chơi xổ số keno trực tuyến

{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2024-12-04T08:01:08+00:00"},"categoryId":33572,"data":{"title":"Information Technology","slug":"information-technology","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572}],"parentCategory":{"categoryId":33512,"title":"Technology","slug":"technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"}},"childCategories":[{"categoryId":33574,"title":"AI","slug":"ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":148,"bookCount":6},{"categoryId":33577,"title":"Data Science","slug":"data-science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33577"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":369,"bookCount":25},{"categoryId":33581,"title":"Networking","slug":"networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33581"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":266,"bookCount":23},{"categoryId":33586,"title":"General Information Technology","slug":"general-information-technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33586"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":22,"bookCount":10}],"description":"These days, information technology (aka IT) is everybody's business. Check out these articles on some of the coolest new tech making the rounds today.","relatedArticles":{"self":"//dummies-api.coursofppt.com/v2/articles?category=33572&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":805,"bookCount":64},"_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":808,"items":[{"headers":{"creationTime":"2024-12-01T15:39:09+00:00","modifiedTime":"2024-12-01T15:39:09+00:00","timestamp":"2024-12-01T18:01:09+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33577"},"slug":"data-science","categoryId":33577},{"name":"Big Data","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33578"},"slug":"big-data","categoryId":33578}],"title":"Beyond Boundaries: Unstructured Data Orchestration","strippedTitle":"beyond boundaries: unstructured data orchestration","slug":"beyond-boundaries-unstructured-data-orchestration","canonicalUrl":"","查找组件SEO":{"metaDescription":"Find out what data orchestration is and how an unstructured data architecture can work for you.","noIndex":0,"noFollow":0},"content":"Getting the most out of your unstructured data is an essential task for any organization these days, especially when considering the disparate storage systems, applications, and user locations. So, it’s not an accident that data orchestration is the term that brings everything together.\r\n\r\nBringing all your data together shares similarities with conducting an orchestra. Instead of combining the violin, oboe, and cello, this brand of orchestration combines distributed data types from different places, platforms, and locations working as a cohesive entity presented to applications or users anywhere. That’s because historically, accessing high-performance data outside of your computer network was inefficient. Because the storage infrastructure existed in a silo, systems like HPC Parallel (which lets users store and access shared data across multiple networked storage nodes), Enterprise NAS (which allows large-scale storage and access to other networks), and Global Namespace (virtually simplifies network file systems) were limited when it came to sharing. Because each operated independently, the data within each system was siloed making it a problem collaborating with data sets over multiple locations.\r\n\r\nCollaboration was possible, but too often you lost the ability to have high performance. This Boolean logic decreased potential because having an IT architecture that supported both high performance and collaboration with data sets from different storage silos typically became an either/or decision: You were forced to choose one but never both.\r\n<h2 id=\"tab1\" >What is data orchestration?</h2>\r\nData orchestration is the automated process of taking siloed data from multiple data storage systems and locations, combining and organizing it into a single namespace. Then a high-performance file system can place data in the edge service, data center, or cloud service most optimal for the workload.\r\n\r\nThe recent rise of data analytic applications and artificial intelligence (AI) capabilities has accelerated the use of data across different locations and even different organizations. In the next data cycle, organizations will need both high-performance and agility with their data to compete and thrive in a competitive environment.\r\n\r\nThat means data no longer has a 1:1 relationship with the applications and compute environment that generated it. It needs to be used, analyzed, and repurposed with different AI models and alternate workloads, and across a remote, collaborative environment.\r\n<p class=\"remember\">Hammerspace’s technology makes data available to different foundational models, remote applications, decentralized compute clusters, and remote workers to automate and streamline data-driven development programs, data insights, and business decision making. This capability enables a unified, fast, and efficient global data environment for the entire workflow — from data creation to processing, collaboration, and archiving across edge devices, data centers, and public and private clouds.</p>\r\n\r\nControl of enterprise data services for governance, security, data protection, and compliance can now be implemented globally at a file-granular level across all storage types and locations. Applications and AI models can access data stored in remote locations while using automated orchestration tools to provide high-performance local access when needed for processing. Organizations can grow their talent pools with access to team members no matter where they reside.\r\n<h2 id=\"tab2\" >Decentralizing the data center</h2>\r\nData collection has become more prominent, and the traditional system of centralized data management has limitations. Issues of centralized data storage can limit the amount of data available to applications. Then, there are the high infrastructure costs when multiple applications are needed to manage and move data, multiple copies of data are retained in different storage systems, and more headcount is needed to manage the complex, disconnected infrastructure environment. Such setbacks suggest that the data center is no longer the center of data and storage system constraints should no longer define data architectures.\r\n\r\nHammerspace specializes in decentralized environments, where data may need to span two or more sites and possibly one or more cloud providers and regions, and/or where a remote workforce needs to collaborate in real time. It enables a global data environment by providing a unified, parallel global file system.\r\n<h2 id=\"tab3\" >Enabling a global data environment</h2>\r\nHammerspace completely revolutionizes previously held notions of how unstructured data architectures should be designed, delivering the performance needed across distributed environments to\r\n<ul>\r\n \t<li>Free workloads from data silos.</li>\r\n \t<li>Eliminate copy proliferation.</li>\r\n \t<li>Provide direct data access through local metadata to applications and users, no matter where the data is stored.</li>\r\n</ul>\r\nThis technology allows organizations to take full advantage of the performance capabilities of any server, storage system, and network anywhere in the world. This capability enables a unified, fast, and efficient global data environment for the entire workflow, from data creation to processing, collaboration, and archiving across edge devices, data centers, and public and private clouds.\r\n\r\nThe days of enterprises struggling with a siloed, distributed, and inefficient data environment are over. It’s time to start expecting more from data architectures with automated data orchestration. Find out how by downloading <em>Unstructured Data Orchestration For Dummies,</em> Hammerspace Special Edition, <a class=\"bookSponsor-btn\" href=\"//hammerspace.com/for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">here</a>.","description":"Getting the most out of your unstructured data is an essential task for any organization these days, especially when considering the disparate storage systems, applications, and user locations. So, it’s not an accident that data orchestration is the term that brings everything together.\r\n\r\nBringing all your data together shares similarities with conducting an orchestra. Instead of combining the violin, oboe, and cello, this brand of orchestration combines distributed data types from different places, platforms, and locations working as a cohesive entity presented to applications or users anywhere. That’s because historically, accessing high-performance data outside of your computer network was inefficient. Because the storage infrastructure existed in a silo, systems like HPC Parallel (which lets users store and access shared data across multiple networked storage nodes), Enterprise NAS (which allows large-scale storage and access to other networks), and Global Namespace (virtually simplifies network file systems) were limited when it came to sharing. Because each operated independently, the data within each system was siloed making it a problem collaborating with data sets over multiple locations.\r\n\r\nCollaboration was possible, but too often you lost the ability to have high performance. This Boolean logic decreased potential because having an IT architecture that supported both high performance and collaboration with data sets from different storage silos typically became an either/or decision: You were forced to choose one but never both.\r\n<h2 id=\"tab1\" >What is data orchestration?</h2>\r\nData orchestration is the automated process of taking siloed data from multiple data storage systems and locations, combining and organizing it into a single namespace. Then a high-performance file system can place data in the edge service, data center, or cloud service most optimal for the workload.\r\n\r\nThe recent rise of data analytic applications and artificial intelligence (AI) capabilities has accelerated the use of data across different locations and even different organizations. In the next data cycle, organizations will need both high-performance and agility with their data to compete and thrive in a competitive environment.\r\n\r\nThat means data no longer has a 1:1 relationship with the applications and compute environment that generated it. It needs to be used, analyzed, and repurposed with different AI models and alternate workloads, and across a remote, collaborative environment.\r\n<p class=\"remember\">Hammerspace’s technology makes data available to different foundational models, remote applications, decentralized compute clusters, and remote workers to automate and streamline data-driven development programs, data insights, and business decision making. This capability enables a unified, fast, and efficient global data environment for the entire workflow — from data creation to processing, collaboration, and archiving across edge devices, data centers, and public and private clouds.</p>\r\n\r\nControl of enterprise data services for governance, security, data protection, and compliance can now be implemented globally at a file-granular level across all storage types and locations. Applications and AI models can access data stored in remote locations while using automated orchestration tools to provide high-performance local access when needed for processing. Organizations can grow their talent pools with access to team members no matter where they reside.\r\n<h2 id=\"tab2\" >Decentralizing the data center</h2>\r\nData collection has become more prominent, and the traditional system of centralized data management has limitations. Issues of centralized data storage can limit the amount of data available to applications. Then, there are the high infrastructure costs when multiple applications are needed to manage and move data, multiple copies of data are retained in different storage systems, and more headcount is needed to manage the complex, disconnected infrastructure environment. Such setbacks suggest that the data center is no longer the center of data and storage system constraints should no longer define data architectures.\r\n\r\nHammerspace specializes in decentralized environments, where data may need to span two or more sites and possibly one or more cloud providers and regions, and/or where a remote workforce needs to collaborate in real time. It enables a global data environment by providing a unified, parallel global file system.\r\n<h2 id=\"tab3\" >Enabling a global data environment</h2>\r\nHammerspace completely revolutionizes previously held notions of how unstructured data architectures should be designed, delivering the performance needed across distributed environments to\r\n<ul>\r\n \t<li>Free workloads from data silos.</li>\r\n \t<li>Eliminate copy proliferation.</li>\r\n \t<li>Provide direct data access through local metadata to applications and users, no matter where the data is stored.</li>\r\n</ul>\r\nThis technology allows organizations to take full advantage of the performance capabilities of any server, storage system, and network anywhere in the world. This capability enables a unified, fast, and efficient global data environment for the entire workflow, from data creation to processing, collaboration, and archiving across edge devices, data centers, and public and private clouds.\r\n\r\nThe days of enterprises struggling with a siloed, distributed, and inefficient data environment are over. It’s time to start expecting more from data architectures with automated data orchestration. Find out how by downloading <em>Unstructured Data Orchestration For Dummies,</em> Hammerspace Special Edition, <a class=\"bookSponsor-btn\" href=\"//hammerspace.com/for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">here</a>.","blurb":"","authors":[{"authorId":9204,"name":"John Carucci","slug":"john-carucci","description":" <p><b>John Carucci </b>is not a celebrity, though he certainly brushes up against the stars of stage and screen on a regular basis in his role as an Entertainment TV Producer with the Associated Press. Along with hobnobbing with actors and musicians, John is also author of <i>Digital SLR Video & Filmmaking For Dummies</i> and two editions of <i>GoPro Cameras For Dummies</i>.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9204"}}],"primaryCategoryTaxonomy":{"categoryId":33578,"title":"Big Data","slug":"big-data","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33578"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"What is data orchestration?","target":"#tab1"},{"label":"Decentralizing the data center","target":"#tab2"},{"label":"Enabling a global data environment","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":207996,"title":"Big Data For Dummies Cheat Sheet","slug":"big-data-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","big-data"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207996"}},{"articleId":207478,"title":"Statistics for Big Data For Dummies Cheat Sheet","slug":"statistics-for-big-data-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","big-data"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207478"}},{"articleId":207432,"title":"Big Data for Small Business For Dummies Cheat Sheet","slug":"big-data-for-small-business-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","big-data"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207432"}},{"articleId":168988,"title":"Integrate Big Data with the Traditional Data Warehouse","slug":"integrate-big-data-with-the-traditional-data-warehouse","categoryList":["technology","information-technology","data-science","big-data"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/168988"}},{"articleId":168986,"title":"Big Data Planning Stages","slug":"big-data-planning-stages","categoryList":["technology","information-technology","data-science","big-data"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/168986"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;big-data&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656a1f65440bd\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;big-data&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656a1f6544d68\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Hammerspace","brandingLink":"//hammerspace.com/","brandingLogo":{"src":"//www.coursofppt.com/wp-content/uploads/hammerspace-logo-266x55-1.png","width":266,"height":55},"sponsorAd":"","sponsorEbookTitle":"Unstructured Data Orchestration For Dummies, Hammerspace Special Edition","sponsorEbookLink":"//hammerspace.com/for-dummies/","sponsorEbookImage":{"src":"//www.coursofppt.com/wp-content/uploads/unstructured-data-orchestration-hammerspace-special-edition-cover-9781394211364-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-12-05T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301250},{"headers":{"creationTime":"2024-11-30T19:54:20+00:00","modifiedTime":"2024-12-01T15:18:41+00:00","timestamp":"2024-12-01T18:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"General AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"Five Ways Machine Health Delivers Real Business Value","strippedTitle":"five ways machine health delivers real business value","slug":"five-ways-machine-health-delivers-real-business-value","canonicalUrl":"","查找组件SEO":{"metaDescription":"Find out the five ways machine health delivers real value for your business and how much you can save with Augury's Machine Health.","noIndex":0,"noFollow":0},"content":"We depend on machines to produce everyday essentials — such as power, food, and medicine — and to support nearly every aspect of society. Thus, machine health is vital to overall manufacturing and business health. Machine health transforms reliability, maintenance, operations, and asset performance management by using artificial intelligence (AI) and Internet of Things (IoT) technologies to improve performance, reduce downtime, and help manufacturers reach Industry 4.0 standards.\r\n<h2 id=\"tab1\" >Transform the way you work</h2>\r\nIn an era of labor shortages and technology innovation, manufacturing needs to move faster toward digitization. Using AI in manufacturing, companies can eliminate repetitive tasks, reduce inefficiencies, and strengthen data-driven decision making. With insights into the real-time condition of their machines, workers can break away from traditional maintenance schedules and manual tasks. This means more time for proactive work and collaboration with other departments, which leads to stronger cross-functional teams. It also leads to further innovations, such as process optimization. When employees have insights into the health of their machines, they can predict their workdays and own their schedules, opening up new opportunities for innovation and engagement.\r\n\r\nLearn more about transforming the way you work with machine health at <a href=\"//www.augury.com/use-cases/business-goal/transform-the-way-you-work\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/transform-the-way-you-work</a>.\r\n<h2 id=\"tab2\" >Eliminate unnecessary downtime</h2>\r\nUnplanned downtime can be expensive. There’s the cost of the repairs themselves, lost production and sales, and reputational damage. Maintenance and reliability teams often have to scramble to diagnose and fix the problem as quickly as possible — often resulting in overtime pay and expedited shipping costs for emergency spare parts. Sudden and catastrophic machine failures can also harm worker morale and jeopardize worker safety. Thus, reducing unnecessary downtime has a significant impact on both your top and bottom lines.\r\n\r\nLearn more about eliminating unnecessary downtime with machine health at <a href=\"//www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime</a>.\r\n<h2 id=\"tab3\" >Reduce loss, waste, and emissions</h2>\r\nReducing waste to improve sustainability has become a top priority for manufacturers for cost-cutting/efficiency purposes, as well as to promote a healthier planet. Healthy machines can run at capacity and with less downtime, leading to less waste and more efficient energy use. An industry study by the Electric Power Research Institute (EPRI) found that optimizing the performance of rotating assets — which account for approximately 54 percent of U.S. industrial electricity consumption — can reduce energy consumption by 12 to 15 percent.\r\n\r\nLearn more about reducing loss, waste, and emissions with machine health at <a href=\"//www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions</a>.\r\n<h2 id=\"tab4\" >Maximize yield and capacity</h2>\r\nReal-time machine health insights allow maintenance teams to adjust shutdown schedules based on the current condition of the machine, its history, and the recommendations of experts. In the longer-term, machine health minimizes unplanned downtime by improving the health of your machines, reduces planned downtime by deferring nonessential maintenance activities, and can increase output on production lines with healthier machines running optimally.\r\n\r\nLearn more about maximizing yield and capacity with machine health at <a href=\"//www.augury.com/use-cases/business-goal/maximize-yield-and-capacity\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/maximize-yield-and-capacity</a>.\r\n<h2 id=\"tab5\" >Optimize asset care</h2>\r\nWhen it comes to asset care — from acquiring and storing parts to managing maintenance resources — manufacturers have traditionally taken a more preventive than predictive approach: Machines are serviced on fixed schedules, regardless of whether or not they need maintenance. Many manufacturers keep spare parts for critical machine assets in inventory because calendar-based maintenance dictates when parts should be replaced — whether or not replacement is needed. The alternative is overspending to get parts on short notice and expensive downtime while you wait for the parts to arrive. Whether hoarding parts or paying more for last-minute parts, both methods are inefficient and costly. Machine health empowers you to control how you spend time and money based on the real-time condition of your machine assets.\r\n\r\nLearn more about optimizing asset care with machine health at <a href=\"//www.augury.com/use-cases/business-goal/optimize-asset-care\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/optimize-asset-care</a>.\r\n<h2 id=\"tab6\" >Start building a winning machine health culture</h2>\r\nMachine health can transform operations for every manufacturer. Get your free copy of <em>Machine Health For Dummies</em> at <a class=\"bookSponsor-btn\" href=\"//www.augury.com/collateral/machine-health-for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">//www.augury.com/machinehealthfordummies/</a>.\r\n\r\nHow much will you save with Augury Machine Health? Use the ROI calculator at <a href=\"//www.augury.com/value-calculator/\" target=\"_blank\" rel=\"noopener\">www.augury.com/value-calculator/</a> to see how much time and money you can save with Augury’s Machine Health.\r\n\r\n<iframe title=\"Machine Health For Dummies, Augury Special Edition\" src=\"//www.youtube.com/embed/6RpYgfj3RE4\" width=\"570\" height=\"321\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe>","description":"We depend on machines to produce everyday essentials — such as power, food, and medicine — and to support nearly every aspect of society. Thus, machine health is vital to overall manufacturing and business health. Machine health transforms reliability, maintenance, operations, and asset performance management by using artificial intelligence (AI) and Internet of Things (IoT) technologies to improve performance, reduce downtime, and help manufacturers reach Industry 4.0 standards.\r\n<h2 id=\"tab1\" >Transform the way you work</h2>\r\nIn an era of labor shortages and technology innovation, manufacturing needs to move faster toward digitization. Using AI in manufacturing, companies can eliminate repetitive tasks, reduce inefficiencies, and strengthen data-driven decision making. With insights into the real-time condition of their machines, workers can break away from traditional maintenance schedules and manual tasks. This means more time for proactive work and collaboration with other departments, which leads to stronger cross-functional teams. It also leads to further innovations, such as process optimization. When employees have insights into the health of their machines, they can predict their workdays and own their schedules, opening up new opportunities for innovation and engagement.\r\n\r\nLearn more about transforming the way you work with machine health at <a href=\"//www.augury.com/use-cases/business-goal/transform-the-way-you-work\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/transform-the-way-you-work</a>.\r\n<h2 id=\"tab2\" >Eliminate unnecessary downtime</h2>\r\nUnplanned downtime can be expensive. There’s the cost of the repairs themselves, lost production and sales, and reputational damage. Maintenance and reliability teams often have to scramble to diagnose and fix the problem as quickly as possible — often resulting in overtime pay and expedited shipping costs for emergency spare parts. Sudden and catastrophic machine failures can also harm worker morale and jeopardize worker safety. Thus, reducing unnecessary downtime has a significant impact on both your top and bottom lines.\r\n\r\nLearn more about eliminating unnecessary downtime with machine health at <a href=\"//www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime</a>.