, said CISOs from HSBC, Citi, and Sepio.

Managing risk on a global scale has always been challenging, but in light of the COVID-19 pandemic, CISOs have had to become even more agile. The shift to hybrid work, the rapid deployment of cloud applications, and the move to continuous integration and continuous development (CI/CD) have emboldened threat actors with new and broader targets.
Meanwhile, the number of devices and endpoints on organizations' networks has increased exponentially. Two veteran CISOs lamented the challenges that these changes have imposed during a webinar last week organized by Sepio, an asset detection and risk management startup.
|
A CIO's First Rule For Automation: Have A Clear Business Case
As more companies strive to improve operations and enhance the customer experience, CIOs lead the charge to implement automation initiatives that work now, and strategies to ensure future success. Establishing the business case, however, is the first step.

By virtue of their position between IT and effecting business strategy, CIOs can identify what processes their organizations need in order to modernize and automate. When it comes to updating core systems to drive operational efficiencies, they also have to ensure that a sound business case exists to automate them, says Laurie Shotton, VP and analyst at Gartner. That's not surprising since CIOs typically own IT automation, as well as help drive business automation. But it's not always a given the two aren't working at cross purposes.
|
IT News - Storage
|
disable
|
Unstructured Data And The Storage IT Needs
We look at unstructured and semi-structured data and find increasing amounts of production workloads that have their own storage hardware - file and object - needs, including flash

IDC estimates that upwards of 80% of business information is likely to be formed of unstructured data by 2025.
And while 'unstructured' can be something of a misnomer, because all files have some sort of metadata by which they can be searched and ordered, for example, there are huge volumes of such data in the hands of businesses.
|
How To Optimize Data Storage Governance
Data governance manages the availability, usability, integrity and security of data. Follow these best practices for governance as it relates to data storage.

Storage governance is increasingly critical as organizations face more data privacy regulations and use analytics to help improve IT operations and business.
Governance initiatives had focused on structured data stored in relational databases, but the process has become more complex. Structured, unstructured and semistructured data are all part of storage governance now, so it's crucial to have a comprehensive strategy.
|
Data-At-Rest Encryption In The Cloud: Explore Your Options
Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.

From aircraft and car manufacturers to pharmaceutical and high-tech companies, military institutions and suppliers - various industries fear espionage. While most of us are too irrelevant in the global struggle for economic and technological dominance, some companies and institutions are less relaxed. It is a real risk that foreign secret services might steal their business secrets and pass them to competitors.
Can (and should) they move their data to the cloud? How does encryption help them? In the following, we discuss four approaches to handling data-at-rest encryption in the cloud after elaborating on three basic patterns for integrating cloud (storage) services in enterprise application landscapes.
|
|
IT News - AI
|
disable
|
The Purpose And Impact Of Creative AI
As robotics began to take on more and more tasks, one of the biggest questions has always been, 'Will robots ever be creative?' That always seemed a laughably distant goal. Without consciousness, a robot couldn't do more than follow directions. Or could it?

With the advent of AI and machine learning, it suddenly became possible to imagine an AI that could learn to interact creatively. Now we have a new question to deal with: 'Will creative AI be more of a problem than it's worth?'
Creative AI and art
One concern many have voiced is that generative AI could encroach on human-specific domains, like art. This fall, an AI artwork won the Colorado State Fair's fine arts competition. The creator, Jason Allen, wasn't an artist. He created the artwork using Midjourney, one of several generative AI art creators.
|
Must Read: The 100 Most Cited AI Papers In 2022
Who Is publishing the most Impactful AI research right now? With the breakneck pace of innovation in AI, it is crucial to pick up some signal as soon as possible.

No one has the time to read everything, but these 100 papers are sure to bend the road as to where our AI technology is going. The real test of impact of R&D teams is of course how the technology appears in products, and OpenAI shook the world by releasing ChatGPT at the end of November 2022, following fast on their March 2022 paper 'Training language models to follow instructions with human feedback'. Such fast product adoption is rare, so to see a bit further, we look at a classic academic metric: the number of citations.
|
Minding The AI Gap
The trouble with data scientists is that far too many organizations expect them to somehow intuitively apply artificial intelligence (AI) to advance business goals even though most of them have limited exposure to the industry segment they now find themselves employed.

