Remove Development Remove Presentation Remove Systems Review Remove Technical Review
article thumbnail

TDD saved the day

Xebia

Armed with a few assumptions about how things should work, I embarked on developing an application with a graphical UI and a backend. The goal was to compare two object graphs and present them in a way a user could selectively merge them. This was convenient as it allowed me to maintain a TDD flow without external dependencies.

article thumbnail

5 steps for making tech ethics work for your company

CIO

Generative AI breakthroughs over the past year have crystalized a significant issue that IT leaders have long been aware of but few have addressed programmatically: tech ethics. Confronted with the prospect of destroying civilization, tech leaders have proposed two paths: moratoria on development or legislative regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How PwC and SAP are doing right by helping clients unlock ESG value

CIO

When presented by the new Supply Chain Due Diligence Act ( SCDDA) in Germany, PwC realized their clients would need tools and processes to automate evaluation of suppliers. Managing risk takes teamwork The team at PwC developed the CYVC application using SAP tools along with PwC’s best practice risk analysis methodology.

article thumbnail

10 best practices when partnering for strategic skills

CIO

Enterprise CIOs have always been at a disadvantage competing with tech firms for skilled IT pros, but accelerated transformation efforts and an AI gold rush have significantly intensified the talent war, prompting CIOs to increasingly turn to outside firms for help. Last June, for example, Dun & Bradstreet launched D&B.AI

article thumbnail

Unveiling the risks of OT systems and how to secure them

CIO

When we consider what security means for an organization, most think of needing to secure systems and devices like cloud computing instances, servers, employee workstations, and other tech commonly seen in the workplace. To address this, attack surface management (ASM) offers a lifeline for organizations to secure their OT systems.

article thumbnail

CIOs eager to scale AI despite difficulty demonstrating ROI, survey finds

CIO

There is a promising surge in the use of AI technologies across various industries. This transition has propelled AI and machine learning to the forefront, with 51% of CIOs identifying these technologies as among their most urgent priorities, alongside cybersecurity, highlighting their crucial role in driving organizational success.

Survey 342
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO

In fact, Gartner estimates that by 2026, nearly one-third of enterprises will consider identity verification and authentication solutions unreliable due to AI-generated deepfakes. First, you’ll need to understand exactly how bad actors use AI deepfakes to attack your systems.