\r\n<h2 id=\"tab3\" >Reduce loss, waste, and emissions</h2>\r\nReducing waste to improve sustainability has become a top priority for manufacturers for cost-cutting/efficiency purposes, as well as to promote a healthier planet. Healthy machines can run at capacity and with less downtime, leading to less waste and more efficient energy use. An industry study by the Electric Power Research Institute (EPRI) found that optimizing the performance of rotating assets — which account for approximately 54 percent of U.S. industrial electricity consumption — can reduce energy consumption by 12 to 15 percent.\r\n\r\nLearn more about reducing loss, waste, and emissions with machine health at <a href=\"//www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions</a>.\r\n<h2 id=\"tab4\" >Maximize yield and capacity</h2>\r\nReal-time machine health insights allow maintenance teams to adjust shutdown schedules based on the current condition of the machine, its history, and the recommendations of experts. In the longer-term, machine health minimizes unplanned downtime by improving the health of your machines, reduces planned downtime by deferring nonessential maintenance activities, and can increase output on production lines with healthier machines running optimally.\r\n\r\nLearn more about maximizing yield and capacity with machine health at <a href=\"//www.augury.com/use-cases/business-goal/maximize-yield-and-capacity\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/maximize-yield-and-capacity</a>.\r\n<h2 id=\"tab5\" >Optimize asset care</h2>\r\nWhen it comes to asset care — from acquiring and storing parts to managing maintenance resources — manufacturers have traditionally taken a more preventive than predictive approach: Machines are serviced on fixed schedules, regardless of whether or not they need maintenance. Many manufacturers keep spare parts for critical machine assets in inventory because calendar-based maintenance dictates when parts should be replaced — whether or not replacement is needed. The alternative is overspending to get parts on short notice and expensive downtime while you wait for the parts to arrive. Whether hoarding parts or paying more for last-minute parts, both methods are inefficient and costly. Machine health empowers you to control how you spend time and money based on the real-time condition of your machine assets.\r\n\r\nLearn more about optimizing asset care with machine health at <a href=\"//www.augury.com/use-cases/business-goal/optimize-asset-care\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/optimize-asset-care</a>.\r\n<h2 id=\"tab6\" >Start building a winning machine health culture</h2>\r\nMachine health can transform operations for every manufacturer. Get your free copy of <em>Machine Health For Dummies</em> at <a class=\"bookSponsor-btn\" href=\"//www.augury.com/collateral/machine-health-for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">//www.augury.com/machinehealthfordummies/</a>.\r\n\r\nHow much will you save with Augury Machine Health? Use the ROI calculator at <a href=\"//www.augury.com/value-calculator/\" target=\"_blank\" rel=\"noopener\">www.augury.com/value-calculator/</a> to see how much time and money you can save with Augury’s Machine Health.\r\n\r\n<iframe title=\"Machine Health For Dummies, Augury Special Edition\" src=\"//www.youtube.com/embed/6RpYgfj3RE4\" width=\"570\" height=\"321\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe>","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"General AI","slug":"general-ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Transform the way you work","target":"#tab1"},{"label":"Eliminate unnecessary downtime","target":"#tab2"},{"label":"Reduce loss, waste, and emissions","target":"#tab3"},{"label":"Maximize yield and capacity","target":"#tab4"},{"label":"Optimize asset care","target":"#tab5"},{"label":"Start building a winning machine health culture","target":"#tab6"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299281,"title":"How to Write Prompts for ChatGPT","slug":"how-to-write-prompts-for-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299281"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":298910,"title":"What Is ChatGPT and How Does It Work?","slug":"what-is-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/298910"}},{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656a1f64d930f\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656a1f64dad6d\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Augury","brandingLink":"//www.augury.com/","brandingLogo":{"src":"//www.coursofppt.com/wp-content/uploads/augury-logo.png","width":89,"height":41},"sponsorAd":"","sponsorEbookTitle":"Machine Health For Dummies, Augury Special Edition","sponsorEbookLink":"//www.augury.com/collateral/machine-health-for-dummies/","sponsorEbookImage":{"src":"//www.coursofppt.com/wp-content/uploads/machine-health-for-dummies-augury-special-ediiton-cover-9781394208777-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-12-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301240},{"headers":{"creationTime":"2024-06-14T17:09:38+00:00","modifiedTime":"2024-10-31T14:14:41+00:00","timestamp":"2024-10-31T15:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"General AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"How to Write Prompts for ChatGPT","strippedTitle":"how to write prompts for chatgpt","slug":"how-to-write-prompts-for-chatgpt","canonicalUrl":"","查找组件SEO":{"metaDescription":"This article includes tips and strategies for writing effective prompts for ChatGPT, including websites that help you develop prompts.","noIndex":0,"noFollow":0},"content":"Indeed, prompting is both the easy part and the most difficult part of using a generative artificial intelligence (AI) model, like ChatGPT. Difficulties in the complexity of cues and nuances in text-based prompts are why some organizations have a prompt engineering job role.\r\n\r\n[caption id=\"attachment_299289\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-299289\" src=\"//www.coursofppt.com/wp-content/uploads/woman-working-computer-adobeStock_126291778.jpg\" alt=\"\" width=\"630\" height=\"420\" /> ©Goodluz / Adobe Stock[/caption]\r\n\r\nWhat is a ChatGPT prompt? It's a phrase or sentence that you write in ChatGPT to initiate a response from the AI. ChatGPT <a href=\"//www.coursofppt.com/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\" target=\"_blank\" rel=\"noopener\">responds based on its existing knowledge base</a>.\r\n\r\n<p class=\"article-tips tldr\">Don't have time to read the entire article?\r\n<a href=\"#summary\" data-analytics-id=\"product-test-2\">Jump to the quick read summary.</a></p>\r\n\r\n<em>Prompt engineering </em>is the act of crafting an input, which is a deed borne partly of art and partly of logic. And yes, you can do this! However, you might want to practice and polish your prompting skills before you apply for a job.\r\n\r\nConsidering how to prompt ChatGPT, if you have a good command of the subtleties of language and great critical-thinking and problem-solving skills, seasoned with more than a dash of intuitive intelligence, you’ll be amazed at the responses you can tease out of this technology with a single, well-worded prompt.\r\n\r\nWhen you prompt ChatGPT, you are embedding the task description in the input (called the prompt) in a natural-language format, rather than entering explicit instructions via computer code.\r\n\r\n<em>Prompt engineers</em> can be trained AI professionals or people who possess sufficient intuitive intelligence or skills transferrable to crafting the best prompts for ChatGPT (or other generative AI platforms) that solicit the desired outputs. One example of a transferrable skill is a journalist’s ability to tease out the answers they seek in an interview by using direct or indirect methods.\r\n\r\n<em>Prompt-based learning</em> is a strategy AI engineers use to train large language models. The engineers make the model multipurpose to avoid retraining it for each new language-based task.\r\n\r\nCurrently, the demand for talented writers who know how to write a prompt, or prompt engineers, is very high. However, there is a strong debate as to whether employers should delineate this unique skill as a dedicated job role, a new profession, or a universal skill to be required of most workers, much like typing skills are today.\r\n\r\nMeanwhile, people are sharing their prompts with other ChatGPT users in several forums. You can see <a href=\"//github.com/f/awesome-chatgpt-prompts\" target=\"_blank\" rel=\"noopener\">one example on GitHub.</a>\r\n<h2 id=\"tab1\" >How to write a prompt</h2>\r\nIf you enter a basic prompt, you’ll get a bare-bones, encyclopedic-like answer, as shown in the figure below. Do that enough times and you’ll convince yourself that this is just a toy and you can get better results from an internet search engine. This is a typical novice’s mistake and a primary reason why beginners give up before they fully grasp <a href=\"//www.coursofppt.com/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\" target=\"_blank\" rel=\"noopener\">what ChatGPT is and can do</a>.\r\n\r\n[caption id=\"attachment_298916\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298916\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-example-business-plan.jpg\" alt=\"Screenshot showing a ChatGPT response for a business plan\" width=\"630\" height=\"473\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds with a general outline for a business plan.[/caption]\r\n\r\nUnderstand that your previous experience with keywords and search engines does not apply here. To write awesome ChatGPT prompts, you must think of and use ChatGPT in a different way. Think hard about how you’re going to word your prompt. You have many options to consider. You can assign ChatGPT a role or a persona, or several personas and roles if you decide it should respond as a team, as illustrated in the following figure.\r\n\r\n[caption id=\"attachment_298919\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298919\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-team-doctors.jpg\" alt=\"Screenshot showing an example of a ChatGPT response\" width=\"630\" height=\"988\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds as a team of doctors.[/caption]\r\n\r\nYou can assign yourself a new role or persona as well. Or tell it to address any type of audience, such as a high school graduating class, a surgical team, or attendees at a concert or a technology conference.\r\n\r\nYou can set the stage or situation in great or minimum detail. You can ask a question, give it a command, or require specific behaviors.\r\n\r\nA prompt, as you can see now, is much more than a question or a command. Your success with ChatGPT hinges on your ability to master crafting a prompt in such a way as to trigger the precise response you seek.\r\n\r\nAsk yourself these questions as you are writing or evaluating your prompt:\r\n<ul>\r\n \t<li>Who do you want ChatGPT to be?</li>\r\n \t<li>Where, when, and what is the situation or circumstances you want ChatGPT’s response framed within?</li>\r\n \t<li>Is the question you're entering in the prompt the real question you want it to answer, or were you trying to ask something else?</li>\r\n \t<li>Is the command you're prompting complete enough for ChatGPT to draw from sufficient context to give you a fuller, more complete, and richly nuanced response?</li>\r\n \t<li>And the ultimate question for you to consider: Is your prompt specific and detailed, or vague and meandering? Whichever is the case, that’s what ChatGPT will mirror in its response.</li>\r\n</ul>\r\nChatGPT’s responses are only as good as your prompt. That’s because the prompt starts a pattern that ChatGPT must then complete. Be intentional and concise about how you present that pattern starter — the prompt.\r\n<p class=\"article-tips tip\">For more details on using ChatGPT, including how to start a chat, reviewing your chat history, and much more, check out my book <a href=\"//www.coursofppt.com/book/technology/information-technology/ai/general-ai/chat-gpt-for-dummies-298861/\" target=\"_blank\" rel=\"noopener\"><em>ChatGPT For Dummies.</em></a></p>\r\n\r\n<h2 id=\"tab2\" >Thinking in threads</h2>\r\nConversations happen when one entity’s expression initiates and influences another entity’s response. Most conversations do not conclude after a simple one-two exchange like this, but rather continue in a flow of responses cued by the interaction with the other participant. The resulting string of messages in a conversation is called a <em>thread.</em>\r\n\r\nTo increase your success with ChatGPT, write prompts as part of a thread rather than as standalone queries. In this way, you'll craft prompts targeted towards the outputs you seek, building one output on another to reach a predetermined end. In other words, you don’t have to pile everything into one prompt. You can write a series of prompts to more precisely direct ChatGPT’s “thought processes.”\r\n\r\nBasic prompts result in responses that can be too general or vague. When you think in threads, you’re not aiming to craft a series of basic prompts; you’re looking to break down what you seek into prompt blocks that aim ChatGPT’s responses in the direction you want the conversation to go. In effect, you're using serialized prompts to manipulate the content and direction of ChatGPT's response.\r\n\r\nDoes it work all the time? No, of course not. ChatGPT can opt for an entirely different response than expected, repeat an earlier response, or simply hallucinate one. But serialized prompts do work often enough to enable you to keep the conversation targeted and the responses flowing toward the end you seek.\r\n\r\nYou can use this method to shape a single prompt by imagining someone asking for clarification of your thought or question. Write the prompt so that it includes that information, and the AI model will have more of the context it needs to deliver an intelligent and refined answer.\r\n<p class=\"article-tips tip\">ChatGPT will not ask for clarification of your prompt; it will guess at your meaning instead. You’ll typically get better quality responses by clarifying your meaning in the prompt itself at the outset.</p>\r\n\r\n<h2 id=\"tab3\" >Chaining prompts and other tips and strategies</h2>\r\nHere’s a handy list of other tips and refinements to help get you started on the path to mastering the art of the prompt:\r\n<ul>\r\n \t<li><strong>Plan to spend more time than expected on crafting a prompt. </strong>No matter how many times you write prompts, the next one you write won’t be any easier to do. Don’t rush this part.</li>\r\n \t<li><strong>Start by defining the goal.</strong> What exactly do you want ChatGPT to deliver? Craft your prompt to push ChatGPT towards that goal; if you know where you want to end up, you’ll be able to craft a prompt that will get you there.</li>\r\n \t<li><strong>Think like a storyteller, not an inquisitor.</strong> Give ChatGPT a character or a knowledge level from which it should shape its answer. For example, tell ChatGPT that it's a chemist, an oncologist, a consultant, or any other job role. You can also instruct it to answer as if it were a famous person, such as Churchill, Shakespeare, or Einstein, or a fictional character such as Rocky. Give it a sample of your own writing and instruct ChatGPT to write its answer to your question, or complete the task in the way you would.</li>\r\n \t<li><strong>Remember that any task or thinking exercise (within reason and the law) is fair game and within ChatGPT’s general scope.</strong> For example, instruct ChatGPT to check your homework, your kids’ homework, or its own homework. Enter something such as computer code or a text passage in quotation marks and instruct ChatGPT to find errors in it or in the logic behind it. Or skip the homework checking and ask it to help you think instead. Ask it to finish a thought, an exercise, or a mathematical equation that has you stumped. The only limit to what you can ask is your own imagination and whatever few safety rules the AI trainer installed.</li>\r\n \t<li><strong>Be specific.</strong> The more details you include in the prompt, the better. Basic prompts lead to basic responses. More specific and concise prompts lead to more detailed responses, more nuanced responses, and better performance in ChatGPT’s responses — and usually well within token limits.</li>\r\n \t<li>\r\n<p class=\"first-para\"><strong>Use prompt chains as a way of strategizing.</strong> Prompt chaining is a technique used to build chatbots, but we can reimagine it here as a way to develop a strategic plan using combined or serial prompting in ChatGPT. This technique uses multiple prompts to guide ChatGPT through a more complex thought process.</p>\r\n<p class=\"child-para\">You can use multiple prompts as a single input, such as telling ChatGPT it's a team consisting of several members with different roles, all of whom are to answer the one prompt you entered. Or you can use multiple prompts in a sequence in which the output of one becomes the input of the next. In this case, each response builds on the prompt you just entered and the prompts you entered earlier. This type of a prompt chain forms organically, unless you stop ChatGPT from considering earlier prompts in its responses by starting a new chat.</p>\r\n</li>\r\n \t<li><strong>Use prompt libraries and tools to improve your prompting.</strong> Some examples follows:</li>\r\n \t<li>Check out the Awesome ChatGPT Prompts repository on GitHub at //github.com/f/awesome-chatgpt-prompts</li>\r\n \t<li>Use a prompt generator to ask ChatGPT to improve your prompt by visiting <a href=\"//www.skool.com/chatgpt/promptgenerator?p=1e5ede93\" target=\"_blank\" rel=\"noopener\">PromptGenerator</a>.</li>\r\n \t<li>Visit ChatGPT and <a href=\"//github.com/yokoffing/ChatGPT-Prompts\" target=\"_blank\" rel=\"noopener\">Bing AI Prompts on GitHub</a>.</li>\r\n \t<li>Use a tool such as <a href=\"//huggingface.co/spaces/merve/ChatGPT-prompt-generator\" target=\"_blank\" rel=\"noopener\">Hugging Face’s ChatGPT Prompt Generator</a>.</li>\r\n \t<li>Try specialized prompt templates, such as the curated list for sales and marketing use cases at <a href=\"//www.tooltester.com/en/blog/best-chatgpt-prompts/#ChatGPT_Prompts_for_Sales_and_Marketing_Use_Cases\" target=\"_blank\" rel=\"noopener\">Tooltester</a>.</li>\r\n</ul>\r\n<p id=\"summary\">On GitHub, you can find tons of curated lists in repositories as well as lots of free prompting tools from a variety of sources. Just make sure that you double-check sources, apps, and browser extensions for malware before using or relying on them.</p>\r\n\r\n<div class=\"summary-container\" data-testid=\"summarySection\">\r\n<div class=\"wrapper\">\r\n<div class=\"image-block\" data-testid=\"imageBlock\"></div>\r\n<div class=\"details-block\">\r\n<h2 id=\"tab4\" >Quick Read Summary</h2>\r\nWriting effective prompts for ChatGPT is both a craft and a science. A prompt is the phrase or sentence that initiates a response from the AI model. To excel in this skill, consider these essential tips.\r\n<ul class=\"summary-list\">\r\n \t<li><p><strong>Crafting an artful prompt:</strong> A well-crafted prompt is essential to unlock ChatGPT's potential. Think beyond basic questions and commands. You can assign roles or personas to ChatGPT, set the stage, or address different audiences.</p></li>\r\n \t<li><p><strong>Prompt engineering:</strong> This skill can be highly valuable. It involves creating prompts that draw out the desired responses from the AI. Prompt engineers often have a background in AI, journalism, or other fields where they've honed their ability to solicit specific information.</p></li>\r\n \t<li><p><strong>Thinking in threads:</strong> Instead of standalone queries, use prompts as part of a conversation thread. This helps you build on previous outputs and guide the AI's responses toward your desired end.</p></li>\r\n \t<li><p><strong>Chaining prompts:</strong> Connect prompts sequentially to steer ChatGPT's thought process. This approach can lead to more targeted and refined responses. Be patient and put thought into each prompt.</p></li>\r\n \t<li><p><strong>Specificity is key:</strong> Detailed prompts lead to more detailed and nuanced responses. Avoid vague or meandering instructions, as ChatGPT mirrors the prompt's clarity.</p></li>\r\n \t<li><p><strong>Prompt libraries and tools:</strong> Leverage existing resources to improve your prompting skills. There are repositories and tools available, like the Awesome ChatGPT Prompts repository on GitHub and Hugging Face's ChatGPT Prompt Generator.</p></li>\r\n \t<li><p><strong>The art of imagination</strong> Within reasonable and legal limits, you can instruct ChatGPT for various tasks, from checking homework to creative writing. The only boundary is your imagination.</p></li>\r\n</ul>\r\nIn a world where the demand for skilled prompt writers is increasing, your ability to craft the perfect prompt is a valuable asset. By mastering this art, you can unlock the full potential of ChatGPT and guide its responses to meet your specific needs.\r\n\r\nHungry for more? Go back and <a href=\"/article/technology/information-technology/ai/general-ai/how-to-write-prompts-for-chatgpt-299281/\">read the article</a> or <a href=\"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20\" class=\"amazon-btn\" target=\"_blank\" rel=\"noopener\">check out the book</a>.\r\n</div>\r\n</div>\r\n</div>","description":"Indeed, prompting is both the easy part and the most difficult part of using a generative artificial intelligence (AI) model, like ChatGPT. Difficulties in the complexity of cues and nuances in text-based prompts are why some organizations have a prompt engineering job role.\r\n\r\n[caption id=\"attachment_299289\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-299289\" src=\"//www.coursofppt.com/wp-content/uploads/woman-working-computer-adobeStock_126291778.jpg\" alt=\"\" width=\"630\" height=\"420\" /> ©Goodluz / Adobe Stock[/caption]\r\n\r\nWhat is a ChatGPT prompt? It's a phrase or sentence that you write in ChatGPT to initiate a response from the AI. ChatGPT <a href=\"//www.coursofppt.com/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\" target=\"_blank\" rel=\"noopener\">responds based on its existing knowledge base</a>.\r\n\r\n<p class=\"article-tips tldr\">Don't have time to read the entire article?\r\n<a href=\"#summary\" data-analytics-id=\"product-test-2\">Jump to the quick read summary.</a></p>\r\n\r\n<em>Prompt engineering </em>is the act of crafting an input, which is a deed borne partly of art and partly of logic. And yes, you can do this! However, you might want to practice and polish your prompting skills before you apply for a job.\r\n\r\nConsidering how to prompt ChatGPT, if you have a good command of the subtleties of language and great critical-thinking and problem-solving skills, seasoned with more than a dash of intuitive intelligence, you’ll be amazed at the responses you can tease out of this technology with a single, well-worded prompt.\r\n\r\nWhen you prompt ChatGPT, you are embedding the task description in the input (called the prompt) in a natural-language format, rather than entering explicit instructions via computer code.\r\n\r\n<em>Prompt engineers</em> can be trained AI professionals or people who possess sufficient intuitive intelligence or skills transferrable to crafting the best prompts for ChatGPT (or other generative AI platforms) that solicit the desired outputs. One example of a transferrable skill is a journalist’s ability to tease out the answers they seek in an interview by using direct or indirect methods.\r\n\r\n<em>Prompt-based learning</em> is a strategy AI engineers use to train large language models. The engineers make the model multipurpose to avoid retraining it for each new language-based task.\r\n\r\nCurrently, the demand for talented writers who know how to write a prompt, or prompt engineers, is very high. However, there is a strong debate as to whether employers should delineate this unique skill as a dedicated job role, a new profession, or a universal skill to be required of most workers, much like typing skills are today.\r\n\r\nMeanwhile, people are sharing their prompts with other ChatGPT users in several forums. You can see <a href=\"//github.com/f/awesome-chatgpt-prompts\" target=\"_blank\" rel=\"noopener\">one example on GitHub.</a>\r\n<h2 id=\"tab1\" >How to write a prompt</h2>\r\nIf you enter a basic prompt, you’ll get a bare-bones, encyclopedic-like answer, as shown in the figure below. Do that enough times and you’ll convince yourself that this is just a toy and you can get better results from an internet search engine. This is a typical novice’s mistake and a primary reason why beginners give up before they fully grasp <a href=\"//www.coursofppt.com/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\" target=\"_blank\" rel=\"noopener\">what ChatGPT is and can do</a>.\r\n\r\n[caption id=\"attachment_298916\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298916\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-example-business-plan.jpg\" alt=\"Screenshot showing a ChatGPT response for a business plan\" width=\"630\" height=\"473\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds with a general outline for a business plan.[/caption]\r\n\r\nUnderstand that your previous experience with keywords and search engines does not apply here. To write awesome ChatGPT prompts, you must think of and use ChatGPT in a different way. Think hard about how you’re going to word your prompt. You have many options to consider. You can assign ChatGPT a role or a persona, or several personas and roles if you decide it should respond as a team, as illustrated in the following figure.