Very few data scientists before that are hired by an organization have any kind of vertical industry expertise.
The gap between data science teams and the rest of the business as highlighted by Alejandro Muller, founder of Savvy AI, a digital lending platform that makes use of AI to reduce loan processing costs, during a virtual AI at Scale Summit hosted by the AI Infrastructure Alliance is wider than many business executives fully realize.
|
AI-Generated Content Detection Tools Put To The Test
OpenAI's Generative Pre-Trained Transformer (ChatGPT) has been the talk of the town since its launch in November 2022. The AI chatbot had more than a million users in just 4 days and surpassed 100 million active users in just two months - a milestone that took TikTok more than 9 months to reach.

However, its ability to understand the meaning and context of text inputs and provide almost human-like responses has caused consternation in a number of areas and industries in which original human-generated content is valued. This includes education, content marketing, publishing, journalism and law.
Their biggest questions are 'How do we distinguish between AI and human-written text?' and 'How can we detect AI-generated content?'
|
AI Flew A Fighter Jet For 17 Hours
This marked the first time a bot took control of a military jet.

Add "fly a military fighter jet" to the list of tasks AI can accomplish.
The Defense Department revealed last week that artificial intelligence flew a jet similar to an F-16 for 17 total hours over 12 flights. The series of flights happened in December at Edwards Air Force Base in California, using an experimental plane called the X-62A Vista.
|
IT News - Technology
|
disable
|
Semtech And Broadcom Demonstrate Industry'S First 200G/Lane Electrical-To-Optical Link At OFC 2023
Semtech Corporation, a high-performance semiconductor, IoT systems and Cloud connectivity service provider, announced the successful demonstration of a 200G per lane (200G/lane) optical transmission link enabled by Semtech's latest FiberEdge 200G PAM4 PMDs and Broadcom's latest generation DSP PHY.

In collaboration with Keysight Technologies Inc., Semtech and Broadcom will be conducting a live demonstration based on Semtech's state-of-the-art FiberEdge 200G PAM4 EML Driver and TIA and Broadcom's leading-edge 5nm 112GBd PAM4 DSP platform in Semtech's booth #1901 and Broadcom's booth #6425 at the Optical Fiber Communication (OFC) 2023 exhibition in San Diego, California from March 7 to 9.
|
Hot Chips
The server and HPC processor market has been in a period of change. Repeated delays from Intel and strong positioning from AMD have led to a shift from the long-established dominance that Intel has had in this market.

However, the latest news on Intel's upcoming Intel Xeon scalable processors (code-named Sapphire Rapids) suggests that this increased competition is good for scientists and researchers looking for the best price/performance from their hardware investment.
Researchers using HPC now have a wider choice of viable high-performance computing (HPC) hardware to use in their next generation of supercomputers. In November 2022, AMD announced its latest processor in the Epyc Server lineup of CPU chips. As with other Epyc chips, this is primarily designed for cloud providers, enterprises, and organisations using HPC.
|
Ayar Labs To Demo 'Commercial-Grade' 4Tbps Optical I/O Solution
Ayar Labs, founded in 2015, is pursuing optics as a means of driving higher interconnect speeds and efficiencies in computing. Now, the company is announcing that it plans to demonstrate a staggering 4Tbps optical solution at the Optical Fiber Communication Conference (OFC) i

In an interview with HPCwire, Ayar Labs CEO Charlie Wuischpard called the solution 'the full realization of 'Ayar Labs'' commercial-grade product' and discussed the future of the company and its products.
But first, some technical details. The optical solution that Ayar Labs will be demoing consists of two key components: a SuperNova laser light source and a TeraPHY optical I/O chiplet. According to Ayar Labs, each SuperNova powers eight fiber links, each of which, in turn, is capable of 256Gbps. That gets you 2.048Tbps in each direction, or 4.096Tbps bidirectional.
|
AMD Plans To Bring RAM Closer To CPU Cores - But Don't Expect It On PCs Soon
AMD CEO sheds some light on what the company plans to do reduce data transfer energy

