Trending Articles

Cloud AI is like nuclear power

David Linthicum

In a recent speech, Google and Alphabet CEO Sundar Pichai called for new regulations in the world of AI, with the obvious focus that AI has been commoditized by cloud computing. This is no surprise, now that we’re debating the ethical questions that surround the use of AI technology: most especially, how easily AI can weaponize computing—for businesses as well as bad actors.

Video 166

Cloudera: Extract Benefit From All Your Data And Work Across Clouds

CTOvision

We have tracked Cloudera from the very beginning and have watched as it has continually innovated in ways that help both enterprises and the open source community deliver more value.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What are Seven Types of Big Data Debt

Social, Agile and Transformation

As more organizations have embarked on agile software development over the last five years as part of digital transformation programs, the term technical debt is more widely understood.

Internet of Things presents the next frontier of cyberattacks

CTOvision

Read why Asaf Ashkenazi says that the risk of cyberattacks on the Internet of Things has increased on ITProPortal : Today’s rapidly growing global network of internet of things (IoT) devices brings with it new levels of convenience to the lives of everyday consumers.

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Meet Your New Threat Intelligence, Vulnerability Management, And ICS Research Analyst

Forrester IT

This month, I joined Forrester’s security and risk research team as a senior analyst covering cyber threat intelligence, digital risk protection, vulnerability management, and industrial control system (ICS) security. I am excited about joining the team and expanding Forrester’s existing research in threat and vulnerability management and securing the control systems that keep our manufacturing facilities, critical infrastructure, and communities safe and productive. In my opinion, […].

More Trending

Cloud spending set to outpace traditional on-prem

David Linthicum

According to IDC, in 2019 the public cloud saw little change in market share, making up just more than 30 percent of the overall cloud IT infrastructure market. Of course, this is likely to grow significantly, expected to reach almost 40 percent by 2023. However, it’s a bit of a surprise that IDC is also expecting public and private cloud spending to outperform “traditional IT spending” in 2020. We can define traditional as anything that’s not a private or public cloud.

Course 159

Happy MLK Day!

The Accidental Successful CIO

Happy MLK Day! Image Credit: ???????. This week in the United States we celebrate the life of Dr. Martin Luther King. Just in case you’ve forgotten who he was, he is best known for his role in the advancement of civil rights using nonviolent civil disobedience. On Oct.

130
130

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat

CTOvision

Read Ian Cruxton explains how to train employees to spot sophisticated phishing attacks on Dark Reading : Deepfake fraud is a new, potentially devastating issue for businesses.

The I&O Organization Under Pressure

Forrester IT

Whither Infrastructure and Operations? Cloud-native, DevOps, and automation are turning I&O’s world upside down. As organizations move to self-provisioning, I&O professionals are rightfully concerned about their futures. In the world of self-service consumption, the traditional tools and tasks of I&O teams are subject to constant overhaul and replacement. AI and automation continue to transform traditional […]. age of the customer

Devops 106

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

How Gamification Boosts Consumer Engagement

CEB IT

The idea of a subscription car service isn’t new, but a subscription service that rewards drivers for better driving is definitely different. To encourage safer driving for its Kinto car subscription, Toyota rewards “better” drivers with points that lower monthly payments. Organizations use gamification to encourage participation in apps, work out programs and even to reward employees, but it’s now taking center stage for a more unexpected industry: Automotive companies.

Cloud spending set to outpace traditional computing

David Linthicum

According to IDC, in 2019 the public cloud saw little change in market share, making up just more than 30 percent of the overall cloud IT infrastructure market. Of course, this is likely to grow significantly, expected to reach almost 40 percent by 2023. However, it’s a bit of a surprise that IDC is also expecting public and private cloud spending to outperform “traditional IT spending” in 2020. We can define traditional as anything that’s not a private or public cloud.

Course 106

Blockchain in Digital Transformation: What the Future Holds

Perficient - Digital Transformation

It’s been talked and written about countless times, yet digital transformation continues to turn heads. Blockchain is more than a technology trend. Blockchain in digital transformation is a customer experience trend, perhaps, as it’s dynamic and constantly evolving.

B2C 69

The Forrester Readiness Index Highlights Countries Ripe For Digital Marketing Investment

Forrester IT

Marketers should take a closer at how their digital advertising budgets are allocated globally. While a huge market such as China deserves marketers’ attention because of its size, our analysis shows that the Chinese digital advertising market is becoming saturated.

Budget 113

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Gartner Predicts for the Future of Privacy 2020

CEB IT

Privacy is becoming a reason for consumers to purchase a product, in the same way that “organic,” “free trade” and “cruelty-free” labels have driven products sales in the past decade. “Privacy-first products are likely to follow this trend,” says Bart Willemsen , Vice President Analyst, Gartner.

Why over one-third of AI and Analytics Projects in the Cloud fail?

Datacponomy

How are various organizations handling the accelerating transition of data to the cloud? What are the obstacles in data cleaning for analytics and the time constraints companies face when preparing data for analytics, AI and Machine Learning (ML) initiatives?

Relieving the Burden of Tax Reporting

Perficient - Digital Transformation

Provisioning for income tax can be a complex process for large multi-national organizations to mid-sized companies with a consistent growth mode. The tax provisioning process involves determining the current tax amounts as well as calculating the deferred roll-forward amount.

Apple Dropped iCloud Encryption Plans After FBI Complaint: Report

CTOvision

Apple dropped plans to offer end-to-end encrypted cloud back-ups to its global customer base after the FBI complained, a new report has claimed.

Apple 107

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

The NRF Innovation Lab — Technology Vendors Aim To Revolutionize The Way Consumers Shop

Forrester IT

Last week at the NRF 2020 Vision show, I spent a few hours at the immersive Innovation Lab exhibit that showcased over 50 “new-to-market” technologies to transform the customer’s shopping experience.

Retail 113

6 CRM Benefits for Healthcare Providers

Galido

Information Technology Blog - - 6 CRM Benefits for Healthcare Providers - Information Technology Blog. With the start of 2020, it seems like the prediction from the previous years for the customer relationship management (CRM) software would be satisfied by growing to $18 billion with the year-end.

How to use a physical security key to sign into supported websites

Tech Republic Security

A security key is a good option to use for two-factor authentication when logging into certain websites

Providing A Connected Vehicle Experience With Cloud

Perficient - Digital Transformation

The following is the eleventh blog in a series about why businesses are moving to the cloud to modernize and improve business performance.

Cloud 63

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Don’t Make These 14 Common Big-Data Mistakes At Your Business

CTOvision

Thanks to modern technology, businesses of all sizes have access to rich, granular data about their customers and operations. However, understanding what to do with these massive amounts of data can be difficult and costly, and even with the right tools, it can be overwhelming. With so much complexity around big data, businesses can easily make […].

NRF 2020: Robotics Realize Real Time Retail

Forrester IT

I’ve just returned from NRF 2020. There were more than 40,000 attendees and 800 exhibitors from 99 countries. They showed how to deliver real-time Retail, applying technology to win, serve, and retain the most demanding retail customers.

Retail 113

How Does A Wastewater Treatment Plant Work?

Galido

Information Technology Blog - - How Does A Wastewater Treatment Plant Work? Information Technology Blog. Water. There is nothing in this life that can survive without water – and it should be clean. But when the water becomes dirty and contaminated, it is a hazard to the environment.

3 biggest threats cybersecurity professionals are facing in 2020

Tech Republic Security

Organizations are moving toward next-generation cybersecurity solutions this year, but security fragmentation is a looming threat

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.