\r\n\r\n[caption id=\"attachment_298919\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298919\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-team-doctors.jpg\" alt=\"Screenshot showing an example of a ChatGPT response\" width=\"630\" height=\"988\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds as a team of doctors.[/caption]\r\n\r\nYou can assign yourself a new role or persona as well. Or tell it to address any type of audience, such as a high school graduating class, a surgical team, or attendees at a concert or a technology conference.\r\n\r\nYou can set the stage or situation in great or minimum detail. You can ask a question, give it a command, or require specific behaviors.\r\n\r\nA prompt, as you can see now, is much more than a question or a command. Your success with ChatGPT hinges on your ability to master crafting a prompt in such a way as to trigger the precise response you seek.\r\n\r\nAsk yourself these questions as you are writing or evaluating your prompt:\r\n<ul>\r\n \t<li>Who do you want ChatGPT to be?</li>\r\n \t<li>Where, when, and what is the situation or circumstances you want ChatGPT’s response framed within?</li>\r\n \t<li>Is the question you're entering in the prompt the real question you want it to answer, or were you trying to ask something else?</li>\r\n \t<li>Is the command you're prompting complete enough for ChatGPT to draw from sufficient context to give you a fuller, more complete, and richly nuanced response?</li>\r\n \t<li>And the ultimate question for you to consider: Is your prompt specific and detailed, or vague and meandering? Whichever is the case, that’s what ChatGPT will mirror in its response.</li>\r\n</ul>\r\nChatGPT’s responses are only as good as your prompt. That’s because the prompt starts a pattern that ChatGPT must then complete. Be intentional and concise about how you present that pattern starter — the prompt.\r\n<p class=\"article-tips tip\">For more details on using ChatGPT, including how to start a chat, reviewing your chat history, and much more, check out my book <a href=\"//www.coursofppt.com/book/technology/information-technology/ai/general-ai/chat-gpt-for-dummies-298861/\" target=\"_blank\" rel=\"noopener\"><em>ChatGPT For Dummies.</em></a></p>\r\n\r\n<h2 id=\"tab2\" >Thinking in threads</h2>\r\nConversations happen when one entity’s expression initiates and influences another entity’s response. Most conversations do not conclude after a simple one-two exchange like this, but rather continue in a flow of responses cued by the interaction with the other participant. The resulting string of messages in a conversation is called a <em>thread.</em>\r\n\r\nTo increase your success with ChatGPT, write prompts as part of a thread rather than as standalone queries. In this way, you'll craft prompts targeted towards the outputs you seek, building one output on another to reach a predetermined end. In other words, you don’t have to pile everything into one prompt. You can write a series of prompts to more precisely direct ChatGPT’s “thought processes.”\r\n\r\nBasic prompts result in responses that can be too general or vague. When you think in threads, you’re not aiming to craft a series of basic prompts; you’re looking to break down what you seek into prompt blocks that aim ChatGPT’s responses in the direction you want the conversation to go. In effect, you're using serialized prompts to manipulate the content and direction of ChatGPT's response.\r\n\r\nDoes it work all the time? No, of course not. ChatGPT can opt for an entirely different response than expected, repeat an earlier response, or simply hallucinate one. But serialized prompts do work often enough to enable you to keep the conversation targeted and the responses flowing toward the end you seek.\r\n\r\nYou can use this method to shape a single prompt by imagining someone asking for clarification of your thought or question. Write the prompt so that it includes that information, and the AI model will have more of the context it needs to deliver an intelligent and refined answer.\r\n<p class=\"article-tips tip\">ChatGPT will not ask for clarification of your prompt; it will guess at your meaning instead. You’ll typically get better quality responses by clarifying your meaning in the prompt itself at the outset.</p>\r\n\r\n<h2 id=\"tab3\" >Chaining prompts and other tips and strategies</h2>\r\nHere’s a handy list of other tips and refinements to help get you started on the path to mastering the art of the prompt:\r\n<ul>\r\n \t<li><strong>Plan to spend more time than expected on crafting a prompt. </strong>No matter how many times you write prompts, the next one you write won’t be any easier to do. Don’t rush this part.</li>\r\n \t<li><strong>Start by defining the goal.</strong> What exactly do you want ChatGPT to deliver? Craft your prompt to push ChatGPT towards that goal; if you know where you want to end up, you’ll be able to craft a prompt that will get you there.</li>\r\n \t<li><strong>Think like a storyteller, not an inquisitor.</strong> Give ChatGPT a character or a knowledge level from which it should shape its answer. For example, tell ChatGPT that it's a chemist, an oncologist, a consultant, or any other job role. You can also instruct it to answer as if it were a famous person, such as Churchill, Shakespeare, or Einstein, or a fictional character such as Rocky. Give it a sample of your own writing and instruct ChatGPT to write its answer to your question, or complete the task in the way you would.</li>\r\n \t<li><strong>Remember that any task or thinking exercise (within reason and the law) is fair game and within ChatGPT’s general scope.</strong> For example, instruct ChatGPT to check your homework, your kids’ homework, or its own homework. Enter something such as computer code or a text passage in quotation marks and instruct ChatGPT to find errors in it or in the logic behind it. Or skip the homework checking and ask it to help you think instead. Ask it to finish a thought, an exercise, or a mathematical equation that has you stumped. The only limit to what you can ask is your own imagination and whatever few safety rules the AI trainer installed.</li>\r\n \t<li><strong>Be specific.</strong> The more details you include in the prompt, the better. Basic prompts lead to basic responses. More specific and concise prompts lead to more detailed responses, more nuanced responses, and better performance in ChatGPT’s responses — and usually well within token limits.</li>\r\n \t<li>\r\n<p class=\"first-para\"><strong>Use prompt chains as a way of strategizing.</strong> Prompt chaining is a technique used to build chatbots, but we can reimagine it here as a way to develop a strategic plan using combined or serial prompting in ChatGPT. This technique uses multiple prompts to guide ChatGPT through a more complex thought process.</p>\r\n<p class=\"child-para\">You can use multiple prompts as a single input, such as telling ChatGPT it's a team consisting of several members with different roles, all of whom are to answer the one prompt you entered. Or you can use multiple prompts in a sequence in which the output of one becomes the input of the next. In this case, each response builds on the prompt you just entered and the prompts you entered earlier. This type of a prompt chain forms organically, unless you stop ChatGPT from considering earlier prompts in its responses by starting a new chat.</p>\r\n</li>\r\n \t<li><strong>Use prompt libraries and tools to improve your prompting.</strong> Some examples follows:</li>\r\n \t<li>Check out the Awesome ChatGPT Prompts repository on GitHub at //github.com/f/awesome-chatgpt-prompts</li>\r\n \t<li>Use a prompt generator to ask ChatGPT to improve your prompt by visiting <a href=\"//www.skool.com/chatgpt/promptgenerator?p=1e5ede93\" target=\"_blank\" rel=\"noopener\">PromptGenerator</a>.</li>\r\n \t<li>Visit ChatGPT and <a href=\"//github.com/yokoffing/ChatGPT-Prompts\" target=\"_blank\" rel=\"noopener\">Bing AI Prompts on GitHub</a>.</li>\r\n \t<li>Use a tool such as <a href=\"//huggingface.co/spaces/merve/ChatGPT-prompt-generator\" target=\"_blank\" rel=\"noopener\">Hugging Face’s ChatGPT Prompt Generator</a>.</li>\r\n \t<li>Try specialized prompt templates, such as the curated list for sales and marketing use cases at <a href=\"//www.tooltester.com/en/blog/best-chatgpt-prompts/#ChatGPT_Prompts_for_Sales_and_Marketing_Use_Cases\" target=\"_blank\" rel=\"noopener\">Tooltester</a>.</li>\r\n</ul>\r\n<p id=\"summary\">On GitHub, you can find tons of curated lists in repositories as well as lots of free prompting tools from a variety of sources. Just make sure that you double-check sources, apps, and browser extensions for malware before using or relying on them.</p>\r\n\r\n<div class=\"summary-container\" data-testid=\"summarySection\">\r\n<div class=\"wrapper\">\r\n<div class=\"image-block\" data-testid=\"imageBlock\"></div>\r\n<div class=\"details-block\">\r\n<h2 id=\"tab4\" >Quick Read Summary</h2>\r\nWriting effective prompts for ChatGPT is both a craft and a science. A prompt is the phrase or sentence that initiates a response from the AI model. To excel in this skill, consider these essential tips.\r\n<ul class=\"summary-list\">\r\n \t<li><p><strong>Crafting an artful prompt:</strong> A well-crafted prompt is essential to unlock ChatGPT's potential. Think beyond basic questions and commands. You can assign roles or personas to ChatGPT, set the stage, or address different audiences.</p></li>\r\n \t<li><p><strong>Prompt engineering:</strong> This skill can be highly valuable. It involves creating prompts that draw out the desired responses from the AI. Prompt engineers often have a background in AI, journalism, or other fields where they've honed their ability to solicit specific information.</p></li>\r\n \t<li><p><strong>Thinking in threads:</strong> Instead of standalone queries, use prompts as part of a conversation thread. This helps you build on previous outputs and guide the AI's responses toward your desired end.</p></li>\r\n \t<li><p><strong>Chaining prompts:</strong> Connect prompts sequentially to steer ChatGPT's thought process. This approach can lead to more targeted and refined responses. Be patient and put thought into each prompt.</p></li>\r\n \t<li><p><strong>Specificity is key:</strong> Detailed prompts lead to more detailed and nuanced responses. Avoid vague or meandering instructions, as ChatGPT mirrors the prompt's clarity.</p></li>\r\n \t<li><p><strong>Prompt libraries and tools:</strong> Leverage existing resources to improve your prompting skills. There are repositories and tools available, like the Awesome ChatGPT Prompts repository on GitHub and Hugging Face's ChatGPT Prompt Generator.</p></li>\r\n \t<li><p><strong>The art of imagination</strong> Within reasonable and legal limits, you can instruct ChatGPT for various tasks, from checking homework to creative writing. The only boundary is your imagination.</p></li>\r\n</ul>\r\nIn a world where the demand for skilled prompt writers is increasing, your ability to craft the perfect prompt is a valuable asset. By mastering this art, you can unlock the full potential of ChatGPT and guide its responses to meet your specific needs.\r\n\r\nHungry for more? Go back and <a href=\"/article/technology/information-technology/ai/general-ai/how-to-write-prompts-for-chatgpt-299281/\">read the article</a> or <a href=\"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20\" class=\"amazon-btn\" target=\"_blank\" rel=\"noopener\">check out the book</a>.\r\n</div>\r\n</div>\r\n</div>","blurb":"","authors":[{"authorId":34669,"name":"Pam Baker","slug":"pamela-baker","description":"<b>Pam Baker </b>is a veteran business analyst, speaker, and journalist whose work is focused on big data, artificial intelligence, machine learning, business intelligence, and data analysis. She is the author of <i>Data Divination – Big Data Strategies </i>and <i>ChatGPT For Dummies.</i>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/34669"}}],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"General AI","slug":"general-ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"How to write a prompt","target":"#tab1"},{"label":"Thinking in threads","target":"#tab2"},{"label":"Chaining prompts and other tips and strategies","target":"#tab3"},{"label":"Quick Read Summary","target":"#tab4"}],"relatedArticles":{"fromBook":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":298910,"title":"What Is ChatGPT and How Does It Work?","slug":"what-is-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/298910"}}],"fromCategory":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":298910,"title":"What Is ChatGPT and How Does It Work?","slug":"what-is-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/298910"}},{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}},{"articleId":272673,"title":"How Intelligent Recommendation Systems Work","slug":"how-intelligent-recommendation-systems-work","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272673"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":298861,"slug":"chat-gpt-for-dummies","isbn":"9781394204632","categoryList":["technology","information-technology","ai","general-ai"],"amazon":{"default":"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394204639-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/chatgpt-for-dummies-cover-9781394204632-164x255.jpg","width":164,"height":255},"title":"ChatGPT For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"35299\">Pam Baker</b></b> is a freelance journalist who is focused on emerging tech topics like artificial intelligence, data analytics, and edge computing. She is the author of <i>Decision Intelligence For Dummies</i>.</p>","authors":[{"authorId":35299,"name":"Pam Baker","slug":"pam-baker","description":" <p><b>Pam Baker</b> is a freelance journalist who is focused on emerging tech topics like artificial intelligence, data analytics, and edge computing. She is the author of <i>Decision Intelligence For Dummies</i>. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35299"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394204632&quot;]}]\" id=\"du-slot-654116b74bca1\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394204632&quot;]}]\" id=\"du-slot-654116b74c5e9\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-06-14T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":299281},{"headers":{"creationTime":"2024-05-19T19:45:13+00:00","modifiedTime":"2024-10-30T13:46:44+00:00","timestamp":"2024-10-30T15:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"General AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"What Is ChatGPT and How Does It Work?","strippedTitle":"what is chatgpt and how does it work?","slug":"what-is-chatgpt","canonicalUrl":"","查找组件SEO":{"metaDescription":"Discover ChatGPT a powerful and user-friendly chat platform. Learn all about its features and how it makes communication effortless. ✓ Try ChatGPT now!","noIndex":0,"noFollow":0},"content":"ChatGPT is a huge phenomenon and a major paradigm shift in the accelerating march of technological progression. Artificial intelligence (AI) research company OpenAI released a free preview of the chatbot in November 2022, and by January 2023, it had more than a million users. So, what is chatgpt? It's a large language model (LLM) that belongs to a category of AI called <em>generative AI </em><em>, </em>which can generate new content rather than simply analyze existing data.\r\n<p class=\"article-tips tldr\">Don't have time to read the entire article?\r\n<a href=\"#summary\" data-analytics-id=\"product-test-2\">Jump to the quick read summary.</a></p>\r\n\r\n\r\n[caption id=\"attachment_299371\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-299371\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-on-laptop-adobeStock_553228015_Editorial_Use_Only.jpg\" alt=\"\" width=\"630\" height=\"420\" /> ©Irissca / Adobe Stock[/caption]\r\n\r\nAdditionally, anyone can interact with ChatGPT (GPT stands for generative pre-trained transformer) in their own words. A natural, humanlike dialog ensues.\r\n\r\nChatGPT <em> </em>is often directly <a href=\"//chat.openai.com/auth/login\" target=\"_blank\" rel=\"noopener\">accessed online</a> by users, but it is also being integrated with several existing applications, such as Microsoft Office apps (Word, Excel, and PowerPoint) and the Bing search engine. The number of app integrations seems to grow every day as existing software providers hurry to capitalize on ChatGPT’s popularity.\r\n<h2 id=\"tab1\" >What is ChatGPT used for?</h2>\r\nThe ways to use ChatGPT are as varied as its users. Most people lean towards more basic requests, such as creating a poem, an essay, or short marketing content. Students often turn to it to do their homework. Heads up, kids: ChatGPT stinks at answering riddles and sometimes word problems in math. Other times, it just makes things up.\r\n\r\nIn general, people tend to use ChatGPT to guide or explain something, as if the bot were a fancier version of a search engine. Nothing is wrong with that use, but ChatGPT can do so much more.\r\n\r\nHow much more depends on how well you write the prompt. If you write a basic prompt, you’ll get a bare-bones answer that you could have found using a search engine such as Google or Bing. That’s the most common reason why people abandon ChatGPT after a few uses. They erroneously believe it has nothing new to offer. But this particular failing is the user’s fault, not ChatGPT’s.\r\n<h2 id=\"tab2\" >What can ChatGPT do?</h2>\r\nThis list covers just some of the more unique uses of this technology. Users have asked ChatGPT to:\r\n<ul>\r\n \t<li>Conduct an interview with a long-dead legendary figure regarding their views of contemporary topics.</li>\r\n \t<li>Recommend colors and color combinations for logos, fashion designs, and interior decorating designs.</li>\r\n \t<li>Generate original works such as articles, e-books, and ad copy.</li>\r\n \t<li>Predict the outcome of a business scenario.</li>\r\n \t<li>Develop an investment strategy based on stock market history and current economic conditions.</li>\r\n \t<li>Make a diagnosis based on a patient’s real-world test results.</li>\r\n \t<li>Write computer code to make a new computer game from scratch.</li>\r\n \t<li>Leverage sales leads.</li>\r\n \t<li>Inspire ideas for a variety of things from A/B testing to podcasts, webinars, and full-feature films.</li>\r\n \t<li>Check computer code for errors.</li>\r\n \t<li>Summarize legalese in software agreements, contracts, and other forms into simple laymen language.</li>\r\n \t<li>Calculate the terms of an agreement into total costs.</li>\r\n \t<li>Teach a skill or get instructions for a complex task.</li>\r\n \t<li>Find an error in their logic before implementing their decision in the real world.</li>\r\n</ul>\r\nMuch ado has been made of ChatGPT’s creativity. But that creativity is a reflection and result of the human doing the prompting. If you can think it, you can probably get ChatGPT to play along.\r\n\r\nUnfortunately, that’s true for bad guys too. For example, they can prompt ChatGPT to find vulnerabilities in computer code or a computer system; steal your identity by writing a document in your style, tone, and word choices; or edit an audio clip or a video clip to fool your biometric security measures or make it say something you didn’t actually say. Only their imagination limits the possibilities for harm and chaos.\r\n<h2 id=\"tab3\" >Unwrapping ChatGPT fears</h2>\r\nPerhaps no other technology is as intriguing and disturbing as generative artificial intelligence. Emotions were raised to a fever pitch when 100 million monthly active users snatched up the free, research preview version of ChatGPT within two months after its launch. You can thank science fiction writers and your own imagination for both the tantalizing and terrifying triggers that ChatGPT is now activating in your head, making you wonder: Is ChatGPT safe?\r\n\r\nThere are definitely legitimate reasons for caution and concern. Lawsuits have been launched against generative AI programs for copyright and other intellectual property infringements.\r\n\r\nOpenAI and other AI companies and partners stand accused of illegally using copyrighted photos, text, and other intellectual property without permission or payment to train their AI models. These charges generally spring from copyrighted content getting caught up in the scraping of the Internet to create massive training datasets.\r\n\r\nIn general, legal defense teams are arguing the inevitability and unsustainability of such charges in the age of AI and requesting that charges be dropped.\r\n\r\nThe lawsuits regarding who owns the content generated by ChatGPT and its ilk lurk somewhere in the future. However, the U.S. Copyright:chơi xổ số keno trực tuyếnMọi quyền được bảo lưu cho trang web chính thức Office has already ruled that AI-generated content, be it writing, images, or music, is not protected by copyright law. In the U.S., at least for now, the government will not protect anything generated by AI in terms of rights, licensing, or payment.\r\n\r\nMeanwhile, realistic concerns exist over other types of potential liabilities. ChatGPT and ChatGPT alternatives are known to sometimes deliver incorrect information to users and other machines. Who is liable when things go wrong, particularly in a life-threatening scenario?\r\n\r\nEven if a business’s bottom line is at stake and not someone's life, risks can run high and the outcome can be disastrous. Inevitably, someone will suffer and likely some person or organization will eventually be held accountable for it.\r\n\r\nThen, there are the magnifications of earlier concerns, such as data privacy, biases, unfair treatment of individuals and groups through AI actions, identity theft, deep fakes, security issues, and <em>reality apathy,</em> which is when the public can no longer tell what is true and what isn’t and thinks the effort to sort it all out is too difficult to pursue.\r\n\r\nIn short, all of this probably has you wondering: Is ChatGPT safe? The potential to misuse it accelerates and intensifies the need for the rules and standards currently being studied, pursued, and developed by organizations and governments seeking to establish guardrails aimed at ensuring responsible AI. The big question is whether they’ll succeed in time, given ChatGPT’s incredibly fast adoption rate worldwide.\r\n\r\nExamples of groups working on guidelines, ethics, standards, and responsible AI frameworks include the following:\r\n<ul>\r\n \t<li>ACM US Technology Committee’s Subcommittee on AI & Algorithms</li>\r\n \t<li>World Economic Forum</li>\r\n \t<li>UK’s Centre for Data Ethics</li>\r\n \t<li>Government agencies and efforts such as the US <em>AI Bill of Rights</em> and the European Council of the European Union’s <em>Artificial Intelligence Act.</em></li>\r\n \t<li>IEEE and its 7000 series of standards</li>\r\n \t<li>Universities such as New York University’s Stern School of Business</li>\r\n \t<li>The private sector, wherein companies make their own responsible AI policies and foundations</li>\r\n</ul>\r\n<h2 id=\"tab4\" >How does ChatGPT work?</h2>\r\nChatGPT works differently than a search engine. A search engine, such as Google or Bing, or an AI assistant, such as Siri, Alexa, or Google Assistant, works by searching the Internet for matches to the keywords you enter in the search bar. Algorithms refine the results based on any number of factors, but your browser history, topic interests, purchase data, and location data usually figure into the equation.\r\n\r\nYou’re then presented with a list of search results ranked in order of relevance as determined by the search engine’s algorithm. From there, the user is free to consider the sources of each option and click a selection to do a deeper dive for more details from that source.\r\n\r\nBy comparison, ChatGPT generates its own unified answer to your prompt. It doesn't offer citations or note its sources. You ask; it answers. Easy-peasey, right? No. That task is incredibly hard for AI to do, which is why generative AI is so impressive.\r\n\r\nGenerating an original result in response to a prompt is achieved by using either the GPT-3 (Generative Pre-trained Transformer 3) or GPT-4 model to analyze the prompt with context and predict the words that are likely to follow. Both GPT models are extremely powerful large language models capable of processing billions of words per second.\r\n\r\nIn short, transformers enable ChatGPT to generate coherent, humanlike text as a response to a prompt. ChatGPT creates a response by considering context and assigning weight (values) to words that are likely to follow the words in the prompt to predict which words would be an appropriate response.\r\n\r\nSome ChatGPT basics here: User input is called a <em>prompt</em> rather than a command or a query, although it can take either form. You are, in effect, prompting AI to predict and complete a pattern that you initiated by entering the prompt.\r\n<p class=\"article-tips tip\">If you'd like a comprehensive ChatGPT guide, including more detail on how it works and how to use it, check out my book <a href=\"//www.coursofppt.com/book/technology/information-technology/ai/general-ai/chat-gpt-for-dummies-298861/\" target=\"_blank\" rel=\"noopener\"><em>ChatGPT For Dummies</em></a>.