Trending Articles

CIO Agenda 2020: Do You Have A Clear and Consistent Business Strategy?

CEB IT

Have a clear and consistent overall business strategy. . This seems like a simple, common-sense business rule, but it is one that organizations struggle with often.

Roku Buys DSP Dataxu: Good For Roku, But For Everyone Else?

Forrester IT

Roku announced yesterday that it’s buying demand-side platform (DSP) Dataxu for $150 million in cash and stock. Just another instance of advertising technology (adtech) consolidation, maybe? Not so fast. Let’s break down what it means.

Mobilized Employees Engage Buyers With A Trusted Voice

Forrester IT

Employees’ Advocacy Boosts Your Content And Customer Interactions While trust in brands has dwindled, B2B buyers hold those same brands’ employees in high regard as authentic and compelling sources of information. And they want to engage with them.

Mobile 141

Don’t kludge serverless cloud applications

David Linthicum

It’s a funny business. Once we remove some core steps from application development (such as having to provision cloud resources like storage and compute) developers take this freedom to an illogical yet understandable conclusion. In some cases, planning and design is being tossed out the window. Considering that serverless is self-provisioning, and applications can be designed and built dynamically on the fly, and if we’re not doing infrastructure planning, well, why not? [

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

A data breach could be game over for a brand

CTOvision

Data security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more concerned about protecting their personal information than they were one year ago.

More Trending

Gartner Top Strategic Predictions for 2020 and Beyond

CEB IT

In Japan, one restaurant is exploring artificial intelligence (AI) robotics technology to enable paralyzed employees to remotely pilot robotic waiters. JPMorgan Chase, Microsoft and Ford are hosting virtual career fairs tailored to the needs of neurodiverse candidates.

Don’t botch serverless cloud applications

David Linthicum

It’s a funny business. Once we remove some core steps from application development (such as having to provision cloud resources like storage and compute) developers take this freedom to an illogical yet understandable conclusion. In some cases, planning and design is being tossed out the window. Considering that serverless is self-provisioning, and applications can be designed and built dynamically on the fly, and if we’re not doing infrastructure planning, well, why not? [

Study warns of security gaps in smart light bulbs

CTOvision

Earlier this year Amazon’s Echo made global headlines when it was reported that consumers’ conversations were recorded and heard by thousands of employees. Now researchers at UTSA have conducted a review of the security holes that exist in popular smart-light brands.

Study 91

When Should Responsible DevOps Teams Increase Deployment Frequency

Social, Agile and Transformation

In my last few posts, I've been challenging the wisdom that more frequent deployments are better. I've also shared what DevOps teams must consider as prerequisites and processes beyond CI/CD to enable reliable deployments. Consider reading the following posts for more details: CI/CD is not Enough!

Devops 130

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

The Reality of Blockchain

CEB IT

Generally, anyone looking to open a restaurant would need to go to various government agencies to obtain the required certifications. For example, the owners may need a health certification, worker’s comp certification or a liquor license depending on the type of establishment.

The Forrester Wave™: Enterprise Marketing Software Suites, Q3 2019 — A Tale Of Dueling Priorities Fueled By Customer Obsession

Forrester IT

The story of enterprise marketing software suites (EMSS) is one of relentless expansion. Originally conceived for its namesake — marketing — EMSS has grown to offer a consolidated source of marketing functionality spanning customer engagement, advertising, measurement, and resource management.

Create a productive cloudops feedback loop

David Linthicum

One of the most frustrating things that can happen when you’re on a cloudops team is having end users go directly to your leadership to complain about some issue with the cloud-based systems. It could be performance, lack of some feature, availability, or a compatibility problem with a browser. You cannot fix or improve what you don’t know about. Most enterprises with a cloud operations team don’t have good communications between the end users and the cloud operations staff.

Devops 100

Chrome and Firefox will now alert you about data breaches involving your accounts

CTOvision

Mozilla has launched Firefox 70 for Windows, Mac, and Linux with new features such as social tracking protection, a Privacy Protections report, and a native data breach notification service for your saved logins.

Linux 91

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

4 Steps to Get Started with Containers

Perficient - Digital Transformation

The following is the fifth blog in a series about software containers and Kubernetes, and their importance in modern application delivery.

The Gartner 2020 CIO Agenda: Winning in the Turns

CEB IT

Digital. Digital. Digital. For the past few years, organizations have been told there is only one road to success: Digital. . But with 40% of organizations now reporting they’re at scale for digital endeavors, it’s time for leaders to focus on a new word: Uncertainty. .

Budget 130

Predictions 2020: 3 Big Changes In Store For DevOps

Forrester IT

In this blog, I want to discuss what we’re predicting in the area of DevOps for 2020, and as a bonus, look at some trends that didn’t quite make the cut as predictions. So what are we saying this year? While our full report is here [to be linked], here are a few tidbits: Chaos […].

Devops 104

Blockchain is promising, but it can't save the world

Tech Republic Security

TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin, and IoT-connected devices

103
103

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Google Provides Formal Announcement on Quantum Supremacy

CTOvision

After reviewing all of Google’s announcement and watching their roll out video I believe they all deserve a hearty congrats for what they have accomplished. It is hard to find analogies that fit but in some ways it is like the 14 Oct 1947 breaking of the sound barrier by Chuck Yeager.

Microsoft Teams and SharePoint: “Teamify” Answers Office 365 Confusion

Perficient - Digital Transformation

Microsoft Teams is hot. It increases collaboration and helps simplify the UX. It’s also the answer to many of your adoption and usage issues. Adoption change management is critical to your productivity success and for any Office 365 and Microsoft Teams deployment.

Gartner Top 10 Strategic Technology Trends for 2020

CEB IT

Human augmentation conjures up visions of futuristic cyborgs, but humans have been augmenting parts of the body for hundreds of years. Glasses, hearing aids and prosthetics evolved into cochlear implants and wearables. Even laser eye surgery has become commonplace. .

Trends 130

Ransomware: The Nightmare Before Cyber Monday

Forrester IT

Cybersecurity needs to be part of every retailer's holiday strategy. Learn how to protect against one particularly menacing threat. age of the customer holiday retail security & risk

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

How to password protect a zip file in Linux

Tech Republic Security

If you need to password protect a zip file, look no farther than the zip command itself

Linux 97

To beat Amazon Go, Standard Cognition buys cashierless DeepMagic

CTOvision

Valued at $535 million, autonomous retail startup Standard Cognition has emerged as a soon-to-be tech giant and the best hope for merchants to compete with Amazon Go.

How to Get Authority Links for Your Website? Get 5 Free Strategies to Boost It!

Galido

Information Technology Blog - - How to Get Authority Links for Your Website? Get 5 Free Strategies to Boost It! Information Technology Blog. After creating a site, many owners sigh with relief because everything is ready. But the site still needs some work so that users come to it.

Why CIOs Need to Move From Defense to Offense

CEB IT

Two-thirds of directors see digital and technology disruption as their number one business challenge, according to Gartner’s 2020 Board of Directors survey. Over half say digital initiatives are one of their top priorities for the next two years.

Channel Automation Becomes Table Stakes For Partnership Success

Forrester IT

Channel professionals want to talk about expanding their partner programs and building broad ecosystems, but the truth is that many of their basic program and channel management processes are still painfully manual and error-prone.

System 104