CIO Influence

Category : Guest Authors

Apps Data Management Guest Authors Machine Learning Natural Language

Buggy AI apps and why human oversight remains critical in QA

Robert Salesas
From McDonaldโ€™s to Xโ€™s Grok AI and even Air Canada, weโ€™ve seen a fair share of AI-related failures this year. For organizations striving to accelerate...
Guest Authors IT services Machine Learning Security

AIOps and the Future of DevOps

Justin Holtzinger
The convergence ofย DevOps and AIOpsย is highly likely, as organizations strive for greater automation, agility, and intelligence in their software development and operations. This convergence and...
Data Management Guest Authors Machine Learning Natural Language Security

Byte-Sized Battles: Top Five LLM Vulnerabilities in 2024

Ambuj Kumar
In a plot twist straight out of a futuristic novel, Large Language Models (LLMs) have taken the cybersecurity world by storm over the past few...
Cloud Computing Datacentre Enterprise software Guest Authors

Addressing Rising VMware Costs and Sustainability Goals with the Right Virtualization Strategy

George Crump
With VMware’s price increases, many CIOs are facing new financial challenges. At the same time, data center sustainability has become a pressing priority, with organizations...
Guest Authors IT services Machine Learning Security

The Arbitrage Opportunity of Small Language Models: Unlocking AI Efficiency and Performance

Devvret Rishi
Introduction In the rapidly evolving field of artificial intelligence, the prevailing narrative often emphasizes that model size begets model quality. The assumption is that bigger...
Apps Data Management Guest Authors Machine Learning Security

How to Secure LCNCโ€™s External Attack Surface

Amichai Shulman
Organizations are embracing low-code/no-code (LCNC) platforms and robotic process automations (RPAs) at an unprecedented pace, often underestimating the security risks they introduce. These platforms promise...
Guest Authors Security Technology

Maximizing Value: Optimizing Cybersecurity with Existing Systems

Nate Galimore
As cybersecurity continues to evolve, one trend is becoming clear: organizations are now placing greater emphasis on maturing their existing authentication capabilities. The question is...