</p>\r\n\r\n<h2 id=\"tab5\" >Peeking at the ChatGPT architecture</h2>\r\nAs its name implies, ChatGPT is a chatbot running on a GPT model. GPT-3, GPT-3.5, and GPT-4 are large language models (LLMs) developed by OpenAPI. When GPT-3 was introduced, it was the largest LLM at 175 billion parameters. An upgraded version called GPT-3.5 turbo is a highly optimized and more stable version of GPT-3 that's ten times cheaper for developers to use.\r\n\r\nChatGPT is now also available on GPT-4, which is a multimodal model, meaning it accepts both image and text inputs although its outputs are text only. It's now the largest LLM to date, although GPT-4’s exact number of parameters has yet to be disclosed.\r\n\r\n<em>Parameters</em> are numerical values that weigh and define connections between nodes and layers in the neural network architecture. The more parameters a model has, the more complex its internal representations and weighting. In general, more parameters lead to better performance on specific tasks.\r\n<h2 id=\"tab6\" >ChatGPT for beginners</h2>\r\nHere, you'll learn the basics of how to use ChatGPT and why it relies on your skills to optimize its performance. But the real treasure here are the tips and insights on how to write prompts so that ChatGPT can perform its true magic. You can learn even more about writing prompts in my book <em>ChatGPT For Dummies</em>.\r\n<h3>Writing effective ChatGPT prompts</h3>\r\nChatGPT appears deceptively simplistic. The user interface is elegantly minimalistic and intuitive, as shown in the figure below. The first part of the page offers information to users regarding ChatGPT’s capabilities and limitations plus a few examples of prompts.\r\n\r\n[caption id=\"attachment_298917\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298917\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-research-preview-free-version.jpg\" alt=\"Screenshot showing The ChatGPT screen on the free, research preview version\" width=\"630\" height=\"387\" /> ©John Wiley & Sons, Inc.<br />The ChatGPT screen on the free, research preview version[/caption]\r\n\r\nThe prompt bar, which resembles a search bar, runs across the bottom of the page. Just enter a question or a command to prompt ChatGPT to produce results immediately.\r\n\r\nIf you enter a basic prompt, you’ll get a bare-bones, encyclopedic-like answer, as shown in the figure below. Do that enough times and you’ll convince yourself that this is just a toy and you can get better results from an Internet search engine. This is a typical novice’s mistake and a primary reason why beginners give up before they fully grasp what ChatGPT is and can do.\r\n\r\n[caption id=\"attachment_298916\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298916\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-example-business-plan.jpg\" alt=\"Screenshot showing a ChatGPT response for a business plan\" width=\"630\" height=\"473\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds with a general outline for a business plan.[/caption]\r\n\r\nUnderstand that your previous experience with keywords and search engines does not apply here. You must think of and use ChatGPT in a different way. Think hard about how you’re going to word your prompt. You have many options to consider. You can assign ChatGPT a role or a persona, or several personas and roles if you decide it should respond as a team, as illustrated in the figure below.\r\n\r\n[caption id=\"attachment_298919\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298919\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-team-doctors.jpg\" alt=\"Screenshot showing an example of a ChatGPT response\" width=\"630\" height=\"988\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds as a team of doctors.[/caption]\r\n\r\nYou can assign yourself a new role or persona as well. Or tell it to address any type of audience — such as a high school graduating class, a surgical team, or attendees at a concert or a technology conference.\r\n\r\nYou can set the stage or situation in great or minimum detail. You can ask a question, give it a command, or require specific behaviors.\r\n\r\nA prompt, as you can see now, is much more than a question or a command. Your success with ChatGPT hinges on your ability to master crafting a prompt in such a way as to trigger the precise response you seek.\r\n\r\nAsk yourself these questions as you are writing or evaluating your prompt. Who do you want ChatGPT to be? Where, when, and what is the situation or circumstances you want ChatGPT’s response framed within? Is the question you're entering in the prompt the real question you want it to answer, or were you trying to ask something else? Is the command you're prompting complete enough for ChatGPT to draw from sufficient context to give you a fuller, more complete, and richly nuanced response?\r\n\r\nAnd the ultimate question for you to consider: Is your prompt specific and detailed, or vague and meandering? Whichever is the case, that’s what ChatGPT will mirror in its response.\r\n\r\nChatGPT’s responses are only as good as your prompt. That’s because the prompt starts a pattern that ChatGPT must then complete. Be intentional and concise about how you present that pattern starter — the prompt.\r\n<h2 id=\"tab7\" >Starting a chat</h2>\r\nTo start a chat, just type a question or command in the prompt bar, shown at the bottom of the figure below. ChatGPT responds instantly. You can continue the chat by using the prompt bar again. Usually, you do this to gain further insights or to get ChatGPT to further refine its response.\r\n\r\n[caption id=\"attachment_298918\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298918\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-user-interface.jpg\" alt=\"Screenshot showing the ChatGPT user interface\" width=\"630\" height=\"486\" /> ©John Wiley & Sons, Inc.<br />ChatGPT user interface[/caption]\r\n\r\nFollowing, are some things you can do in a prompt that may not be readily evident:\r\n<ul>\r\n \t<li>Add data in the prompt along with your question or command regarding what to do with this data. Adding data directly in the prompt enables you to add more current info as well as make ChatGPT responses more customizable and on point. You can use the Browsing plug-in to connect ChatGPT to the live Internet, which will give it access to current information. However, you may want to add data to the prompt anyway to better focus its attention on the problem or task at hand. However, there are limits on prompting and response sizes, so make your prompt as concise as possible.</li>\r\n \t<li>Direct the style, tone, vocabulary level, and other factors to shape ChatGPT's response.</li>\r\n \t<li>Command ChatGPT to assume a specific persona, job role, or authority level in its response.</li>\r\n</ul>\r\nIf you’re using ChatGPT-4, you'll soon be able to use images in the prompt too. ChatGPT can extract information from the image to use in its analysis.\r\n\r\nWhen you’ve finished chatting on a particular topic or task, it’s wise to start a new chat (by clicking or tapping the New Chat button in the upper left). Starting a new dialogue prevents confusing ChatGPT, which would otherwise treat subsequent prompts as part of a single conversational thread. On the other hand, starting too many new chats on the same topic or related topics can lead the AI to use repetitious phrasing and outputs, whether or not they apply to the new chat’s prompt.\r\n\r\nTo recap: Don't confuse ChatGPT by chatting in one long continuous thread with a lot of topic changes or by opening too many new chats on the same topic. Otherwise, ChatGPT will probably say something offensive or make up random and wrong answers.\r\n<p class=\" article-tips tip\">When writing prompts, think of the topic or task in narrow terms. For example, don't have a long chat on car racing, repairs, and maintenance. To keep ChatGPT more intently focused, narrow your prompt to a single topic, such as determining when the vehicle will be at top trade-in value so you can best offset a new car price. Your responses will be of much higher quality.</p>\r\nChatGPT may call you offensive names and make up stuff if the chat goes on too long. Shorter conversations tend to minimize these odd occurrences, or so most industry watchers think.\r\n<p id=\"summary\">For example, after ChatGPT responses to Bing users became unhinged and argumentative, Microsoft limited conversations with it to 5 prompts in a row, for a total of 50 conversations a day per user. But a few days later, it increased the limit to 6 prompts per conversation and a total of 60 conversations per day per user. The limits will probably increase when AI researchers can figure out how to tame the machine to an acceptable — or at least a less offensive — level.</p>\r\n\r\n<div class=\"summary-container\" data-testid=\"summarySection\">\r\n<div class=\"wrapper\">\r\n<div class=\"image-block\" data-testid=\"imageBlock\"></div>\r\n<div class=\"details-block\">\r\n<h2 id=\"tab8\" >Quick Read Summary</h2>\r\n<ul class=\"summary-list\">\r\n \t<li><p>ChatGPT, a product of OpenAI, represents a groundbreaking advancement in the world of artificial intelligence. Released as a free preview in November 2022, it quickly gained over a million users by January 2023. ChatGPT is a powerful example of generative AI, capable of generating new content instead of just analyzing existing data.</p></li>\r\n \t<li><p>This versatile tool is accessible online and is being integrated into various applications like Microsoft Office and Bing search, expanding its utility daily. Users initially engage with ChatGPT for basic tasks like crafting poems, essays, or marketing content. Students use it for homework. But all who use it should be cautious: ChatGPT struggles with riddles and word problems in math. It also has a tendency to make things up.</p></li>\r\n \t<li><p>People tend to use ChatGPT to guide or explain something, but its potential goes beyond simple requests. Depending on the quality of your prompt, it can perform a wide range of tasks. Users have leveraged ChatGPT for tasks like conducting interviews with historical figures, recommending color combinations, generating articles, predicting business scenarios, and even diagnosing medical conditions based on patients’ real-world test results.</p></li>\r\n \t<li><p>Users can harness ChatGPT’s capabilities for both good and ill, from identifying vulnerabilities in computer systems to creating deepfakes. Therefore, as ChatGPT's popularity soars, concerns about its safety and misuse grow. Legal battles surrounding copyright infringement and accountability for incorrect information continue to emerge. Ethical guidelines and standards are under development by organizations and governments to ensure responsible AI usage.</p></li>\r\n \t<li><p>ChatGPT operates differently from search engines and AI assistants. It generates original responses to prompts, making it a valuable tool for diverse tasks. Users must craft prompts effectively to receive meaningful responses, considering factors like context, role assignment, and audience specification.</p></li>\r\n</ul>\r\nIn summary, ChatGPT is a game-changer in AI technology, offering endless possibilities when used responsibly. Its potential for good or harm depends on the user, emphasizing the need for ethical guidelines and responsible AI practices.\r\n\r\nHungry for more? Go back and <a href=\"/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\">read the article</a> or <a href=\"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20\" class=\"amazon-btn\" target=\"_blank\" rel=\"noopener\">check out the book</a>.\r\n\r\n</div>\r\n</div>\r\n</div>","description":"ChatGPT is a huge phenomenon and a major paradigm shift in the accelerating march of technological progression. Artificial intelligence (AI) research company OpenAI released a free preview of the chatbot in November 2022, and by January 2023, it had more than a million users. So, what is chatgpt? It's a large language model (LLM) that belongs to a category of AI called <em>generative AI </em><em>, </em>which can generate new content rather than simply analyze existing data.\r\n<p class=\"article-tips tldr\">Don't have time to read the entire article?\r\n<a href=\"#summary\" data-analytics-id=\"product-test-2\">Jump to the quick read summary.</a></p>\r\n\r\n\r\n[caption id=\"attachment_299371\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-299371\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-on-laptop-adobeStock_553228015_Editorial_Use_Only.jpg\" alt=\"\" width=\"630\" height=\"420\" /> ©Irissca / Adobe Stock[/caption]\r\n\r\nAdditionally, anyone can interact with ChatGPT (GPT stands for generative pre-trained transformer) in their own words. A natural, humanlike dialog ensues.\r\n\r\nChatGPT <em> </em>is often directly <a href=\"//chat.openai.com/auth/login\" target=\"_blank\" rel=\"noopener\">accessed online</a> by users, but it is also being integrated with several existing applications, such as Microsoft Office apps (Word, Excel, and PowerPoint) and the Bing search engine. The number of app integrations seems to grow every day as existing software providers hurry to capitalize on ChatGPT’s popularity.\r\n<h2 id=\"tab1\" >What is ChatGPT used for?</h2>\r\nThe ways to use ChatGPT are as varied as its users. Most people lean towards more basic requests, such as creating a poem, an essay, or short marketing content. Students often turn to it to do their homework. Heads up, kids: ChatGPT stinks at answering riddles and sometimes word problems in math. Other times, it just makes things up.\r\n\r\nIn general, people tend to use ChatGPT to guide or explain something, as if the bot were a fancier version of a search engine. Nothing is wrong with that use, but ChatGPT can do so much more.\r\n\r\nHow much more depends on how well you write the prompt. If you write a basic prompt, you’ll get a bare-bones answer that you could have found using a search engine such as Google or Bing. That’s the most common reason why people abandon ChatGPT after a few uses. They erroneously believe it has nothing new to offer. But this particular failing is the user’s fault, not ChatGPT’s.\r\n<h2 id=\"tab2\" >What can ChatGPT do?</h2>\r\nThis list covers just some of the more unique uses of this technology. Users have asked ChatGPT to:\r\n<ul>\r\n \t<li>Conduct an interview with a long-dead legendary figure regarding their views of contemporary topics.</li>\r\n \t<li>Recommend colors and color combinations for logos, fashion designs, and interior decorating designs.</li>\r\n \t<li>Generate original works such as articles, e-books, and ad copy.</li>\r\n \t<li>Predict the outcome of a business scenario.</li>\r\n \t<li>Develop an investment strategy based on stock market history and current economic conditions.</li>\r\n \t<li>Make a diagnosis based on a patient’s real-world test results.</li>\r\n \t<li>Write computer code to make a new computer game from scratch.</li>\r\n \t<li>Leverage sales leads.</li>\r\n \t<li>Inspire ideas for a variety of things from A/B testing to podcasts, webinars, and full-feature films.</li>\r\n \t<li>Check computer code for errors.</li>\r\n \t<li>Summarize legalese in software agreements, contracts, and other forms into simple laymen language.</li>\r\n \t<li>Calculate the terms of an agreement into total costs.</li>\r\n \t<li>Teach a skill or get instructions for a complex task.</li>\r\n \t<li>Find an error in their logic before implementing their decision in the real world.</li>\r\n</ul>\r\nMuch ado has been made of ChatGPT’s creativity. But that creativity is a reflection and result of the human doing the prompting. If you can think it, you can probably get ChatGPT to play along.\r\n\r\nUnfortunately, that’s true for bad guys too. For example, they can prompt ChatGPT to find vulnerabilities in computer code or a computer system; steal your identity by writing a document in your style, tone, and word choices; or edit an audio clip or a video clip to fool your biometric security measures or make it say something you didn’t actually say. Only their imagination limits the possibilities for harm and chaos.\r\n<h2 id=\"tab3\" >Unwrapping ChatGPT fears</h2>\r\nPerhaps no other technology is as intriguing and disturbing as generative artificial intelligence. Emotions were raised to a fever pitch when 100 million monthly active users snatched up the free, research preview version of ChatGPT within two months after its launch. You can thank science fiction writers and your own imagination for both the tantalizing and terrifying triggers that ChatGPT is now activating in your head, making you wonder: Is ChatGPT safe?\r\n\r\nThere are definitely legitimate reasons for caution and concern. Lawsuits have been launched against generative AI programs for copyright and other intellectual property infringements.\r\n\r\nOpenAI and other AI companies and partners stand accused of illegally using copyrighted photos, text, and other intellectual property without permission or payment to train their AI models. These charges generally spring from copyrighted content getting caught up in the scraping of the Internet to create massive training datasets.\r\n\r\nIn general, legal defense teams are arguing the inevitability and unsustainability of such charges in the age of AI and requesting that charges be dropped.\r\n\r\nThe lawsuits regarding who owns the content generated by ChatGPT and its ilk lurk somewhere in the future. However, the U.S. Copyright:chơi xổ số keno trực tuyếnMọi quyền được bảo lưu cho trang web chính thức Office has already ruled that AI-generated content, be it writing, images, or music, is not protected by copyright law. In the U.S., at least for now, the government will not protect anything generated by AI in terms of rights, licensing, or payment.\r\n\r\nMeanwhile, realistic concerns exist over other types of potential liabilities. ChatGPT and ChatGPT alternatives are known to sometimes deliver incorrect information to users and other machines. Who is liable when things go wrong, particularly in a life-threatening scenario?\r\n\r\nEven if a business’s bottom line is at stake and not someone's life, risks can run high and the outcome can be disastrous. Inevitably, someone will suffer and likely some person or organization will eventually be held accountable for it.\r\n\r\nThen, there are the magnifications of earlier concerns, such as data privacy, biases, unfair treatment of individuals and groups through AI actions, identity theft, deep fakes, security issues, and <em>reality apathy,</em> which is when the public can no longer tell what is true and what isn’t and thinks the effort to sort it all out is too difficult to pursue.\r\n\r\nIn short, all of this probably has you wondering: Is ChatGPT safe? The potential to misuse it accelerates and intensifies the need for the rules and standards currently being studied, pursued, and developed by organizations and governments seeking to establish guardrails aimed at ensuring responsible AI. The big question is whether they’ll succeed in time, given ChatGPT’s incredibly fast adoption rate worldwide.\r\n\r\nExamples of groups working on guidelines, ethics, standards, and responsible AI frameworks include the following:\r\n<ul>\r\n \t<li>ACM US Technology Committee’s Subcommittee on AI & Algorithms</li>\r\n \t<li>World Economic Forum</li>\r\n \t<li>UK’s Centre for Data Ethics</li>\r\n \t<li>Government agencies and efforts such as the US <em>AI Bill of Rights</em> and the European Council of the European Union’s <em>Artificial Intelligence Act.</em></li>\r\n \t<li>IEEE and its 7000 series of standards</li>\r\n \t<li>Universities such as New York University’s Stern School of Business</li>\r\n \t<li>The private sector, wherein companies make their own responsible AI policies and foundations</li>\r\n</ul>\r\n<h2 id=\"tab4\" >How does ChatGPT work?</h2>\r\nChatGPT works differently than a search engine. A search engine, such as Google or Bing, or an AI assistant, such as Siri, Alexa, or Google Assistant, works by searching the Internet for matches to the keywords you enter in the search bar. Algorithms refine the results based on any number of factors, but your browser history, topic interests, purchase data, and location data usually figure into the equation.\r\n\r\nYou’re then presented with a list of search results ranked in order of relevance as determined by the search engine’s algorithm. From there, the user is free to consider the sources of each option and click a selection to do a deeper dive for more details from that source.\r\n\r\nBy comparison, ChatGPT generates its own unified answer to your prompt. It doesn't offer citations or note its sources. You ask; it answers. Easy-peasey, right? No. That task is incredibly hard for AI to do, which is why generative AI is so impressive.\r\n\r\nGenerating an original result in response to a prompt is achieved by using either the GPT-3 (Generative Pre-trained Transformer 3) or GPT-4 model to analyze the prompt with context and predict the words that are likely to follow. Both GPT models are extremely powerful large language models capable of processing billions of words per second.\r\n\r\nIn short, transformers enable ChatGPT to generate coherent, humanlike text as a response to a prompt. ChatGPT creates a response by considering context and assigning weight (values) to words that are likely to follow the words in the prompt to predict which words would be an appropriate response.\r\n\r\nSome ChatGPT basics here: User input is called a <em>prompt</em> rather than a command or a query, although it can take either form. You are, in effect, prompting AI to predict and complete a pattern that you initiated by entering the prompt.\r\n<p class=\"article-tips tip\">If you'd like a comprehensive ChatGPT guide, including more detail on how it works and how to use it, check out my book <a href=\"//www.coursofppt.com/book/technology/information-technology/ai/general-ai/chat-gpt-for-dummies-298861/\" target=\"_blank\" rel=\"noopener\"><em>ChatGPT For Dummies</em></a>.</p>\r\n\r\n<h2 id=\"tab5\" >Peeking at the ChatGPT architecture</h2>\r\nAs its name implies, ChatGPT is a chatbot running on a GPT model. GPT-3, GPT-3.5, and GPT-4 are large language models (LLMs) developed by OpenAPI. When GPT-3 was introduced, it was the largest LLM at 175 billion parameters. An upgraded version called GPT-3.5 turbo is a highly optimized and more stable version of GPT-3 that's ten times cheaper for developers to use.\r\n\r\nChatGPT is now also available on GPT-4, which is a multimodal model, meaning it accepts both image and text inputs although its outputs are text only. It's now the largest LLM to date, although GPT-4’s exact number of parameters has yet to be disclosed.\r\n\r\n<em>Parameters</em> are numerical values that weigh and define connections between nodes and layers in the neural network architecture. The more parameters a model has, the more complex its internal representations and weighting. In general, more parameters lead to better performance on specific tasks.\r\n<h2 id=\"tab6\" >ChatGPT for beginners</h2>\r\nHere, you'll learn the basics of how to use ChatGPT and why it relies on your skills to optimize its performance. But the real treasure here are the tips and insights on how to write prompts so that ChatGPT can perform its true magic. You can learn even more about writing prompts in my book <em>ChatGPT For Dummies</em>.\r\n<h3>Writing effective ChatGPT prompts</h3>\r\nChatGPT appears deceptively simplistic. The user interface is elegantly minimalistic and intuitive, as shown in the figure below. The first part of the page offers information to users regarding ChatGPT’s capabilities and limitations plus a few examples of prompts.\r\n\r\n[caption id=\"attachment_298917\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298917\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-research-preview-free-version.jpg\" alt=\"Screenshot showing The ChatGPT screen on the free, research preview version\" width=\"630\" height=\"387\" /> ©John Wiley & Sons, Inc.<br />The ChatGPT screen on the free, research preview version[/caption]\r\n\r\nThe prompt bar, which resembles a search bar, runs across the bottom of the page. Just enter a question or a command to prompt ChatGPT to produce results immediately.\r\n\r\nIf you enter a basic prompt, you’ll get a bare-bones, encyclopedic-like answer, as shown in the figure below. Do that enough times and you’ll convince yourself that this is just a toy and you can get better results from an Internet search engine. This is a typical novice’s mistake and a primary reason why beginners give up before they fully grasp what ChatGPT is and can do.\r\n\r\n[caption id=\"attachment_298916\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298916\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-example-business-plan.jpg\" alt=\"Screenshot showing a ChatGPT response for a business plan\" width=\"630\" height=\"473\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds with a general outline for a business plan.[/caption]\r\n\r\nUnderstand that your previous experience with keywords and search engines does not apply here. You must think of and use ChatGPT in a different way. Think hard about how you’re going to word your prompt. You have many options to consider. You can assign ChatGPT a role or a persona, or several personas and roles if you decide it should respond as a team, as illustrated in the figure below.\r\n\r\n[caption id=\"attachment_298919\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298919\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-response-team-doctors.jpg\" alt=\"Screenshot showing an example of a ChatGPT response\" width=\"630\" height=\"988\" /> ©John Wiley & Sons, Inc.