Trending Articles

How Can A CIO Make His Or Her Company Cybersafe?

The Accidental Successful CIO

Employees know that there is danger bu they still make mistakes Image Credit: Stock Catalog. One of the most important jobs that the person with the CIO job is asked to do is to secure the company’s networks because of the importance of information technology.

The 64 Best Channel Podcasts Of 2019

Forrester IT

By Jay McBain and Rob Spee If you haven’t listened to a podcast yet, you’re now in the minority. According to Podcast Insights, 51% of the US population has listened to at least one podcast. Since the first podcast came on the scene in 2004, there are now over 750,000 podcast shows with […].

B2B 104

CIO Agenda 2020: Is Your Culture Adaptable?

CEB IT

Thirty-eight percent of fit organizations say their culture embraces appropriate risk taking and learning from failure, as compared to just 21% of fragile organizations. Fit enterprises see uncertainty as a guarantee and develop a culture prepared to adapt to changing environments.

Agile 130

Native or non-native? Choosing a cloud integration solution

David Linthicum

Data integration solutions come in one of three categories. First there’s old school data integration solutions created in the 1990s from the EAI movement , now expanded to include public cloud computing domains. Second, newer cloud-based iPaaS (integration platforms as a service) solutions built from the ground up as on-demand integration servers hosted on the open Internet, but existing outside of public cloud providers.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

OpenAI has published the text-generating AI it said was too dangerous to share

CTOvision

The research lab OpenAI has released the full version of a text-generating AI system that experts warned could be used for malicious purposes.

More Trending

In The Fast-Growing ePurchasing Software Market, Best-Of-Breed Apps Hold Their Own Against Suites

Forrester IT

Which is the right choice: best-of-breed apps or application suites? This is a perennial question CIOs and business partners face in selecting application software.

Choosing between native and non-native cloud integration systems

David Linthicum

Data integration solutions come in one of three categories. First there’s old school data integration solutions created in the 1990s from the EAI movement , now expanded to include public cloud computing domains. Second, newer cloud-based iPaaS (integration platforms as a service) solutions built from the ground up as on-demand integration servers hosted on the open Internet, but existing outside of public cloud providers.

System 100

IT Compliance - It's whats for dinner.

CIO Musings

NOTE: Please excuse the format of this, it is from my speaking notes for the Public Technology Institute Fall 2019 CIO Leadership forum. I was asked to speak, briefly, on IT compliance. I figured what the heck, make a blog post out of it.

13 Mind-Blowing Things Artificial Intelligence Can Already Do Today

CTOvision

Read Bernard Marr list 13 mind-boggling tasks artificial intelligence can perform on Forbes : By now, most of us are aware of artificial intelligence (AI) being an increasingly present part of our everyday lives.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

7 Disruptions You Might Not See Coming

CEB IT

It’s not unheard of for someone watching a particular TV series, who likes the outfit of a main character, to hop on a favorite shopping site and order clothes with a similar cut or color. But what if biometrics tracked the exact moment you were particularly engaged in an emotional reaction, noted which character was on screen, and then found and recommended outfit options based on that data? Emotional experiences are just one of seven digital disruptions that CIOs might not see coming.

Enterprises Need Plans For Both Climate Sustainability And Adaptation

Forrester IT

Last week, more than 11,000 scientists signed their name to a statement declaring a climate emergency and warning of “untold suffering due to the climate crisis.”

How to future-proof cloud applications

David Linthicum

Chances are, you’re either building a net-new application in the cloud or using native technology such as serverless or machine learning. Or, you’re porting an application to the cloud, either refactoring it to leverage native services, or lifting and shifting with little or no modification to the code or data. How do you ensure these applications last more than a few years on the cloud? In other words, how do you future-proof them? I have a few core recommendations.

Becoming a Transformational CIO from the Best CIO Blog on the Planet!

Social, Agile and Transformation

Every once and a while I receive recognition and participate in a webinar that's worth sharing here with everyone. First, I'm very proud that this blog, Social, Agile, and Transformation was recently listed as the #1 blog for CIOs and a top blog on agile software development.

Agile 130

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Measuring Marketing is Science, Not Art.

Fountainhead

“If you can't describe what you are doing as a process, you don't know what you're doing.” ~ W. Edwards Deming When in business school, I had the honor of meeting W Edwards Deming while taking a class on operations management.

B2C 130

When AI is a tool and when it’s a weapon

CTOvision

Read Seth Colaner explain how artificial intelligence can either be a tool or a weapon on Venture Beat : The immense capabilities artificial intelligence is bringing to the world would have been inconceivable to past generations. But even as we marvel at the incredible power these new technologies afford, we’re faced with complex and urgent […].

When Websites Come Down, Twitter Blows Up And Marketing Wins

Forrester IT

Sites crash, especially when a new product launch creates a massive leap in traffic compared to usual demand. Two sites notably crashed recently – startup Jeffree Star Cosmetics and veteran brand Pringle’s.

104
104

How Cybercrime Can Kill Your Website

Galido

Information Technology Blog - - How Cybercrime Can Kill Your Website - Information Technology Blog. You’re a smart business owner. You understand the importance of cybersecurity. You use a great email scanner and anti-virus program.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Windows Updates Ramblings SSU WUA UUP CU WaaS SCCM Many More

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Windows update mechanism changes in the recent past are most confusing for me. I don’t think anyone is very clear about Microsoft’s strategy about Windows 10 updates.

ForAllSecure Uncovers Critical Vulnerabilities in Das U-Boot

ForAllSecure

Introduction. This summer, I utilized ForAllSecure Mayhem, a next-generation fuzz testing solution, to analyze software that are heavily used. I felt these types of components in particular deserve more scrutiny from a security perspective.

AI development has major security, privacy and ethical blind spots

CTOvision

Read why O’Reilly says that security, privacy and ethics are low-priority issues for developers when modeling their machine learning solutions on Help Net Security : Security is the most serious blind spot. Nearly three-quarters (73 per cent) of respondents indicated they don’t check for security vulnerabilities during model building. More than half (59 per cent) […].

.Net 70

A Timeline Guide For Your 5G Strategy

Forrester IT

The rollout of 5G is much more evolutionary than the rollout scenarios of previous cellular standards. age of the customer 5G carrier networking telco Telecommunications

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

What is the Difference Between – USB 3.1 vs USB 3.0 vs USB Type – C

Galido

Information Technology Blog - - What is the Difference Between – USB 3.1 vs USB 3.0 vs USB Type – C - Information Technology Blog. You might have noticed that the market is loaded with advanced USB Type-C devices. Here, it helps charge your devices at ultra-fast speed.

How to Use Enterprise State Roaming ESR Feature for Windows Autopilot Deployment

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s see what Enterprise State Roaming (ESR) feature of Azure AD is. Also, let’s go through and understand how useful is ESR feature for Windows Autopilot Deployment.

7 Reasons Why Enterprises Must Invest in an Employee Training App

Kitaboo

You probably have at least ten different apps on your phone. I can say this with conviction because I know for a fact that living in this mobile-first world without a dozen apps for various purposes such as banking, retail, social media, instant communication, etc., is more than an inconvenience.

Is Cloud AI a Fad? The Shortcomings of Cloud Artificial Intelligence

CTOvision

Read Christopher Tozzi explain the shortcomings of cloud artificial intelligence on IT Pro Portal : Want to build artificial intelligence (AI) into your app, but don’t want to have to collect your own data or train your own models? The cloud has a solution for you. Cloud-based AI services have emerged as one of the […].

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.