In the 1980s, everyone got excited about the possibility of artificial intelligence. The excitement grew for a few years and then gradually faded as companies found that it was too hard to build and maintain useful expert systems or natural language interfaces. However, there has been a renewed interest in developing software applications that can interact with people in natural languages, perform complex decision-making tasks, or assist human experts in complex analysis efforts. Today these systems are called cognitive computing systems or machine learning. They rely on research from artificial intelligence laboratories and use new techniques like deep learning and reinforcement which seem to overcome some of the problems that were encountered with earlier AI Read more
Christine Generali is a Group Publisher for Cutter Consortium - responsible for the editorial direction and content management of Cutter's flagship publication, Cutter IT Journal.
Cutter’s Curt Hall is conducting research on the measures organizations are taking to safeguard their data in light of the persistent breaches that have become commonplace in our world. This confidential survey seeks to gauge the various trends impacting organizations’ data security protection practices, and the extent to which organizations are using data-centric practices and technologies. Survey results will be revealed in upcoming Cutter Consortium research. Those who complete the survey will receive a $50 Cutter Bookstore credit. Thanks in advance for your participation! Take the survey.
This upcoming issue of Cutter IT Journal seeks articles on new approaches, strategies, and solutions to help IT professionals address and prevent the possibility of cyber attacks stemming from IoT related devices. Cyber threats have been on the rise, and more so with the advent of the Internet of Everything (IoE). Common appliances are now featuring intelligent processing and real-time connections to the Internet. Health measurements are now collected in real-time by smart wearables, including general purpose smart watches. The latest models from automobile manufacturers feature cloud connectivity for enabling remote software updates, tracking fuel consumption, and streaming dashcam activity. On a larger scale, the smart grid ensures seamless and dynamic allocation of energy where Read more
Shout out to Cutter Fellow Bob Charette for winning the esteemed 2016 Jesse H. Neal Award for his series of articles featured in the “Lessons from a Decade of IT Failures” – detailing the takeaways from tracking the big IT debacles of the last ten years. After Bob’s 2005 article, “Why Software Fails” – he started tracking, documenting and blogging about technology failures of all sizes. Ten years later, he selected five of these IT project failures to feature in the report, “Lessons from a Decade of IT Failures,” replete with interactive graphs and charts – now recognized and rewarded for its editorial excellence in business media. A very well deserved honor — congratulations, Bob! Read more
Analytics — deep, predictive, operational, (insert preferred flavor here) — has climbed to the top of business executives wish lists in the past few years. The explosion of big data from social media sources and the coming supernova from the Internet of Things promises complete understanding of customer needs as well as the prediction/influencing of future behavior. With sufficient data, best of breed algorithms, faster computers, and emerging deep learning approaches — statistical correlation will become a largely exact science. Understanding causation will become an unnecessary luxury. Welcome to the analytics nirvana. Of course, inspiration and implementation often diverge. The day-to-day practicality of big data analytics continues to raise ongoing challenges. The “P-words” — preparation, people, prediction, and production point Read more
“We are rushing headlong into the robotics revolution without consideration for the many unforeseen problems lying around the corner. It is time now to step back and think hard about the future of the technology before it sneaks up and bites us when we are least expecting it.” – Noel Sharkey, Foundation for Responsible Robotics One of the more vexing issues of Sharkey’s robotics revolution requires hard thinking – whether or not the computing algorithms that underpin it are “ethical.” For example, what path should a self-driving car be programmed to take in the event it finds itself in a situation where it may either have to crash into a bus stop full of school Read more
The Internet of Things (IoT) is rapidly emerging as a transformational paradigm with a multitude of products and services now available and being adopted by corporations as well as individuals seeking to harness the vast opportunities it offers. But we do face a major obstacle in realizing the full potential of the IoT. The sheer variety, volume and velocity of data generated by the IoT presents unprecedented challenges in deriving meaningful and actionable insights and calls for a strategic approach to data management and usage. These approaches also need to address business strategies, business processes, enterprise architecture, systems and applications, and security and privacy considerations. It is also important to examine and decide what data Read more