<br />ChatGPT responds as a team of doctors.[/caption]\r\n\r\nYou can assign yourself a new role or persona as well. Or tell it to address any type of audience — such as a high school graduating class, a surgical team, or attendees at a concert or a technology conference.\r\n\r\nYou can set the stage or situation in great or minimum detail. You can ask a question, give it a command, or require specific behaviors.\r\n\r\nA prompt, as you can see now, is much more than a question or a command. Your success with ChatGPT hinges on your ability to master crafting a prompt in such a way as to trigger the precise response you seek.\r\n\r\nAsk yourself these questions as you are writing or evaluating your prompt. Who do you want ChatGPT to be? Where, when, and what is the situation or circumstances you want ChatGPT’s response framed within? Is the question you're entering in the prompt the real question you want it to answer, or were you trying to ask something else? Is the command you're prompting complete enough for ChatGPT to draw from sufficient context to give you a fuller, more complete, and richly nuanced response?\r\n\r\nAnd the ultimate question for you to consider: Is your prompt specific and detailed, or vague and meandering? Whichever is the case, that’s what ChatGPT will mirror in its response.\r\n\r\nChatGPT’s responses are only as good as your prompt. That’s because the prompt starts a pattern that ChatGPT must then complete. Be intentional and concise about how you present that pattern starter — the prompt.\r\n<h2 id=\"tab7\" >Starting a chat</h2>\r\nTo start a chat, just type a question or command in the prompt bar, shown at the bottom of the figure below. ChatGPT responds instantly. You can continue the chat by using the prompt bar again. Usually, you do this to gain further insights or to get ChatGPT to further refine its response.\r\n\r\n[caption id=\"attachment_298918\" align=\"alignnone\" width=\"630\"]<img class=\"size-full wp-image-298918\" src=\"//www.coursofppt.com/wp-content/uploads/chatgpt-user-interface.jpg\" alt=\"Screenshot showing the ChatGPT user interface\" width=\"630\" height=\"486\" /> ©John Wiley & Sons, Inc.<br />ChatGPT user interface[/caption]\r\n\r\nFollowing, are some things you can do in a prompt that may not be readily evident:\r\n<ul>\r\n \t<li>Add data in the prompt along with your question or command regarding what to do with this data. Adding data directly in the prompt enables you to add more current info as well as make ChatGPT responses more customizable and on point. You can use the Browsing plug-in to connect ChatGPT to the live Internet, which will give it access to current information. However, you may want to add data to the prompt anyway to better focus its attention on the problem or task at hand. However, there are limits on prompting and response sizes, so make your prompt as concise as possible.</li>\r\n \t<li>Direct the style, tone, vocabulary level, and other factors to shape ChatGPT's response.</li>\r\n \t<li>Command ChatGPT to assume a specific persona, job role, or authority level in its response.</li>\r\n</ul>\r\nIf you’re using ChatGPT-4, you'll soon be able to use images in the prompt too. ChatGPT can extract information from the image to use in its analysis.\r\n\r\nWhen you’ve finished chatting on a particular topic or task, it’s wise to start a new chat (by clicking or tapping the New Chat button in the upper left). Starting a new dialogue prevents confusing ChatGPT, which would otherwise treat subsequent prompts as part of a single conversational thread. On the other hand, starting too many new chats on the same topic or related topics can lead the AI to use repetitious phrasing and outputs, whether or not they apply to the new chat’s prompt.\r\n\r\nTo recap: Don't confuse ChatGPT by chatting in one long continuous thread with a lot of topic changes or by opening too many new chats on the same topic. Otherwise, ChatGPT will probably say something offensive or make up random and wrong answers.\r\n<p class=\" article-tips tip\">When writing prompts, think of the topic or task in narrow terms. For example, don't have a long chat on car racing, repairs, and maintenance. To keep ChatGPT more intently focused, narrow your prompt to a single topic, such as determining when the vehicle will be at top trade-in value so you can best offset a new car price. Your responses will be of much higher quality.</p>\r\nChatGPT may call you offensive names and make up stuff if the chat goes on too long. Shorter conversations tend to minimize these odd occurrences, or so most industry watchers think.\r\n<p id=\"summary\">For example, after ChatGPT responses to Bing users became unhinged and argumentative, Microsoft limited conversations with it to 5 prompts in a row, for a total of 50 conversations a day per user. But a few days later, it increased the limit to 6 prompts per conversation and a total of 60 conversations per day per user. The limits will probably increase when AI researchers can figure out how to tame the machine to an acceptable — or at least a less offensive — level.</p>\r\n\r\n<div class=\"summary-container\" data-testid=\"summarySection\">\r\n<div class=\"wrapper\">\r\n<div class=\"image-block\" data-testid=\"imageBlock\"></div>\r\n<div class=\"details-block\">\r\n<h2 id=\"tab8\" >Quick Read Summary</h2>\r\n<ul class=\"summary-list\">\r\n \t<li><p>ChatGPT, a product of OpenAI, represents a groundbreaking advancement in the world of artificial intelligence. Released as a free preview in November 2022, it quickly gained over a million users by January 2023. ChatGPT is a powerful example of generative AI, capable of generating new content instead of just analyzing existing data.</p></li>\r\n \t<li><p>This versatile tool is accessible online and is being integrated into various applications like Microsoft Office and Bing search, expanding its utility daily. Users initially engage with ChatGPT for basic tasks like crafting poems, essays, or marketing content. Students use it for homework. But all who use it should be cautious: ChatGPT struggles with riddles and word problems in math. It also has a tendency to make things up.</p></li>\r\n \t<li><p>People tend to use ChatGPT to guide or explain something, but its potential goes beyond simple requests. Depending on the quality of your prompt, it can perform a wide range of tasks. Users have leveraged ChatGPT for tasks like conducting interviews with historical figures, recommending color combinations, generating articles, predicting business scenarios, and even diagnosing medical conditions based on patients’ real-world test results.</p></li>\r\n \t<li><p>Users can harness ChatGPT’s capabilities for both good and ill, from identifying vulnerabilities in computer systems to creating deepfakes. Therefore, as ChatGPT's popularity soars, concerns about its safety and misuse grow. Legal battles surrounding copyright infringement and accountability for incorrect information continue to emerge. Ethical guidelines and standards are under development by organizations and governments to ensure responsible AI usage.</p></li>\r\n \t<li><p>ChatGPT operates differently from search engines and AI assistants. It generates original responses to prompts, making it a valuable tool for diverse tasks. Users must craft prompts effectively to receive meaningful responses, considering factors like context, role assignment, and audience specification.</p></li>\r\n</ul>\r\nIn summary, ChatGPT is a game-changer in AI technology, offering endless possibilities when used responsibly. Its potential for good or harm depends on the user, emphasizing the need for ethical guidelines and responsible AI practices.\r\n\r\nHungry for more? Go back and <a href=\"/article/technology/information-technology/ai/general-ai/what-is-chatgpt-298910/\">read the article</a> or <a href=\"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20\" class=\"amazon-btn\" target=\"_blank\" rel=\"noopener\">check out the book</a>.\r\n\r\n</div>\r\n</div>\r\n</div>","blurb":"","authors":[{"authorId":34669,"name":"Pam Baker","slug":"pamela-baker","description":"<b>Pam Baker </b>is a veteran business analyst, speaker, and journalist whose work is focused on big data, artificial intelligence, machine learning, business intelligence, and data analysis. She is the author of <i>Data Divination – Big Data Strategies </i>and <i>ChatGPT For Dummies.</i>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/34669"}}],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"General AI","slug":"general-ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"What is ChatGPT used for?","target":"#tab1"},{"label":"What can ChatGPT do?","target":"#tab2"},{"label":"Unwrapping ChatGPT fears","target":"#tab3"},{"label":"How does ChatGPT work?","target":"#tab4"},{"label":"Peeking at the ChatGPT architecture","target":"#tab5"},{"label":"ChatGPT for beginners","target":"#tab6"},{"label":"Starting a chat","target":"#tab7"},{"label":"Quick Read Summary","target":"#tab8"}],"relatedArticles":{"fromBook":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299281,"title":"How to Write Prompts for ChatGPT","slug":"how-to-write-prompts-for-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299281"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}}],"fromCategory":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299281,"title":"How to Write Prompts for ChatGPT","slug":"how-to-write-prompts-for-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299281"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}},{"articleId":272673,"title":"How Intelligent Recommendation Systems Work","slug":"how-intelligent-recommendation-systems-work","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272673"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":298861,"slug":"chat-gpt-for-dummies","isbn":"9781394204632","categoryList":["technology","information-technology","ai","general-ai"],"amazon":{"default":"//www.amazon.com/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394204639-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394204639/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/chatgpt-for-dummies-cover-9781394204632-164x255.jpg","width":164,"height":255},"title":"ChatGPT For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"35299\">Pam Baker</b></b> is a freelance journalist who is focused on emerging tech topics like artificial intelligence, data analytics, and edge computing. She is the author of <i>Decision Intelligence For Dummies</i>.</p>","authors":[{"authorId":35299,"name":"Pam Baker","slug":"pam-baker","description":" <p><b>Pam Baker</b> is a freelance journalist who is focused on emerging tech topics like artificial intelligence, data analytics, and edge computing. She is the author of <i>Decision Intelligence For Dummies</i>. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35299"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394204632&quot;]}]\" id=\"du-slot-653fc534eaa53\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394204632&quot;]}]\" id=\"du-slot-653fc534eb1c9\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Explore","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-05-19T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":298910},{"headers":{"creationTime":"2019-06-28T19:14:30+00:00","modifiedTime":"2024-08-31T15:24:34+00:00","timestamp":"2024-08-31T18:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"The 2 Pillars of Cybersecurity","strippedTitle":"the 2 pillars of cybersecurity","slug":"2-pillars-cybersecurity","canonicalUrl":"","查找组件SEO":{"metaDescription":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity pla","noIndex":0,"noFollow":0},"content":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"//www.coursofppt.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","description":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"//www.coursofppt.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271553"}},{"articleId":253756,"title":"Securing the Human Firewall","slug":"securing-human-firewall","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253756"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"//www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8946"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1a457\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1abef\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253759},{"headers":{"creationTime":"2019-06-28T19:11:30+00:00","modifiedTime":"2024-08-31T15:24:17+00:00","timestamp":"2024-08-31T18:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Securing the Human Firewall","strippedTitle":"securing the human firewall","slug":"securing-human-firewall","canonicalUrl":"","查找组件SEO":{"metaDescription":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with t","noIndex":0,"noFollow":0},"content":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","description":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271553"}},{"articleId":253759,"title":"The 2 Pillars of Cybersecurity","slug":"2-pillars-cybersecurity","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/253759"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"//www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/8946"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec77fd\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec853c\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253756},{"headers":{"creationTime":"2018-04-18T00:55:51+00:00","modifiedTime":"2024-07-27T12:42:43+00:00","timestamp":"2024-07-27T15:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33577"},"slug":"data-science","categoryId":33577},{"name":"General Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"},"slug":"general-data-science","categoryId":33580}],"title":"E-Commerce and Data Testing Tactics","strippedTitle":"e-commerce and data testing tactics","slug":"e-commerce-data-testing-tactics","canonicalUrl":"","查找组件SEO":{"metaDescription":"In growth, you use testing methods to optimize your web design and messaging so that it performs at its absolute best with the audiences to which it's targeted.","noIndex":0,"noFollow":0},"content":"In growth, you use testing methods to optimize your web design and messaging so that it performs at its absolute best with the audiences to which it's targeted. Although testing and web analytics methods are both intended to optimize performance, testing goes one layer deeper than web analytics. You use web analytics to get a general idea about the interests of your channel audiences and how well your marketing efforts are paying off over time.\r\n\r\nAfter you have this information, you can then go in deeper to test variations on live visitors in order to gain empirical evidence about what designs and messaging your visitors actually prefer.\r\n\r\nTesting tactics can help you optimize your website design or brand messaging for increased conversions in all layers of the funnel. Testing is also useful when optimizing your landing pages for user activations and revenue conversions.\r\n<h2 id=\"tab1\" >Checking out common types of testing in growth</h2>\r\nWhen you use data insights to increase growth for e-commerce businesses, you're likely to run into the three following testing tactics: A/B split testing, multivariate testing, and mouse-click heat map analytics.\r\n\r\nAn <em>A/B split test</em> is an optimization tactic you can use to split variations of your website or brand messaging between sets of live audiences in order to gauge responses and decide which of the two variations performs best. A/B split testing is the simplest testing method you can use for website or messaging optimization.\r\n\r\n<em>Multivariate testing</em> is, in many ways, similar to the multivariate regression analysis that I discuss in Chapter 5. Like multivariate regression analysis, multivariate testing allows you to uncover relationships, correlations, and causations between variables and outcomes. In the case of multivariate testing, you're testing several conversion factors simultaneously over an extended period in order to uncover which factors are responsible for increased conversions. Multivariate testing is more complicated than A/B split testing, but it usually provides quicker and more powerful results.\r\n\r\nLastly, you can use <em>mouse-click heat map analytics</em> to see how visitors are responding to your design and messaging choices. In this type of testing, you use the mouse-click heat map to help you make optimal website design and messaging choices to ensure that you're doing everything you can to keep your visitors focused and converting.\r\n<p class=\"article-tips remember\">Landing pages are meant to offer visitors little to no options, except to convert or to exit the page. Because a visitor has so few options on what he can do on a landing page, you don't really need to use multivariate testing or website mouse-click heat maps. Simple A/B split tests suffice.</p>\r\nData scientists working in growth hacking should be familiar with (and know how to derive insight from) the following testing applications:\r\n<ul>\r\n\t<li><strong><a href=\"//webtrends.com/\" target=\"_blank\" rel=\"noopener\">Webtrends</a>:</strong> Offers a conversion-optimization feature that includes functionality for A/B split testing and multivariate testing.</li>\r\n\t<li><strong><a href=\"//www.optimizely.com/\" target=\"_blank\" rel=\"noopener\">Optimizely</a>:</strong> A popular product among the growth-hacking community. You can use Optimizely for multipage funnel testing, A/B split testing, and multivariate testing, among other things.</li>\r\n\t<li><strong><a href=\"//vwo.com/\" target=\"_blank\" rel=\"noopener\">Visual Website Optimizer</a>:</strong> An excellent tool for A/B split testing and multivariate testing.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Testing for acquisitions</h2>\r\nAcquisitions testing provides feedback on how well your content performs with prospective users in your assorted channels. You can use acquisitions testing to help compare your message's performance in each channel, helping you optimize your messaging on a per-channel basis. If you want to optimize the performance of your brand's published images, you can use acquisition testing to compare image performance across your channels as well. Lastly, if you want to increase your acquisitions through increases in user referrals, use testing to help optimize your referrals messaging for the referrals channels. Acquisition testing can help you begin to understand the specific preferences of prospective users on a channel-by-channel basis. You can use A/B split testing to improve your acquisitions in the following ways:\r\n<ul>\r\n\t<li><strong>Social messaging optimization:</strong> After you use social analytics to deduce the general interests and preferences of users in each of your social channels, you can then further optimize your brand messaging along those channels by using A/B split testing to compare your headlines and social media messaging within each channel.</li>\r\n\t<li><strong>Brand image and messaging optimization:</strong> Compare and optimize the respective performances of images along each of your social channels.</li>\r\n\t<li><strong>Optimized referral messaging:</strong> Test the effectiveness of your email messaging at converting new user referrals.</li>\r\n</ul>\r\n<h2 id=\"tab3\" >Testing for activations</h2>\r\nActivation testing provides feedback on how well your website and its content perform in converting acquired users to active users. The results of activation testing can help you optimize your website and landing pages for maximum sign-ups and subscriptions. Here's how you'd use testing methods to optimize user activation growth:\r\n<ul>\r\n\t<li><strong>Website conversion optimization:</strong> Make sure your website is optimized for user activation conversions. You can use A/B split testing, multivariate testing, or a mouse-click heat map data visualization to help you optimize your website design.</li>\r\n\t<li><strong>Landing pages:</strong> If your landing page has a simple call to action that prompts guests to subscribe to your email list, you can use A/B split testing for simple design optimization of this page and the call-to-action messaging.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Testing for retentions</h2>\r\nRetentions testing provides feedback on how well your blog post and email headlines are performing among your base of activated users. If you want to optimize your headlines so that active users want to continue active engagements with your brand, test the performance of your user-retention tactics. Here's how you can use testing methods to optimize user retention growth:\r\n<ul>\r\n\t<li><strong>Headline optimization:</strong> Use A/B split testing to optimize the headlines of your blog posts and email marketing messages. Test different headline varieties within your different channels, and then use the varieties that perform the best. Email open rates and RSS view rates are ideal metrics to track the performance of each headline variation.</li>\r\n\t<li><strong>Conversion rate optimization:</strong> Use A/B split testing on the messaging within your emails to decide which messaging variety more effectively gets your activated users to engage with your brand. The more effective your email messaging is at getting activated users to take a desired action, the greater your user retention rates.</li>\r\n</ul>\r\n<h2 id=\"tab5\" >Testing for revenue growth</h2>\r\nRevenue testing gauges the performance of revenue-generating landing pages, e-commerce pages, and brand messaging. Revenue testing methods can help you optimize your landing and e-commerce pages for sales conversions. Here's how you can use testing methods to optimize revenue growth:\r\n<ul>\r\n\t<li><strong>Website conversion optimization:</strong> You can use A/B split testing, multivariate testing, or a mouse-click heat map data visualization to help optimize your sales page and shopping cart design for revenue-generating conversions.</li>\r\n\t<li><strong>Landing page optimization:</strong> If you have a landing page with a simple call to action that prompts guests to make a purchase, you can use A/B split testing for design optimization.</li>\r\n</ul>","description":"In growth, you use testing methods to optimize your web design and messaging so that it performs at its absolute best with the audiences to which it's targeted. Although testing and web analytics methods are both intended to optimize performance, testing goes one layer deeper than web analytics. You use web analytics to get a general idea about the interests of your channel audiences and how well your marketing efforts are paying off over time.\r\n\r\nAfter you have this information, you can then go in deeper to test variations on live visitors in order to gain empirical evidence about what designs and messaging your visitors actually prefer.\r\n\r\nTesting tactics can help you optimize your website design or brand messaging for increased conversions in all layers of the funnel. Testing is also useful when optimizing your landing pages for user activations and revenue conversions.\r\n<h2 id=\"tab1\" >Checking out common types of testing in growth</h2>\r\nWhen you use data insights to increase growth for e-commerce businesses, you're likely to run into the three following testing tactics: A/B split testing, multivariate testing, and mouse-click heat map analytics.\r\n\r\nAn <em>A/B split test</em> is an optimization tactic you can use to split variations of your website or brand messaging between sets of live audiences in order to gauge responses and decide which of the two variations performs best. A/B split testing is the simplest testing method you can use for website or messaging optimization.\r\n\r\n<em>Multivariate testing</em> is, in many ways, similar to the multivariate regression analysis that I discuss in Chapter 5. Like multivariate regression analysis, multivariate testing allows you to uncover relationships, correlations, and causations between variables and outcomes. In the case of multivariate testing, you're testing several conversion factors simultaneously over an extended period in order to uncover which factors are responsible for increased conversions. Multivariate testing is more complicated than A/B split testing, but it usually provides quicker and more powerful results.\r\n\r\nLastly, you can use <em>mouse-click heat map analytics</em> to see how visitors are responding to your design and messaging choices. In this type of testing, you use the mouse-click heat map to help you make optimal website design and messaging choices to ensure that you're doing everything you can to keep your visitors focused and converting.\r\n<p class=\"article-tips remember\">Landing pages are meant to offer visitors little to no options, except to convert or to exit the page. Because a visitor has so few options on what he can do on a landing page, you don't really need to use multivariate testing or website mouse-click heat maps. Simple A/B split tests suffice.</p>\r\nData scientists working in growth hacking should be familiar with (and know how to derive insight from) the following testing applications:\r\n<ul>\r\n\t<li><strong><a href=\"//webtrends.com/\" target=\"_blank\" rel=\"noopener\">Webtrends</a>:</strong> Offers a conversion-optimization feature that includes functionality for A/B split testing and multivariate testing.</li>\r\n\t<li><strong><a href=\"//www.optimizely.com/\" target=\"_blank\" rel=\"noopener\">Optimizely</a>:</strong> A popular product among the growth-hacking community. You can use Optimizely for multipage funnel testing, A/B split testing, and multivariate testing, among other things.