Remove Advantage Remove Benchmarking Remove Security
article thumbnail

CIO metrics are failing digital transformation; it’s time to radically rethink success

CIO

The remaining five metrics, including uptime and availability, cost control, operational efficiency, compliance, and security, are deeply rooted in traditional IT priorities. Where innovation and agility are key drivers of competitive advantage, traditional IT metrics that shaped IT for the past 50 years are insufficient.

article thumbnail

What fuels Soltour’s strategy of digitalization and innovation

CIO

The bigplayers,such as OTAs [Online Travel Agencies], are advancing in their adoption of new technologies, taking advantage of AI andbig datatools,while other actors are in earlier stages of integration, he says. However, he adds,the maturityvaries in one of the most consolidated verticals at a national level.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 top business use cases for AI agents

CIO

At the time, the best AIs couldnt pass the 5% mark on the SWE-bench, a challenging benchmark designed to see how well AI can solve real-world coding problems. We cant do that for security reasons, he says. Mitre has also tested dozens of commercial AI models in a secure Mitre-managed cloud environment with AWS Bedrock.

Business 538
article thumbnail

Gaining an AI advantage: Not all AIs are created equal

CIO

By analyzing large volumes of clean data from various sources, such as network traffic logs and user behavior patterns, AI can correctly identify anomalies and potential security breaches that may go unnoticed by traditional security measures. Real-time processing is key to keeping systems secure and ensuring swift incident handling.

Advantage 397
article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

Changing consumer behavior and expectations, competition from major e-retailers, evolving cybersecurity challenges, inflationary pressures, sustainability and environmental concerns, and the pressure to take advantage of AI are all very real concerns for retailers today. IDC, June 2024).

Retail 243
article thumbnail

Strategies to combat GenAI implementation risks

CIO

This skepticism necessitates rigorous questioning of vendors about privacy, data protection, security, and the use of training data. Organizations need to determine whether to allow or upgrade to the functionality depending on the privacy, security, accuracy, and transparency implications of the embedded implementation.

article thumbnail

Open source software: Ways for CISOs to quell the fear

CIO

Open source libraries and modules have been at the heart of many of the major software supply chain security vulnerabilities in recent years – which is not surprising given that, on the whole, open source projects lack the extensive security oversight that major commercial software vendors provide.

Security 476