AMD wants to reduce the cost of communication and is on a crusade to bring down the cost of transferring bits between memory and compute significantly by putting RAM on top of the CPU/GPU.
Company CEO Dr. Lisa Su recently delivered a high level presentation at the International Solid-State Circuits Conference (ISSCC) 2023, speaking extensively about the need to cut down on the amount of energy (expressed in Joules) per computation operations (FLOPS).
|
IT News - ERP
|
disable
|
How To Build Future-Facing ERP
Thoroughly understanding the limitations of the legacy platform and mapping out the business case for replacing an enterprise resource planning system will help agencies build for the future instead of reconstructing the past.

The keys to a successful enterprise resource planning (ERP) overhaul are planning, communication and change management, former city and county officials said during a webinar.
Before starting an ERP replacement, agencies should ask questions that will inform the business case for the project, said Christine Binnicker, director of state and local government technology at Guidehouse and a former deputy chief information officer for the city and county of Denver. She spoke about lessons learned from leading an ERP project in 2017 during a Feb. 22 webinar titled 'Executive Perspectives on Preparing for an ERP Replacement Project' and hosted by the National Association of Counties and Guidehouse.
|
IT News - BI
|
disable
|
Business Intelligence Solutions Market To Reach USD 33 Billion By 2025; See The Trends Favoring This Growth
9 significant trends that will shape the enterprise Business Intelligence landscape

As the world continues to generate greater quantities of data from multiple sources, organizations are beginning to understand and appreciate its importance in their operations. To capitalize on this opportunity, businesses around the globe are increasingly turning towards Business Intelligence (BI) solutions - a trend that is expected to continue with an estimated CAGR of 7.6%, driving market growth up to USD 33 billion by 2025, according to MarketsandMarkets analysis.
A well-utilized BI technology can offer numerous advantages, from improved financial visibility through reporting capabilities to better decision-making and increased sales revenue, unlocking possibilities for any organization looking forward to future success.
|
IT News - Security
|
disable
|
The Dark Side Of Microservices: Are Your Applications Secure?
The energy industry is undergoing a massive evolution, much of which is driven by three distinct challenges: ensuring energy security, providing affordable energy, and moving to a cleaner and more sustainable energy future.

The United States Energy Information Administration (EIA) estimates that energy demand will increase by 50% over the next 30 years, while just in the last 12 months energy prices have increased significantly-with some parts of the world experiencing record energy prices and energy shortages. In addition, the energy industry is working to reduce its environmental footprint and accelerate the transition to renewable sources. Herein lies the question-how does the energy industry ensure affordable access to energy, but with a significantly lower environmental footprint?
|
How To Create A Computer Security Incident Response Team (CSIRT): 10 Best Practices
While the convenience and ease of public cloud technology has had a major impact on enabling scalable business operations to work from anywhere and increase productivity everywhere, the risks around using cloud technology are still slowly being realised and calculated by many organisations as they experience related attacks

That is according to the Cloud (In)Security research from Zscaler Threatlabz, which analyses cloud workload statistics from over 260 billion daily transactions globally across the Zscaler platform.
According to the report 98.6% of organisations have concerning misconfigurations that cause critical risks to data and infrastructure. This stat is alarming because the majority of cyberattacks on public clouds have been revealed to be due to misconfigurations rather than vulnerabilities. Cloud misconfiguration errors related to public access to storage buckets, account permissions, password storage and management, etc., have led to the exposure of billions of records.
|
How I Broke Into A Bank Account With An AI-Generated Voice
Banks in the U.S. and Europe tout voice ID as a secure way to log into your account. I proved it's possible to trick such systems with free or cheap AI-generated voices.