</li>\r\n\t<li><strong><a href=\"//vwo.com/\" target=\"_blank\" rel=\"noopener\">Visual Website Optimizer</a>:</strong> An excellent tool for A/B split testing and multivariate testing.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Testing for acquisitions</h2>\r\nAcquisitions testing provides feedback on how well your content performs with prospective users in your assorted channels. You can use acquisitions testing to help compare your message's performance in each channel, helping you optimize your messaging on a per-channel basis. If you want to optimize the performance of your brand's published images, you can use acquisition testing to compare image performance across your channels as well. Lastly, if you want to increase your acquisitions through increases in user referrals, use testing to help optimize your referrals messaging for the referrals channels. Acquisition testing can help you begin to understand the specific preferences of prospective users on a channel-by-channel basis. You can use A/B split testing to improve your acquisitions in the following ways:\r\n<ul>\r\n\t<li><strong>Social messaging optimization:</strong> After you use social analytics to deduce the general interests and preferences of users in each of your social channels, you can then further optimize your brand messaging along those channels by using A/B split testing to compare your headlines and social media messaging within each channel.</li>\r\n\t<li><strong>Brand image and messaging optimization:</strong> Compare and optimize the respective performances of images along each of your social channels.</li>\r\n\t<li><strong>Optimized referral messaging:</strong> Test the effectiveness of your email messaging at converting new user referrals.</li>\r\n</ul>\r\n<h2 id=\"tab3\" >Testing for activations</h2>\r\nActivation testing provides feedback on how well your website and its content perform in converting acquired users to active users. The results of activation testing can help you optimize your website and landing pages for maximum sign-ups and subscriptions. Here's how you'd use testing methods to optimize user activation growth:\r\n<ul>\r\n\t<li><strong>Website conversion optimization:</strong> Make sure your website is optimized for user activation conversions. You can use A/B split testing, multivariate testing, or a mouse-click heat map data visualization to help you optimize your website design.</li>\r\n\t<li><strong>Landing pages:</strong> If your landing page has a simple call to action that prompts guests to subscribe to your email list, you can use A/B split testing for simple design optimization of this page and the call-to-action messaging.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Testing for retentions</h2>\r\nRetentions testing provides feedback on how well your blog post and email headlines are performing among your base of activated users. If you want to optimize your headlines so that active users want to continue active engagements with your brand, test the performance of your user-retention tactics. Here's how you can use testing methods to optimize user retention growth:\r\n<ul>\r\n\t<li><strong>Headline optimization:</strong> Use A/B split testing to optimize the headlines of your blog posts and email marketing messages. Test different headline varieties within your different channels, and then use the varieties that perform the best. Email open rates and RSS view rates are ideal metrics to track the performance of each headline variation.</li>\r\n\t<li><strong>Conversion rate optimization:</strong> Use A/B split testing on the messaging within your emails to decide which messaging variety more effectively gets your activated users to engage with your brand. The more effective your email messaging is at getting activated users to take a desired action, the greater your user retention rates.</li>\r\n</ul>\r\n<h2 id=\"tab5\" >Testing for revenue growth</h2>\r\nRevenue testing gauges the performance of revenue-generating landing pages, e-commerce pages, and brand messaging. Revenue testing methods can help you optimize your landing and e-commerce pages for sales conversions. Here's how you can use testing methods to optimize revenue growth:\r\n<ul>\r\n\t<li><strong>Website conversion optimization:</strong> You can use A/B split testing, multivariate testing, or a mouse-click heat map data visualization to help optimize your sales page and shopping cart design for revenue-generating conversions.</li>\r\n\t<li><strong>Landing page optimization:</strong> If you have a landing page with a simple call to action that prompts guests to make a purchase, you can use A/B split testing for design optimization.</li>\r\n</ul>","blurb":"","authors":[{"authorId":9232,"name":"Lillian Pierson","slug":"lillian-pierson","description":" <p><b>Lillian Pierson</b> is the CEO of Data-Mania, where she supports data professionals in transforming into world-class leaders and entrepreneurs. She has trained well over one million individuals on the topics of AI and data science. Lillian has assisted global leaders in IT, government, media organizations, and nonprofits.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9232"}}],"primaryCategoryTaxonomy":{"categoryId":33580,"title":"General Data Science","slug":"general-data-science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Checking out common types of testing in growth","target":"#tab1"},{"label":"Testing for acquisitions","target":"#tab2"},{"label":"Testing for activations","target":"#tab3"},{"label":"Testing for retentions","target":"#tab4"},{"label":"Testing for revenue growth","target":"#tab5"}],"relatedArticles":{"fromBook":[{"articleId":238086,"title":"Data Journalism: Collecting Data for Your Story","slug":"data-journalism-collecting-data-story","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/238086"}},{"articleId":238083,"title":"Data Journalism: How to Develop, Tell, and Present the Story","slug":"data-journalism-develop-tell-present-story","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/238083"}},{"articleId":238080,"title":"Data Journalism: Why the Story Matters","slug":"data-journalism-story-matters","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/238080"}},{"articleId":238077,"title":"The Where in Data Journalism","slug":"the-where-in-data-journalism","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/238077"}},{"articleId":238074,"title":"The When in Data Journalism","slug":"the-when-in-data-journalism","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/238074"}}],"fromCategory":[{"articleId":289776,"title":"Decision Intelligence For Dummies Cheat Sheet","slug":"decision-intelligence-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289776"}},{"articleId":289744,"title":"Microsoft Power BI For Dummies Cheat Sheet","slug":"microsoft-power-bi-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289744"}},{"articleId":275249,"title":"Laws and Regulations You Should Know for Blockchain Data Analysis Projects","slug":"laws-and-regulations-you-should-know-for-blockchain-data-analysis-projects","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275249"}},{"articleId":275244,"title":"Aligning Blockchain Data with Real-World Business Processes","slug":"aligning-blockchain-data-with-real-world-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275244"}},{"articleId":275239,"title":"Fitting Blockchain into Today’s Business Processes","slug":"fitting-blockchain-into-todays-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275239"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281677,"slug":"data-science-for-dummies","isbn":"9781119811558","categoryList":["technology","information-technology","data-science","general-data-science"],"amazon":{"default":"//www.amazon.com/gp/product/1119811554/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119811554/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119811554-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119811554/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119811554/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/data-science-for-dummies-3rd-edition-cover-9781119811558-203x255.jpg","width":203,"height":255},"title":"Data Science For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"9232\">Lillian Pierson</b></b> is the CEO of Data-Mania, where she supports data professionals in transforming into world-class leaders and entrepreneurs. She has trained well over one million individuals on the topics of AI and data science. Lillian has assisted global leaders in IT, government, media organizations, and nonprofits.</p>","authors":[{"authorId":9232,"name":"Lillian Pierson","slug":"lillian-pierson","description":" <p><b>Lillian Pierson</b> is the CEO of Data-Mania, where she supports data professionals in transforming into world-class leaders and entrepreneurs. She has trained well over one million individuals on the topics of AI and data science. Lillian has assisted global leaders in IT, government, media organizations, and nonprofits.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9232"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119811558&quot;]}]\" id=\"du-slot-64c286af22456\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119811558&quot;]}]\" id=\"du-slot-64c286af22c54\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-07-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":238044},{"headers":{"creationTime":"2021-09-10T21:44:16+00:00","modifiedTime":"2024-07-24T14:51:59+00:00","timestamp":"2024-07-24T15:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33577"},"slug":"data-science","categoryId":33577},{"name":"General Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"},"slug":"general-data-science","categoryId":33580}],"title":"Blockchain Data Analytics For Dummies Cheat Sheet","strippedTitle":"blockchain data analytics for dummies cheat sheet","slug":"blockchain-data-analytics-for-dummies-cheat-sheet","canonicalUrl":"","查找组件SEO":{"metaDescription":"To best leverage blockchain data analytics, become familiar with blockchain technology, how it stores data, and how to extract and analyze data.","noIndex":0,"noFollow":0},"content":"Blockchain technology is much more than just another way to store data. It's a radical new method of storing validated data and transaction information in an indelible, trusted repository. Blockchain has the potential to disrupt business as we know it, and in the process, provide a rich new source of behavioral data. Data analysts have long found valuable insights from historical data, and blockchain can expose new and reliable data to drive business strategy. To best leverage the value that blockchain data offers, become familiar with <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-a-blockchain-and-how-does-it-work-262432/\">blockchain technology</a> and how it stores data, and learn how to extract and analyze this data.\r\n\r\n[caption id=\"attachment_273254\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-273254\" src=\"//www.coursofppt.com/wp-content/uploads/blockchain-data-analytics.jpg\" alt=\"blockchain data analytics\" width=\"556\" height=\"371\" /> © everything possible / Shutterstock.com[/caption]","description":"Blockchain technology is much more than just another way to store data. It's a radical new method of storing validated data and transaction information in an indelible, trusted repository. Blockchain has the potential to disrupt business as we know it, and in the process, provide a rich new source of behavioral data. Data analysts have long found valuable insights from historical data, and blockchain can expose new and reliable data to drive business strategy. To best leverage the value that blockchain data offers, become familiar with <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-a-blockchain-and-how-does-it-work-262432/\">blockchain technology</a> and how it stores data, and learn how to extract and analyze this data.\r\n\r\n[caption id=\"attachment_273254\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-273254\" src=\"//www.coursofppt.com/wp-content/uploads/blockchain-data-analytics.jpg\" alt=\"blockchain data analytics\" width=\"556\" height=\"371\" /> © everything possible / Shutterstock.com[/caption]","blurb":"","authors":[{"authorId":27199,"name":"Michael G. Solomon","slug":"michael-solomon","description":"Michael G. Solomon, PhD, is a professor at the University of the Cumberlands who specializes in courses on blockchain and distributed computing systems as well as computer security. He holds numerous security and project management certifications and has written several books on security and project management, including Ethereum For Dummies. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/27199"}}],"primaryCategoryTaxonomy":{"categoryId":33580,"title":"General Data Science","slug":"general-data-science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":289776,"title":"Decision Intelligence For Dummies Cheat Sheet","slug":"decision-intelligence-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289776"}},{"articleId":289744,"title":"Microsoft Power BI For Dummies Cheat Sheet","slug":"microsoft-power-bi-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289744"}},{"articleId":275249,"title":"Laws and Regulations You Should Know for Blockchain Data Analysis Projects","slug":"laws-and-regulations-you-should-know-for-blockchain-data-analysis-projects","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275249"}},{"articleId":275244,"title":"Aligning Blockchain Data with Real-World Business Processes","slug":"aligning-blockchain-data-with-real-world-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275244"}},{"articleId":275239,"title":"Fitting Blockchain into Today’s Business Processes","slug":"fitting-blockchain-into-todays-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275239"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281640,"slug":"blockchain-data-analytics-for-dummies","isbn":"9781119651772","categoryList":["technology","information-technology","data-science","general-data-science"],"amazon":{"default":"//www.amazon.com/gp/product/1119651778/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119651778/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119651778-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119651778/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119651778/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/blockchain-data-analytics-for-dummies-cover-9781119651772-203x255.jpg","width":203,"height":255},"title":"Blockchain Data Analytics For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b>Kiana Danial</b> is an investment trainer and consultant as well as the author of <i>Cryptocurrency Investing For Dummies.</i></p> <p><b>Peter Kent</b> is a veteran technology author. <b>Tyler Bain </b>is a Certified Bitcoin Professional. Peter and Tyler are co-authors of <i>Cryptocurrency Mining For Dummies</i>. <b>Tiana Laurence </b>heads her own venture capital firm and is author of <i>Blockchain For Dummies</i>, 2nd Edition. <b><b data-author-id=\"34832\">Michael G. Solomon</b>, PhD,</b> is a professor of Computer Information Sciences as well as author of <i>Ethereum For Dummies</i>.</p>","authors":[{"authorId":34832,"name":"Michael G. Solomon","slug":"michael-g-solomon","description":" <p><b>Kiana Danial</b> is an investment trainer and consultant as well as the author of <i>Cryptocurrency Investing For Dummies.</i></p> <p><b>Peter Kent</b> is a veteran technology author. <b>Tyler Bain </b>is a Certified Bitcoin Professional. Peter and Tyler are co-authors of <i>Cryptocurrency Mining For Dummies</i>. <b>Tiana Laurence </b>heads her own venture capital firm and is author of <i>Blockchain For Dummies</i>, 2nd Edition. <b>Michael G. Solomon, PhD,</b> is a professor of Computer Information Sciences as well as author of <i>Ethereum For Dummies</i>.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/34832"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119651772&quot;]}]\" id=\"du-slot-64be922f68ca6\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119651772&quot;]}]\" id=\"du-slot-64be922f6949f\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Blockchain quick facts","thumb":null,"image":null,"content":"<p>Blockchain technology is a fast-growing disruptive technology that enables verified data to be shared among a set of untrusted parties. Moreover, blockchain makes it possible to share ledgers of items of value and control the exchange of these items in an untrusted environment.</p>\n<p>Today’s blockchains come in public, private, and hybrid versions that support complex software applications. Learning about blockchain technology will help you understand how people and organizations will conduct business in the near future and beyond.</p>\n<p>The following list summarizes some of blockchain technology’s most important features:</p>\n<ul>\n<li>A <em>blockchain</em> is a chain of blocks, where each block stores the mathematical hash value of the previous block, connecting it to its predecessor.</li>\n<li>Any changes to a block invalidates that block and all subsequent blocks in the chain.</li>\n<li>The most common use of a blockchain is to transfer some item of value (crypto-asset) from one account to another.</li>\n<li>Crypto-asset owners are identified by an <em>address,</em> which is related to the account’s public encryption key.</li>\n<li>Crypto-assets exist only in a blockchain, and each one is associated with some value in the real world.</li>\n<li>A transaction transfers a crypto-asset from one account (owner) to another.</li>\n<li>All transactions are digitally signed with the crypto-asset owner’s private key.</li>\n<li>Cryptography makes it easy to verify a transaction’s owner (digital signature) and a block’s integrity (hash).</li>\n<li><em>Smart contracts</em> are programs that define rules that control how data gets added to, and read from, the blockchain.</li>\n<li>Smart contracts must run the same way, and produce the same results, on every network node instance.</li>\n<li>Like data, smart contract code is stored in a blockchain block and can never be changed.</li>\n<li>Databases support create, read, update, and delete (CRUD) operations, whereas blockchains support only read and write operations.</li>\n<li>Blockchain’s add-only property keeps blocks in chronological order and makes it easy to trace a crypto-asset throughout its lifecycle (forward and backward.)</li>\n<li>The most popular consensus mechanism used today is Proof-of-Work (PoW), which requires enormous energy. However, other consensus algorithms, such as Proof-of-Stake (PoC), are becoming more popular which can help blockchains handle transactions faster and make the technology a better fit for more applications.</li>\n</ul>\n"},{"title":"Data analytics quick facts","thumb":null,"image":null,"content":"<p>Data analytics is all about finding hidden nuggets of valuable information in data. If the information you’re looking for were easy to find, you wouldn’t need analytics.</p>\n<p>The real power of data analytics is in its capability to learn from the past in ways that can help you improve the chances for success in the future. Success might be measured as increased sales, reduced costs, or having the right products in the right place at the right time.</p>\n<p>Understanding the different analytics models and their use is key to unlocking your data’s secrets. The following list summarizes some of the most common analytics techniques and models you’ll use when analyzing blockchain data:</p>\n<ul>\n<li>Every analytics model should exist to satisfy a specific business goal.</li>\n<li>Before starting to select any analytics model, create a data inventory (of on-chain and off-chain data).</li>\n<li>Build an analytics lab that allows you to experiment in an isolated environment.</li>\n<li>Determine your primary goals: identification, explanation, prediction, or any combination thereof.</li>\n<li>Clustering models show relationships among objects (identification).</li>\n<li>Association models can reveal objects that frequently exist together in transactions (explanation).</li>\n<li>Classification models determine to which group a new object belongs (identification).</li>\n<li>Prediction models predict future outcomes based on historical data (prediction).</li>\n<li>Object characteristics, or attributes, are often called <em>features</em>.</li>\n<li>A model’s output quality depends on selecting the best features to analyze.</li>\n<li><em>Scatterplots</em> can help determine which feature sets affect outcomes.</li>\n<li><em>K-means</em> is a popular clustering algorithm that reveals relationships between objects by identifying object clusters.</li>\n<li><em>Apriori</em> is a useful algorithm for showing objects that occur together in transactions frequently (market basket analysis).</li>\n<li><em>Decision tree</em> and <em>naïve Bayes</em> are both classification algorithms that help determine ways to label objects based on a limited number of labels.</li>\n<li>Regression algorithms (<em>linear regression</em> for continuous data and <em>logistic regression</em> for categorical data) can predict future behavior based on historical data.</li>\n<li><em>Time-series analysis</em> algorithms can remove cyclic and seasonal variations to reveal trends in data.</li>\n<li>Creating simple and effective visualizations of model results is important to communicate your results.</li>\n<li>Every analytics model should be validated with metrics to assess its accuracy and output significance.</li>\n</ul>\n"},{"title":"Extracting data from a blockchain quick facts","thumb":null,"image":null,"content":"<p>Data analytics models rely on data. You’ll need data to choose the right model, build it, train it, and then run it using new data. The process of preparing input data for an analytics model can be tedious.</p>\n<p>In a blockchain environment, building an analytics dataset includes identifying the data you’ll need, fetching it from the blockchain, and then completing the data picture with related data from off-chain repositories. Although you follow the same basic steps each time you populate a model, adding blockchain to the process adds another layer of requirements. The following list summarizes common concepts for accessing blockchain data and techniques for building a dataset from a blockchain:</p>\n<ul>\n<li>Use a blockchain explorer to examine all blockchains of interest for data.</li>\n<li>Smart contracts store state data and generate transaction data.</li>\n<li>Smart contracts generate events that result in log file entries (valuable for a timestamped record of actions).</li>\n<li>Build an analytics lab to support connecting to all blockchains of interest using your favorite language, such as Python or JavaScript.</li>\n<li>Decide between extracting data from the blockchain first (faster for multiple runs) or letting the analytics model collect blockchain data in real time (access to the latest data).</li>\n<li>When a model needs off-chain data as well as on-chain data, prebuilding datasets is generally easier.</li>\n<li>Establish a strategy for aligning on-chain and off-chain identities.</li>\n<li>Access blockchain data through event filters, smart contract functions, or state data queries.</li>\n<li>Cleanse blockchain data and convert any formats or types as necessary.</li>\n<li>Identify related off-chain data (or on-chain data from another blockchain) and fetch related data.</li>\n<li>Either store full data in a format suited for reading into a dataframe or develop conversion code.</li>\n<li>Identify partitions in your dataset to use for training and testing your model. Quasi-random object selection for each partition increases your model’s accuracy.</li>\n<li>Devise a strategy for updating extracted data with fresh data.</li>\n<li>Plan to re-train models as your dataset changes.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-02-25T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":273253},{"headers":{"creationTime":"2021-12-29T21:13:08+00:00","modifiedTime":"2024-07-24T14:42:04+00:00","timestamp":"2024-07-24T15:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33577"},"slug":"data-science","categoryId":33577},{"name":"General Data Science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"},"slug":"general-data-science","categoryId":33580}],"title":"The Primary Types of Blockchain","strippedTitle":"the primary types of blockchain","slug":"the-primary-types-of-blockchain","canonicalUrl":"","查找组件SEO":{"metaDescription":"Have you ever wondered what the different types of blockchain look like? Use this guide from coursofppt.com to learn how they compare.","noIndex":0,"noFollow":0},"content":"In 2008, Bitcoin was the only <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/brief-history-bitcoin-blockchain-242874/\">blockchain implementation</a>. At that time, Bitcoin and blockchain were synonymous. Now hundreds of different blockchain implementations exist. Each new blockchain implementation emerges to address a particular need and each one is unique. However, blockchains tend to share many features with other blockchains. Before examining blockchain applications and data, it helps to look at their similarities.\r\n\r\n[caption id=\"attachment_275189\" align=\"aligncenter\" width=\"556\"]<img class=\"wp-image-275189 size-full\" src=\"//www.coursofppt.com/wp-content/uploads/blockcahin-data-analytics-types.png\" alt=\"blockchain\" width=\"556\" height=\"324\" /> ©Shutterstock/phive[/caption]\r\n<p class=\"article-tips tip\">Check out this article to <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-blockchain-and-what-blockchains-are-242782/\">learn how blockchains work</a>.</p>\r\n\r\n<h2 id=\"tab1\" >Categorizing blockchain implementations</h2>\r\nOne of the most common ways to evaluate blockchains is to consider the underlying <em>data visibility,</em> that is, who can see and access the blockchain data. And just as important, who can participate in the decision (consensus) to add new blocks to the blockchain? The three primary blockchain models are public, private, and hybrid.\r\n<h3>Opening blockchain to everyone</h3>\r\nNakamoto’s original blockchain proposal described a public blockchain. After all, blockchain technology is all about providing trusted transactions among untrusted participants. Sharing a ledger of transactions among nodes in a public network provides a classic untrusted network. If anyone can join the network, you have no criteria on which to base your trust. It’s almost like throwing s $20 bill out your window and trusting that only the person you intend to pick it up will do so.\r\n\r\n<em>Public blockchain</em> implementations, including Bitcoin and Ethereum, depend on a consensus algorithm that makes it hard to mine blocks but easy to validate them. PoW is the most common consensus algorithm in use today for public blockchains, but that may change. Ethereum is in the process of transitioning to the <em>Proof of Stake (PoS) </em>consensus algorithm, which requires less computation and depends on how much blockchain currency a node holds. The idea is that a node with more blockchain currency would be affected negatively if it participates in unethical behavior. The higher the stake you have in something, the greater the chance that you’ll care about its integrity.\r\n\r\nBecause public blockchains are open to anyone (anyone can become a node on the network), no permission is needed to join. For this reason, a public blockchain is also called a <em>permissionless blockchain.</em> Public (permissionless) blockchains are most often used for new apps that interact with the public in general. A public blockchain is like a retail store, in that anyone can walk into the store and shop.\r\n<h3>Limiting blockchain access</h3>\r\nThe opposite of a public blockchain is a private blockchain, such as Hyperledger Fabric. In a <em>private blockchain,</em> also called a <em>permissioned blockchain,</em> the entity that owns and controls the blockchain grants and revokes access to the blockchain data. Because most enterprises manage sensitive or private data, private blockchains are commonly used because they can limit access to that data.\r\n\r\nThe blockchain data is still transparent and readily available but is subject to the owning entity’s access requirements. Some have argued that private blockchains violate data transparency, the original intent of blockchain technology. Although private blockchains can limit data access (and go against the philosophy of the original blockchain in Bitcoin), limited transparency also allows enterprises to consider blockchain technology for new apps in a private environment. Without the private blockchain option, the technology likely would never be considered for most enterprise applications.\r\n<h3>Combining the best of both worlds</h3>\r\nA classic blockchain use case is a supply chain app, which manages a product from its production all the way through its consumption. The beginning of the supply chain is when a product is manufactured, harvested, caught, or otherwise provisioned to send to an eventual customer. The supply chain app then tracks and manages each transfer of ownership as the product makes its way to the physical location where the consumer purchases it.\r\n\r\nSupply chain apps manage product movement, process payment at each stage in the movement lifecycle, and create an audit trail that can be used to investigate the actions of each owner along the supply chain. Blockchain technology is well suited to support the transfer of ownership and maintain an indelible record of each step in the process.\r\n\r\nMany supply chains are complex and consist of multiple organizations. In such cases, data suffers as it is exported from one participant, transmitted to the next participant, and then imported into their data system. A single blockchain would simplify the export/transport/import cycle and auditing. An additional benefit of blockchain technology in supply chain apps is the ease with which a product’s <em>provenance</em> (a trace of owners back to its origin) is readily available.\r\n\r\nMany of today’s supply chains are made up of several enterprises that enter into agreements to work together for mutual benefit. Although the participants in a supply chain are business partners, they do not fully trust one another. A blockchain can provide the level of transactional and data trust that the enterprises need.\r\n\r\nThe best solution is a semi-private blockchain – that is, the blockchain is public for supply chain participants but not to anyone else. This type of blockchain (one that is owned by a group of entities) is called a <em>hybrid, </em>or <em>consortium, blockchain.</em> The participants jointly own the blockchain and agree on policies to govern access.\r\n<h2 id=\"tab2\" >Describing basic blockchain type features</h2>\r\nEach type of blockchain has specific strengths and weaknesses. Which one to use depends on the goals and target environment. You have to know why you need blockchain and what you expect to get from it before you can make an informed decision as to what type of blockchain would be best. The best solution for one organization may not be the best solution for another. The table below shows how blockchain types compare and why you might choose one over the other.\r\n<h3>Differences in Types of Blockchain</h3>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td>Feature</td>\r\n<td>Public</td>\r\n<td>Private</td>\r\n<td>Hybrid</td>\r\n</tr>\r\n<tr>\r\n<td>Permission</td>\r\n<td>Permissionless</td>\r\n<td>Permissioned (limited to organization members)</td>\r\n<td>Permissioned (limited to consortium members)</td>\r\n</tr>\r\n<tr>\r\n<td>Consensus</td>\r\n<td>PoW, PoS, and so on</td>\r\n<td>Authorized participants</td>\r\n<td>Varies; can use any method</td>\r\n</tr>\r\n<tr>\r\n<td>Performance</td>\r\n<td>Slow (due to consensus)</td>\r\n<td>Fast (relatively)</td>\r\n<td>Generally fast</td>\r\n</tr>\r\n<tr>\r\n<td>Identity</td>\r\n<td>Virtually anonymous</td>\r\n<td>Validated identity</td>\r\n<td>Validated identity</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\nThe primary differences between each type of blockchain are the consensus algorithm used and whether participants are known or anonymous. These two concepts are related. An unknown (and therefore completely untrusted) participant will require an environment with a more rigorous consensus algorithm. On the other hand, if you know the transaction participants, you can use a less rigorous consensus algorithm.\r\n<h2 id=\"tab3\" >Contrasting popular enterprise blockchain implementations</h2>\r\nDozens of blockchain implementations are available today, and soon there will be hundreds. Each new blockchain implementation targets a specific market and offers unique features. There isn’t room in this article to cover even a fair number of blockchain implementations, but you should be aware of some of the most popular.\r\n\r\nRemember that you’ll be learning about blockchain analytics in this book. Although organizations of all sizes are starting to leverage the power of analytics, enterprises were early adopters and have the most mature approach to extracting value from data.\r\n<p class=\"article-tips tech\">The What Matrix website provides a comprehensive comparison of top enterprise blockchains. Visit <a href=\"//www.whatmatrix.com/comparison/Blockchain-for-Enterprise\" target=\"_blank\" rel=\"noopener\">whatmatrix.com</a> for up-to-date blockchain information.</p>\r\nFollowing are the top enterprise blockchain implementations and some of their strengths and weaknesses (ranking is based on the What Matrix website):\r\n<ul>\r\n \t<li><strong>Hyperledger Fabric:</strong> The flagship blockchain implementation from the Linux Foundation. Hyperledger is an open-source project backed by a diverse consortium of large corporations. Hyperledger’s modular-based architecture and rich support make it the highest rated enterprise blockchain.</li>\r\n \t<li><strong>V</strong><strong>eChain:</strong> Currently more popular that Hyperledger, having the highest number of enterprise use cases among products reviewed by What Matrix. VeChain includes support for two native cryptocurrencies and states that its focus is on efficient enterprise collaboration.</li>\r\n \t<li><strong>Ripple Transaction Protocol:</strong> A blockchain that focuses on financial markets. Instead of appealing to general use cases, Ripple caters to organizations that want to implement financial transaction blockchain apps. Ripple was the first commercially available blockchain focused on financial solutions.</li>\r\n \t<li><strong>Ethereum:</strong> The most popular general-purpose, public blockchain implementation. Although <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-ethereum-263632/\">Ethereum</a> is not technically an enterprise solution, it's in use in multiple proof of concept projects.</li>\r\n</ul>\r\nThe preceding list is just a brief overview of a small sample of blockchain implementations. If you’re just beginning to learn about blockchain technology in general, start out with Ethereum, which is one of the easier blockchain implementations to learn. After that, you can progress to another blockchain that may be better aligned with your organization.\r\n\r\nWant to learn more? Check out our <a href=\"//www.coursofppt.com/article/technology/information-technology/data-science/general-data-science/blockchain-data-analytics-for-dummies-cheat-sheet-273253/\">Blockchain Data Analytic Cheat Sheet.</a>","description":"In 2008, Bitcoin was the only <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/brief-history-bitcoin-blockchain-242874/\">blockchain implementation</a>. At that time, Bitcoin and blockchain were synonymous. Now hundreds of different blockchain implementations exist. Each new blockchain implementation emerges to address a particular need and each one is unique. However, blockchains tend to share many features with other blockchains. Before examining blockchain applications and data, it helps to look at their similarities.\r\n\r\n[caption id=\"attachment_275189\" align=\"aligncenter\" width=\"556\"]<img class=\"wp-image-275189 size-full\" src=\"//www.coursofppt.com/wp-content/uploads/blockcahin-data-analytics-types.png\" alt=\"blockchain\" width=\"556\" height=\"324\" /> ©Shutterstock/phive[/caption]\r\n<p class=\"article-tips tip\">Check out this article to <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-blockchain-and-what-blockchains-are-242782/\">learn how blockchains work</a>.</p>\r\n\r\n<h2 id=\"tab1\" >Categorizing blockchain implementations</h2>\r\nOne of the most common ways to evaluate blockchains is to consider the underlying <em>data visibility,</em> that is, who can see and access the blockchain data. And just as important, who can participate in the decision (consensus) to add new blocks to the blockchain? The three primary blockchain models are public, private, and hybrid.\r\n<h3>Opening blockchain to everyone</h3>\r\nNakamoto’s original blockchain proposal described a public blockchain. After all, blockchain technology is all about providing trusted transactions among untrusted participants. Sharing a ledger of transactions among nodes in a public network provides a classic untrusted network. If anyone can join the network, you have no criteria on which to base your trust. It’s almost like throwing s $20 bill out your window and trusting that only the person you intend to pick it up will do so.\r\n\r\n<em>Public blockchain</em> implementations, including Bitcoin and Ethereum, depend on a consensus algorithm that makes it hard to mine blocks but easy to validate them. PoW is the most common consensus algorithm in use today for public blockchains, but that may change. Ethereum is in the process of transitioning to the <em>Proof of Stake (PoS) </em>consensus algorithm, which requires less computation and depends on how much blockchain currency a node holds. The idea is that a node with more blockchain currency would be affected negatively if it participates in unethical behavior. The higher the stake you have in something, the greater the chance that you’ll care about its integrity.\r\n\r\nBecause public blockchains are open to anyone (anyone can become a node on the network), no permission is needed to join. For this reason, a public blockchain is also called a <em>permissionless blockchain.</em> Public (permissionless) blockchains are most often used for new apps that interact with the public in general. A public blockchain is like a retail store, in that anyone can walk into the store and shop.\r\n<h3>Limiting blockchain access</h3>\r\nThe opposite of a public blockchain is a private blockchain, such as Hyperledger Fabric. In a <em>private blockchain,</em> also called a <em>permissioned blockchain,</em> the entity that owns and controls the blockchain grants and revokes access to the blockchain data. Because most enterprises manage sensitive or private data, private blockchains are commonly used because they can limit access to that data.\r\n\r\nThe blockchain data is still transparent and readily available but is subject to the owning entity’s access requirements. Some have argued that private blockchains violate data transparency, the original intent of blockchain technology. Although private blockchains can limit data access (and go against the philosophy of the original blockchain in Bitcoin), limited transparency also allows enterprises to consider blockchain technology for new apps in a private environment. Without the private blockchain option, the technology likely would never be considered for most enterprise applications.\r\n<h3>Combining the best of both worlds</h3>\r\nA classic blockchain use case is a supply chain app, which manages a product from its production all the way through its consumption. The beginning of the supply chain is when a product is manufactured, harvested, caught, or otherwise provisioned to send to an eventual customer. The supply chain app then tracks and manages each transfer of ownership as the product makes its way to the physical location where the consumer purchases it.\r\n\r\nSupply chain apps manage product movement, process payment at each stage in the movement lifecycle, and create an audit trail that can be used to investigate the actions of each owner along the supply chain. Blockchain technology is well suited to support the transfer of ownership and maintain an indelible record of each step in the process.\r\n\r\nMany supply chains are complex and consist of multiple organizations. In such cases, data suffers as it is exported from one participant, transmitted to the next participant, and then imported into their data system. A single blockchain would simplify the export/transport/import cycle and auditing. An additional benefit of blockchain technology in supply chain apps is the ease with which a product’s <em>provenance</em> (a trace of owners back to its origin) is readily available.\r\n\r\nMany of today’s supply chains are made up of several enterprises that enter into agreements to work together for mutual benefit. Although the participants in a supply chain are business partners, they do not fully trust one another. A blockchain can provide the level of transactional and data trust that the enterprises need.\r\n\r\nThe best solution is a semi-private blockchain – that is, the blockchain is public for supply chain participants but not to anyone else. This type of blockchain (one that is owned by a group of entities) is called a <em>hybrid, </em>or <em>consortium, blockchain.</em> The participants jointly own the blockchain and agree on policies to govern access.\r\n<h2 id=\"tab2\" >Describing basic blockchain type features</h2>\r\nEach type of blockchain has specific strengths and weaknesses. Which one to use depends on the goals and target environment. You have to know why you need blockchain and what you expect to get from it before you can make an informed decision as to what type of blockchain would be best. The best solution for one organization may not be the best solution for another. The table below shows how blockchain types compare and why you might choose one over the other.\r\n<h3>Differences in Types of Blockchain</h3>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td>Feature</td>\r\n<td>Public</td>\r\n<td>Private</td>\r\n<td>Hybrid</td>\r\n</tr>\r\n<tr>\r\n<td>Permission</td>\r\n<td>Permissionless</td>\r\n<td>Permissioned (limited to organization members)</td>\r\n<td>Permissioned (limited to consortium members)</td>\r\n</tr>\r\n<tr>\r\n<td>Consensus</td>\r\n<td>PoW, PoS, and so on</td>\r\n<td>Authorized participants</td>\r\n<td>Varies; can use any method</td>\r\n</tr>\r\n<tr>\r\n<td>Performance</td>\r\n<td>Slow (due to consensus)</td>\r\n<td>Fast (relatively)</td>\r\n<td>Generally fast</td>\r\n</tr>\r\n<tr>\r\n<td>Identity</td>\r\n<td>Virtually anonymous</td>\r\n<td>Validated identity</td>\r\n<td>Validated identity</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\nThe primary differences between each type of blockchain are the consensus algorithm used and whether participants are known or anonymous. These two concepts are related. An unknown (and therefore completely untrusted) participant will require an environment with a more rigorous consensus algorithm. On the other hand, if you know the transaction participants, you can use a less rigorous consensus algorithm.\r\n<h2 id=\"tab3\" >Contrasting popular enterprise blockchain implementations</h2>\r\nDozens of blockchain implementations are available today, and soon there will be hundreds. Each new blockchain implementation targets a specific market and offers unique features. There isn’t room in this article to cover even a fair number of blockchain implementations, but you should be aware of some of the most popular.\r\n\r\nRemember that you’ll be learning about blockchain analytics in this book. Although organizations of all sizes are starting to leverage the power of analytics, enterprises were early adopters and have the most mature approach to extracting value from data.\r\n<p class=\"article-tips tech\">The What Matrix website provides a comprehensive comparison of top enterprise blockchains. Visit <a href=\"//www.whatmatrix.com/comparison/Blockchain-for-Enterprise\" target=\"_blank\" rel=\"noopener\">whatmatrix.com</a> for up-to-date blockchain information.</p>\r\nFollowing are the top enterprise blockchain implementations and some of their strengths and weaknesses (ranking is based on the What Matrix website):\r\n<ul>\r\n \t<li><strong>Hyperledger Fabric:</strong> The flagship blockchain implementation from the Linux Foundation. Hyperledger is an open-source project backed by a diverse consortium of large corporations. Hyperledger’s modular-based architecture and rich support make it the highest rated enterprise blockchain.</li>\r\n \t<li><strong>V</strong><strong>eChain:</strong> Currently more popular that Hyperledger, having the highest number of enterprise use cases among products reviewed by What Matrix. VeChain includes support for two native cryptocurrencies and states that its focus is on efficient enterprise collaboration.</li>\r\n \t<li><strong>Ripple Transaction Protocol:</strong> A blockchain that focuses on financial markets. Instead of appealing to general use cases, Ripple caters to organizations that want to implement financial transaction blockchain apps. Ripple was the first commercially available blockchain focused on financial solutions.</li>\r\n \t<li><strong>Ethereum:</strong> The most popular general-purpose, public blockchain implementation. Although <a href=\"//www.coursofppt.com/article/business-careers-money/personal-finance/cryptocurrency/what-is-ethereum-263632/\">Ethereum</a> is not technically an enterprise solution, it's in use in multiple proof of concept projects.</li>\r\n</ul>\r\nThe preceding list is just a brief overview of a small sample of blockchain implementations. If you’re just beginning to learn about blockchain technology in general, start out with Ethereum, which is one of the easier blockchain implementations to learn. After that, you can progress to another blockchain that may be better aligned with your organization.\r\n\r\nWant to learn more? Check out our <a href=\"//www.coursofppt.com/article/technology/information-technology/data-science/general-data-science/blockchain-data-analytics-for-dummies-cheat-sheet-273253/\">Blockchain Data Analytic Cheat Sheet.</a>","blurb":"","authors":[{"authorId":27199,"name":"Michael G. Solomon","slug":"michael-solomon","description":"Michael G. Solomon, PhD, is a professor at the University of the Cumberlands who specializes in courses on blockchain and distributed computing systems as well as computer security. He holds numerous security and project management certifications and has written several books on security and project management, including Ethereum For Dummies. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/27199"}}],"primaryCategoryTaxonomy":{"categoryId":33580,"title":"General Data Science","slug":"general-data-science","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33580"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Categorizing blockchain implementations","target":"#tab1"},{"label":"Describing basic blockchain type features","target":"#tab2"},{"label":"Contrasting popular enterprise blockchain implementations","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":289776,"title":"Decision Intelligence For Dummies Cheat Sheet","slug":"decision-intelligence-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289776"}},{"articleId":289744,"title":"Microsoft Power BI For Dummies Cheat Sheet","slug":"microsoft-power-bi-for-dummies-cheat-sheet","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/289744"}},{"articleId":275249,"title":"Laws and Regulations You Should Know for Blockchain Data Analysis Projects","slug":"laws-and-regulations-you-should-know-for-blockchain-data-analysis-projects","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275249"}},{"articleId":275244,"title":"Aligning Blockchain Data with Real-World Business Processes","slug":"aligning-blockchain-data-with-real-world-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275244"}},{"articleId":275239,"title":"Fitting Blockchain into Today’s Business Processes","slug":"fitting-blockchain-into-todays-business-processes","categoryList":["technology","information-technology","data-science","general-data-science"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/275239"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-64be922f4db47\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;data-science&quot;,&quot;general-data-science&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-64be922f4e319\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-03-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":275188},{"headers":{"creationTime":"2021-08-20T03:29:35+00:00","modifiedTime":"2024-07-10T15:54:38+00:00","timestamp":"2024-07-10T18:01:05+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"General AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"Using Asset Performance Optimization for Vehicles & Machinery","strippedTitle":"using asset performance optimization for vehicles & machinery","slug":"asset-performance-optimization-increasing-value-by-extending-lifespans","canonicalUrl":"","查找组件SEO":{"metaDescription":"You can use AI and Internet of Things sensors to go beyond preventive maintenance to implement predictive maintenance, asset performance optimization.","noIndex":0,"noFollow":0},"content":"They say if it ain’t broke, don’t fix it, but anyone with high-value assets, whether a fleet of bucket trucks or drilling rigs, knows preventive maintenance is much more effective than performing repairs reactively. Servicing equipment before it fails reduces costly downtime and extends its lifespan, thus stretching your resources as far as possible.\r\n\r\nThis concept certainly isn’t new. Routine equipment checks and preventive maintenance in general have been the responsibility of every maintenance department for decades. But here’s the good part.\r\n\r\nYou can <a href=\"//www.coursofppt.com/computers/enterprise-ai-for-dummies-cheat-sheet/\">use AI</a> and Internet of Things (IoT) sensors to go beyond preventive maintenance to implement predictive maintenance.\r\n\r\nPreventive maintenance prevents failures with inspections and services performed at predetermined intervals. Predictive maintenance uses large volumes of data and advanced analytics to anticipate the likelihood of failure based on the history and current status of a specific piece of equipment and recommends service before it happens.\r\n\r\nHow do you like the sound of that? It’s the sound of asset performance optimization. This figure traces the evolution of this concept.\r\n\r\n[caption id=\"attachment_272669\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-272669\" src=\"//www.coursofppt.com/wp-content/uploads/enterpriseAI-asset-performance-optimization.jpg\" alt=\"asset performance optimization\" width=\"556\" height=\"189\" /> The evolution from maintenance to asset performance optimization following the advent of data analytics, sensor technology, and AI.