The bank thought it was talking to me; the AI-generated voice certainly sounded the same.
On Wednesday, I phoned my bank's automated service line. To start, the bank asked me to say in my own words why I was calling. Rather than speak out loud, I clicked a file on my nearby laptop to play a sound clip: 'check my balance,' my voice said. But this wasn't actually my voice. It was a synthetic clone I had made using readily available artificial intelligence technology.
|
Despite Cybersecurity Investments, Breaches Increasing
A survey of 300 CIOs, CISOs and security executives from enterprises in Europe and the U.S. that have more than 1,000 employees found 88% of organizations have been breached in the past two years

This is despite the fact that, on average, they have 44 security solutions in place. Nearly half of the respondents (45%) have been breached in the last 12 months.
Conducted by Surveyz Research on behalf of Pentera, a provider of an automated platform for validating cybersecurity controls, the survey published today also found that only 6% of respondents said their organization has less than 10 security tools and platforms in place.
|
Busting Myths Around Cybersecurity Team Training
New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams.

In recent years, cybersecurity has garnered a staggering amount of attention, especially with the rise of high-profile data breaches. But, we still find companies grappling with an absent plan for preparing staff to handle impending and emerging threats. A new research report developed with Omdia examines several common myths about professional cybersecurity training in the hopes of assisting practitioners and technology vendors in dispelling some of these myths and better preparing your organization for the future.
|
Building An Incident Response Framework For Your Enterprise
Understanding incident response framework standards and how to build the best framework for your organization is essential to prevent threats and mitigate cyber incidents.

Incident response coordinates approaches to manage cyber incidents and fallout to limit the consequences. Incident response frameworks guide the direction and definition of response preparedness, planning and execution by outlining and detailing its elements, steps and stages.
Why is an incident response framework important?
In 2021 alone, there were nearly 24,000 security incidents, which resulted in more than 5,200 confirmed data breaches, according to the "2022 Data Breach Investigations Report" from Verizon. Because breaches continue to mount, often due to hacking or malware, exposure must be reined in.
|
8 Of The Biggest Ransomware Attacks In Recent History: A Look Back
Ransomware incidents have increased in frequency over the past several years, to the point where this method has become the weapon of choice for many bad actors, who can now launch attacks through ransomware service providers that resemble legitimate technology outfits.

Verizon reports a dramatic surge in the attack method in 2022 - a quarter of all breaches for the year included ransomware. Meanwhile, as Sophos reports in its 'State of Ransomware 2022' report, ransomware impacted 66% of organizations in 2021, an increase of nearly 80% over the prior year.
Let's take a look at 8 prominent ransomware attacks that illustrate the ways modern cyber criminals are approaching ransomware. These attacks also show how damaging ransomware can be to not only corporate organizations, but also to the general public when personal data and entities like municipal infrastructure organizations are targeted.
|
5 Reasons For The Shortage Of Cybersecurity Professionals
If your college-aged child is wondering what they should do for a living, here's a great suggestion - cybersecurity. It might be the best way to keep them from moving back home after they earn their diploma.

There simply aren't enough professionals with the right skill sets to fill the number of open cybersecurity positions out there. This means super low unemployment and very competitive pay. Lack of supply and high demand is a worker's best friend.
Some Shocking Numbers
Here's an encouraging, and shocking, stat - in the U.S., the job market for cybersecurity professionals is growing 12 times faster than the overall job market. The bottom line is that there simply aren't enough professionals who possess the right skill sets.
|
4 Reasons Why Data Breaches Keep Happening To Organizations
Why Data Breaches Keep Happening to Organizations and What Actions Companies Can Take to Stop It

Over the past decade, data breaches have become more frequent and more destructive, with the average cost of a data breach rising over 13% since 2020 according to IBM. Companies of all sizes and across all industries are struggling to protect their data, keep client and employee information private, and defend themselves from malicious cyberattacks.
|
|
|
Sections in this issue:
click to jump to section
|
|
|