[/caption]\r\n<h2 id=\"tab1\" >Spying on Your Machines</h2>\r\nAsset performance optimization (APO) collects the digital output from IoT-enabled equipment and associated processes, analyzes the data, tracks performance, and makes recommendations regarding maintenance. APO allows you to forecast future needs and perform predictive maintenance before immediate actions are needed.\r\n\r\nAlthough some machines run continuously with little need for maintenance, others require much more care and attention to operate at their best level. Determining which equipment needs more frequent servicing can be time-consuming and tedious. Often maintenance guidelines rely heavily on guesswork. Time frames for tune-ups tend to be little more than suggestions, based on information such as shop manuals and a recommendation from the lead mechanics rather than hard data, such as metrics from the performance history of each piece of equipment, including downtime and previous failures.\r\n\r\nAPO, on the other hand, analyzes both structured and unstructured data, such as field notes, to add context for equipment readings and deliver more precise recommendations. Using IoT devices, APO systems gather data from sensors, EIM systems, and external sources. It then uses AI to acquire, merge, manage, and analyze this information, presenting the results using real-time dashboards that can be shared and reviewed quickly for at-a-glance updates. Throughout the lifespan of the equipment, through regular use and maintenance, the system continues to learn and improve its insights over time.\r\n\r\n[caption id=\"attachment_272668\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-272668\" src=\"//www.coursofppt.com/wp-content/uploads/enterpriseAI-APO-failures.jpg\" alt=\"avoid failures with APO\" width=\"556\" height=\"191\" /> APO helps you decide how to avoid predicted failures.[/caption]\r\n<h2 id=\"tab2\" >Fixing It Before It Breaks</h2>\r\nAPO allows you to take a strategic approach to predictive maintenance by focusing on what will make the greatest difference to your operation. Unforeseen equipment malfunctions and downtime cause disruptions, which can ultimately jeopardize project timelines, customer satisfaction, and business revenue.\r\n<p class=\"article-tips remember\">These are benefits of APO:</p>\r\n\r\n<ul>\r\n \t<li><strong>Smoother, more predictable operations:</strong> Equipment issues are addressed preemptively instead of after a disruption occurs, leading to greater overall operational efficiency. Implementing APO can help companies achieve a 70-percent elimination of unanticipated equipment failure.</li>\r\n \t<li><strong>Reduced downtime:</strong> Preventive maintenance typically reduces machine downtime by 30 to 50 percent.</li>\r\n \t<li><strong>Boosted productivity:</strong> In addition to reducing downtime, predictive maintenance allows you to become more strategic in scheduling maintenance. This also can uncover any routine maintenance tasks that can be performed at less frequent intervals.</li>\r\n \t<li><strong>Lowered costs:</strong> APO can reduce the time required to plan maintenance by 20 to 50 percent, increase equipment uptime and availability by 10 to 20 percent, and reduce overall maintenance costs by 5 to 10 percent, according to a Deloitte study.</li>\r\n \t<li><strong>Increased customer satisfaction:</strong> Assets nearing failures can sacrifice production quality, cause service outages, and create other circumstances that ultimately affect the customer. By preventing these issues from happening, APO helps companies achieve and maintain better customer satisfaction.</li>\r\n \t<li><strong>Improved safety outcomes:</strong> Equipment malfunctions can result in serious injury, but often companies don’t know a system is about to fail until it’s too late. PwC reports that APO and predictive maintenance can improve maintenance safety by up to 14 percent.</li>\r\n \t<li><strong>Reduced risk of litigation and penalties:</strong> With fewer breakdowns and disruptions to service, organizations can minimize their risk of costly fines, lawsuits, and subsequent reputational damage.</li>\r\n</ul>\r\nUltimately, in any industry with high-value equipment, or even large numbers of low-cost assets, APO pays off. It directs technicians’ efforts to the machines that need attention the most, instead of performing inspections or maintenance on the equipment that doesn’t need it. This leads to predictable and seamless operations, improved uptime, increased revenue opportunities, and greater customer satisfaction.\r\n<h2 id=\"tab3\" >Learning from the Future</h2>\r\nAPO solutions allow you to enhance your operations by making your machines smarter and sharing that intelligence with your workforce, thereby maximizing the value of both your human teams and your mechanical equipment. As the age of AI advances, the companies that thrive will be those that find the best ways to harness data for improved operational performance.\r\n<h3>Data collection</h3>\r\nAPO continuously collects data on mechanical performance from IoT sensors in virtually any type of device or machine, ranging from hydraulic brake system sensors on a train to temperature monitors inside industrial and medical refrigerators holding sensitive products. The system collects numerous data points from the sensors, blending them with other sources, and analyzes the results.\r\n\r\nFor example, in the case of a hydraulic brake system, APO compares current data to historical performance records, including failure reports, to deliver predictive maintenance insights. When further data inputs are blended with this specific brake data, even richer and more accurate recommendations can be delivered.\r\n\r\nAdditional input samples from internal and third-party sources can be blended to provide context and greater insight; these types of input can be invaluable:\r\n<ul>\r\n \t<li>Weather data</li>\r\n \t<li>Maintenance recommendations from manuals</li>\r\n \t<li>Supplier quality data</li>\r\n \t<li>Historical brake maintenance schedules and failure rates</li>\r\n \t<li>Passenger travel analysis</li>\r\n \t<li>Heavy or unusual usage data</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Using this comprehensive blend of data, you can implement an APO solution to recognize patterns and perform an in-depth analysis in multiple applications, from manufacturing plants to utilities and even healthcare. The data can include metrics such as temperature, movement, light exposure, and more collected from IoT sensors on fleets, plants, pipelines, medical imaging equipment, jets, grids, and any other Internet-enabled device.</p>\r\n\r\n<h3>Analysis</h3>\r\nAI uses big data analytics and natural-language processing to derive key data points from structured data as well as unstructured content such as field notes and equipment manuals.\r\n<p class=\"article-tips tip\">You can use AI to analyze this information and relevant historical data to identify patterns and generate questions that help engineers, maintenance supervisors, production managers, and other key personnel make informed and timely decisions. APO solutions use these patterns to make predictive conclusions that help you answer questions in various areas, such as these:</p>\r\n\r\n<ul>\r\n \t<li><strong>Timing:</strong> Am I performing inspections at appropriate intervals? Would shortening the intervals improve overall uptime? Or could I afford to lengthen the intervals to reduce resource expenditure?</li>\r\n \t<li><strong>Quality:</strong> Could defective components be slipping through my inspections and leading to downtime? If so, how can I improve the inspection process to prevent this issue moving forward?</li>\r\n \t<li><strong>Design:</strong> Can my design be modified to reduce future failures?</li>\r\n</ul>\r\nFor example, a predictive conclusion formed by the patterns observed in the case of the train brake system might indicate the need for shorter inspection intervals. This is where humans come in and leverage all of these valuable findings to improve their business.\r\n<h3>Putting insights to use</h3>\r\nAfter patterns are identified and their related questions are answered, the predictive conclusions provided by APO solutions can then be implemented. For example, train maintenance workers can schedule inspections more frequently to check for a key component in the hydraulic brake system that has shown a tendency to fail. Or perhaps the APO solution discovers that a defective component in the train needs attention. Field engineers can use a digital model of the train to determine a repair strategy. If the part cannot be repaired, the APO solution can trigger a replacement part order through the supply chain network, using automation to streamline the process of getting the train back up and running.","description":"They say if it ain’t broke, don’t fix it, but anyone with high-value assets, whether a fleet of bucket trucks or drilling rigs, knows preventive maintenance is much more effective than performing repairs reactively. Servicing equipment before it fails reduces costly downtime and extends its lifespan, thus stretching your resources as far as possible.\r\n\r\nThis concept certainly isn’t new. Routine equipment checks and preventive maintenance in general have been the responsibility of every maintenance department for decades. But here’s the good part.\r\n\r\nYou can <a href=\"//www.coursofppt.com/computers/enterprise-ai-for-dummies-cheat-sheet/\">use AI</a> and Internet of Things (IoT) sensors to go beyond preventive maintenance to implement predictive maintenance.\r\n\r\nPreventive maintenance prevents failures with inspections and services performed at predetermined intervals. Predictive maintenance uses large volumes of data and advanced analytics to anticipate the likelihood of failure based on the history and current status of a specific piece of equipment and recommends service before it happens.\r\n\r\nHow do you like the sound of that? It’s the sound of asset performance optimization. This figure traces the evolution of this concept.\r\n\r\n[caption id=\"attachment_272669\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-272669\" src=\"//www.coursofppt.com/wp-content/uploads/enterpriseAI-asset-performance-optimization.jpg\" alt=\"asset performance optimization\" width=\"556\" height=\"189\" /> The evolution from maintenance to asset performance optimization following the advent of data analytics, sensor technology, and AI.[/caption]\r\n<h2 id=\"tab1\" >Spying on Your Machines</h2>\r\nAsset performance optimization (APO) collects the digital output from IoT-enabled equipment and associated processes, analyzes the data, tracks performance, and makes recommendations regarding maintenance. APO allows you to forecast future needs and perform predictive maintenance before immediate actions are needed.\r\n\r\nAlthough some machines run continuously with little need for maintenance, others require much more care and attention to operate at their best level. Determining which equipment needs more frequent servicing can be time-consuming and tedious. Often maintenance guidelines rely heavily on guesswork. Time frames for tune-ups tend to be little more than suggestions, based on information such as shop manuals and a recommendation from the lead mechanics rather than hard data, such as metrics from the performance history of each piece of equipment, including downtime and previous failures.\r\n\r\nAPO, on the other hand, analyzes both structured and unstructured data, such as field notes, to add context for equipment readings and deliver more precise recommendations. Using IoT devices, APO systems gather data from sensors, EIM systems, and external sources. It then uses AI to acquire, merge, manage, and analyze this information, presenting the results using real-time dashboards that can be shared and reviewed quickly for at-a-glance updates. Throughout the lifespan of the equipment, through regular use and maintenance, the system continues to learn and improve its insights over time.\r\n\r\n[caption id=\"attachment_272668\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-272668\" src=\"//www.coursofppt.com/wp-content/uploads/enterpriseAI-APO-failures.jpg\" alt=\"avoid failures with APO\" width=\"556\" height=\"191\" /> APO helps you decide how to avoid predicted failures.[/caption]\r\n<h2 id=\"tab2\" >Fixing It Before It Breaks</h2>\r\nAPO allows you to take a strategic approach to predictive maintenance by focusing on what will make the greatest difference to your operation. Unforeseen equipment malfunctions and downtime cause disruptions, which can ultimately jeopardize project timelines, customer satisfaction, and business revenue.\r\n<p class=\"article-tips remember\">These are benefits of APO:</p>\r\n\r\n<ul>\r\n \t<li><strong>Smoother, more predictable operations:</strong> Equipment issues are addressed preemptively instead of after a disruption occurs, leading to greater overall operational efficiency. Implementing APO can help companies achieve a 70-percent elimination of unanticipated equipment failure.</li>\r\n \t<li><strong>Reduced downtime:</strong> Preventive maintenance typically reduces machine downtime by 30 to 50 percent.</li>\r\n \t<li><strong>Boosted productivity:</strong> In addition to reducing downtime, predictive maintenance allows you to become more strategic in scheduling maintenance. This also can uncover any routine maintenance tasks that can be performed at less frequent intervals.</li>\r\n \t<li><strong>Lowered costs:</strong> APO can reduce the time required to plan maintenance by 20 to 50 percent, increase equipment uptime and availability by 10 to 20 percent, and reduce overall maintenance costs by 5 to 10 percent, according to a Deloitte study.</li>\r\n \t<li><strong>Increased customer satisfaction:</strong> Assets nearing failures can sacrifice production quality, cause service outages, and create other circumstances that ultimately affect the customer. By preventing these issues from happening, APO helps companies achieve and maintain better customer satisfaction.</li>\r\n \t<li><strong>Improved safety outcomes:</strong> Equipment malfunctions can result in serious injury, but often companies don’t know a system is about to fail until it’s too late. PwC reports that APO and predictive maintenance can improve maintenance safety by up to 14 percent.</li>\r\n \t<li><strong>Reduced risk of litigation and penalties:</strong> With fewer breakdowns and disruptions to service, organizations can minimize their risk of costly fines, lawsuits, and subsequent reputational damage.</li>\r\n</ul>\r\nUltimately, in any industry with high-value equipment, or even large numbers of low-cost assets, APO pays off. It directs technicians’ efforts to the machines that need attention the most, instead of performing inspections or maintenance on the equipment that doesn’t need it. This leads to predictable and seamless operations, improved uptime, increased revenue opportunities, and greater customer satisfaction.\r\n<h2 id=\"tab3\" >Learning from the Future</h2>\r\nAPO solutions allow you to enhance your operations by making your machines smarter and sharing that intelligence with your workforce, thereby maximizing the value of both your human teams and your mechanical equipment. As the age of AI advances, the companies that thrive will be those that find the best ways to harness data for improved operational performance.\r\n<h3>Data collection</h3>\r\nAPO continuously collects data on mechanical performance from IoT sensors in virtually any type of device or machine, ranging from hydraulic brake system sensors on a train to temperature monitors inside industrial and medical refrigerators holding sensitive products. The system collects numerous data points from the sensors, blending them with other sources, and analyzes the results.\r\n\r\nFor example, in the case of a hydraulic brake system, APO compares current data to historical performance records, including failure reports, to deliver predictive maintenance insights. When further data inputs are blended with this specific brake data, even richer and more accurate recommendations can be delivered.\r\n\r\nAdditional input samples from internal and third-party sources can be blended to provide context and greater insight; these types of input can be invaluable:\r\n<ul>\r\n \t<li>Weather data</li>\r\n \t<li>Maintenance recommendations from manuals</li>\r\n \t<li>Supplier quality data</li>\r\n \t<li>Historical brake maintenance schedules and failure rates</li>\r\n \t<li>Passenger travel analysis</li>\r\n \t<li>Heavy or unusual usage data</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Using this comprehensive blend of data, you can implement an APO solution to recognize patterns and perform an in-depth analysis in multiple applications, from manufacturing plants to utilities and even healthcare. The data can include metrics such as temperature, movement, light exposure, and more collected from IoT sensors on fleets, plants, pipelines, medical imaging equipment, jets, grids, and any other Internet-enabled device.</p>\r\n\r\n<h3>Analysis</h3>\r\nAI uses big data analytics and natural-language processing to derive key data points from structured data as well as unstructured content such as field notes and equipment manuals.\r\n<p class=\"article-tips tip\">You can use AI to analyze this information and relevant historical data to identify patterns and generate questions that help engineers, maintenance supervisors, production managers, and other key personnel make informed and timely decisions. APO solutions use these patterns to make predictive conclusions that help you answer questions in various areas, such as these:</p>\r\n\r\n<ul>\r\n \t<li><strong>Timing:</strong> Am I performing inspections at appropriate intervals? Would shortening the intervals improve overall uptime? Or could I afford to lengthen the intervals to reduce resource expenditure?</li>\r\n \t<li><strong>Quality:</strong> Could defective components be slipping through my inspections and leading to downtime? If so, how can I improve the inspection process to prevent this issue moving forward?</li>\r\n \t<li><strong>Design:</strong> Can my design be modified to reduce future failures?</li>\r\n</ul>\r\nFor example, a predictive conclusion formed by the patterns observed in the case of the train brake system might indicate the need for shorter inspection intervals. This is where humans come in and leverage all of these valuable findings to improve their business.\r\n<h3>Putting insights to use</h3>\r\nAfter patterns are identified and their related questions are answered, the predictive conclusions provided by APO solutions can then be implemented. For example, train maintenance workers can schedule inspections more frequently to check for a key component in the hydraulic brake system that has shown a tendency to fail. Or perhaps the APO solution discovers that a defective component in the train needs attention. Field engineers can use a digital model of the train to determine a repair strategy. If the part cannot be repaired, the APO solution can trigger a replacement part order through the supply chain network, using automation to streamline the process of getting the train back up and running.","blurb":"","authors":[{"authorId":33409,"name":"Zachary Jarvinen","slug":"zachary-jarvinen","description":" <p><b>Zachary Jarvinen, MBA/MSc</b> is a product &#38; marketing executive and sought&#45;after author and speaker in the Enterprise AI space. Over the course of his career, he&#39;s headed up Technology Strategy for Artificial Intelligence and Analytics at OpenText, expanded markets for Epson, worked at the U.S. State Department, and was a member of the 2008 Obama Campaign Digital Team. Presently, Zachary is focused on helping organizations get tangible benefits from AI. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33409"}}],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"General AI","slug":"general-ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Spying on Your Machines","target":"#tab1"},{"label":"Fixing It Before It Breaks","target":"#tab2"},{"label":"Learning from the Future","target":"#tab3"}],"relatedArticles":{"fromBook":[{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}},{"articleId":272673,"title":"How Intelligent Recommendation Systems Work","slug":"how-intelligent-recommendation-systems-work","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272673"}},{"articleId":272661,"title":"AI in the Professional Services Industry","slug":"ai-in-the-professional-services-industry","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272661"}},{"articleId":272656,"title":"How Government and Nonprofits Battle Budgets with AI","slug":"how-government-and-nonprofits-battle-budgets-with-ai","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272656"}},{"articleId":272651,"title":"How AI Optimizes Inventory, Supply Chain, & Quality","slug":"ai-optimizes-inventory-maintenance-supply-chain-and-product-quality","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272651"}}],"fromCategory":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299281,"title":"How To Write Prompts for ChatGPT","slug":"how-to-write-prompts-for-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299281"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":298910,"title":"What Is ChatGPT and How Does It Work?","slug":"what-is-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/298910"}},{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281697,"slug":"enterprise-ai-for-dummies","isbn":"9781119696292","categoryList":["technology","information-technology","ai","general-ai"],"amazon":{"default":"//www.amazon.com/gp/product/1119696291/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119696291/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119696291-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119696291/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119696291/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//www.coursofppt.com/wp-content/uploads/enterprise-ai-for-dummies-cover-9781119696292-203x255.jpg","width":203,"height":255},"title":"Enterprise AI For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"33409\">Zachary Jarvinen</b>, MBA/MSc</b> is a product &#38; marketing executive and sought&#45;after author and speaker in the Enterprise AI space. Over the course of his career, he&#39;s headed up Technology Strategy for Artificial Intelligence and Analytics at OpenText, expanded markets for Epson, worked at the U.S. State Department, and was a member of the 2008 Obama Campaign Digital Team. Presently, Zachary is focused on helping organizations get tangible benefits from AI.</p>","authors":[{"authorId":33409,"name":"Zachary Jarvinen","slug":"zachary-jarvinen","description":" <p><b>Zachary Jarvinen, MBA/MSc</b> is a product &#38; marketing executive and sought&#45;after author and speaker in the Enterprise AI space. Over the course of his career, he&#39;s headed up Technology Strategy for Artificial Intelligence and Analytics at OpenText, expanded markets for Epson, worked at the U.S. State Department, and was a member of the 2008 Obama Campaign Digital Team. Presently, Zachary is focused on helping organizations get tangible benefits from AI. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33409"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119696292&quot;]}]\" id=\"du-slot-64ac4761244c1\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119696292&quot;]}]\" id=\"du-slot-64ac476124d65\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-07-10T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":272667}],"_links":{"self":{"self":"//dummies-api.coursofppt.com/v2/categories/33572/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"//dummies-api.coursofppt.com/v2/categories/33572/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"//dummies-api.coursofppt.com/v2/categories/33572/categoryArticles?sortField=time&sortOrder=1&size=10&offset=798"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33572","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":805},{"itemId":33574,"itemName":"AI","count":148},{"itemId":33577,"itemName":"Data Science","count":369},{"itemId":33586,"itemName":"General Information Technology","count":22},{"itemId":33581,"itemName":"Networking","count":266}],"articleTypeFilter":[{"articleType":"All Types","count":805},{"articleType":"Articles","count":743},{"articleType":"Cheat Sheet","count":37},{"articleType":"Step by Step","count":24},{"articleType":"Videos","count":1}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2024-12-04T10:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"//cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"//sb\" : \"//b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"//sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"//zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for //www.coursofppt.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"//www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":287569,"title":"For the Hopeless Romantic","hasSubCategories":false,"url":"/collection/for-the-hopeless-romantic-287569"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/information-technology-33572/","hash":"","query":{},"params":{"category":"information-technology-33572"},"fullPath":"/category/articles/information-technology-33572/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
fun88 casino net cách chơi keno trực tuyến game đánh bài baccarat baccarat quốc tế sòng bài trực tuyến