Trending Articles

How A Streaming Music CIO Plans On Turning Things Around

The Accidental Successful CIO

Pandora’s CIO has plans to stop its loss in users Image Credit: Jenni Konrad. Having the CIO job at Pandora would put you right in the middle of a busy and challenging market. Streaming music is very hot right now and there are a lot of different companies that are involved in the market.

Cybersecurity for AI Solutions Webinar 9 May 2019

CTOvision

Cybersecurity for Artificial Intelligence Solutions: A Framework for keeping AI from misbehaving May 9, 2019, 1:00 pm Schedule conflict? Register and you’ll receive a copy of the recording! The security of Artificial Intelligence is an emerging discipline. This webinar will provide insights from the CTO and Co-founder of OODA LLC, Bob Gourley. Bob is a pioneer in […]. Artificial Intelligence CTO News

Stop Trying To Replace Your Agents With Chatbots — No, Seriously!

Forrester IT

Customer service organizations have been looking for ways to cut costs for decades. Now that chatbot mania has taken over, many are jumping on the bandwagon and attempting to replace their human agents with chatbots.

211
211

Increase Retention With a Customer Success Mindset

CEB IT

When the sales team lands a new account, product marketer Monika knows her job has just begun.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

3 things about cloud and IoT you need to consider

David Linthicum

The internet of things (IoT) and cloud-based providers are bound at the hip. That said, most people don’t understand how, why, or what to expect. I’ve been asked some good questions that drove me to do some research and testing. Perhaps the answers are of interest to you as well. Do you store the data in the cloud or the IoT device? This depends on a lot of things, but I have two rules of thumb: [ InfoWorld explains: What is multicloud? The next step in cloud computing. |

More Trending

The CIO’s Guide to Quantum Computing

CEB IT

It makes sense that sci-fi-level myths might surround a technology that must be stored in a container colder than interstellar space and has the potential to solve some of the world's most challenging problems. CIOs have been inundated with quantum computing hype: “Quantum computers will operate faster than the speed of light,” or “Quantum computers will replace conventional systems” or “Quantum computing will render all security encryption algorithms obsolete.”.

Warning: Internet Explorer Just Became A Silent But Serious Threat To Every Windows User

CTOvision

Security researcher John Page warns that Microsoft’s Internet Explorer has a critical security flaw that allows hackers to spy on you and steal personal data from your PC. That warning may seem irrelevant to you since Internet Explorer was officially discontinued in 2015. It’s now an archaic web browser, only in use by about 7% […]. Cyber Security News

Survive and Thrive With Digital Transformation

Cloud Musings

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the laments heard in conference rooms and board meeting around the world.

Dell 148

Avoid these 2 cloud computing career pitfalls

David Linthicum

People come to me all of the time looking to reengineer their IT career with a cloud computing makeover. While this is typically a good move, I find that as the world of cloud computing becomes more complex, those looking to get higher-paying cloud computing jobs are making some wrong calls. Here’s two of the most common. Mistake No. 1: Going too wide. I’ve often explained the benefit of being a jack of all trades, and master of some to people wanting to become a cloud computing architect.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Assessing Your Digital Maturity — What Does Excellence Look Like?

Forrester IT

Wall Street loves a digital business. These technology-driven innovators, which put customer acquisition, retention, and experience at the center, have a different way of looking at the world. They are rewarded with growth and investment. And it’s not just digital natives.

CIO Power Politics: What Role Should IT Leaders Take in a Conflict? [Video]

CEB IT

It’s not uncommon for CIOs to be caught in a conflict they would rather avoid. But navigating these experiences is often part of the job. The question becomes not “Do I get involved?” but rather, “What’s the best role for me in a conflict?”. Discover Your Leadership Style: Take the Wolf CIO Quiz.

Video 131

Infographic: AI powered Chatbots

CTOvision

Chatbots are rapidly becoming part of our every day lives and proving to be a very valuable tool for companies across a wide range of industries. As such, AI-enabled chatbots are increasingly being used on the front line of customer engagement. They can be integrated into customer support service teams to answer common or basic […]. Artificial Intelligence Big Data and Analytics News ai artificial intelligence chatbot chatbots infographic machine learning use case use cases

BLOCKCHAIN-POWERED LOGISTICS ?: A NEW ERA FOR SHIPPING AWAITS?

Datacponomy

Much like other industries struggling to stay afloat in the stormy waters of the global economy, the shipping industry is seeking its own transformation after years of overcapacity and tumbling freight rates.

IBM 92

Machine Learning at Scale: Highlights from The Artificial Intelligence Conference

Social, Agile and Transformation

Last week I attended The Artificial Intelligence Conference in NY sponsored by O'Reilly and Intel. It's my yearly ritual to report on the latest academic research, industry trends, successes, and challenges as more organizations invest people, time, and money in machine learning. From last year's conference I reported here on this blog on my keynote takeaways, and on collaborative AI . about me agile data AI big data data management data scientist innovation

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

Is There A Resurgence For The CIO Role? For years, the CIO role looked like it had been moving toward “chief infrastructure officer,” with many executives feeling like the transformative part of their job had been carved out and handed to chief digital officers.

B2B 144

Configuring Wake-On-LAN for Dell Systems

Mick's IT Blog

If you have been wanting to wake your Dell systems up from sleep, hibernate, or shutdown states, this is how you do it. Starting out with this article from Dell, I got the list of things needed to set up the system for WOL.

LAN 123

Microsoft admits Outlook.com hackers were able to access emails

CTOvision

Microsoft has admitted that its Outlook.com security breach was worse than the company initially revealed. The software maker started notifying some Outlook.com users late on Friday night that a hacker was able to access accounts for months earlier this year. Microsoft’s notification revealed that hackers could have viewed account email addresses, folder names, and subject […]. Cyber Security News

Distributed Data Caching Using Big Data

Datacponomy

The advent of the emerging sector of Big Data has brought with it the promise of highly scalable databases to handle terabytes of data at a time.

How Business Transformation is Fundamentally Different from Innovation

Social, Agile and Transformation

An interesting debate transpired during the last #CIOChat on Thursday at 2pm around Myles Suer's question, "How is #innovation fundamentally different from business transformation?" I had significant feedback to my tweets and decided to dedicate this week's blog post to detail my perspective. I provided a two-tweet answer require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl". about me digital transformation innovation

The Clash Of The Digital Platforms: The 5-year Update

Forrester IT

On March 7, 2014 I wrote a report called The Clash of the Digital Platforms in which I identified 5 companies that had a unique status in the world of technology, innovation, and overall business. The five companies were (alphabetically) Amazon, Apple, Facebook, Google, and Microsoft.

Apple 139

SCCM Third-Party Software Updates Setup Step by Step Guide Post 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. SCUP helped many of us to deploy third-party software updates for many years. Now, SCCM doesn’t require SCUP to deploy Third-party updates. Let’s dive into the SCCM third-party software updates setup.

OODA Produces A Traveling Executive’s Guide to Cybersecurity

CTOvision

We have written before about the importance of all of us recognizing that we are in a cyber conflict. The fact is that we are all targets. We all have to keep our wits about us. This includes tracking the cyber threat and best practices to mitigate the threat. A period of significantly enhanced vulnerability […]. CTO Cyber Security Cyber War News

Travel 138

Proactively Identifying Compromised Passwords | Roadmap to Securing Your Infrastructure

Linux Academy

Happy Monday, and welcome back to Roadmap to Securing Your Infrastructure. Last week, we covered the importance of password policies and some points that should be covered by those policies.

Cisco Talos details exceptionally dangerous DNS hijacking attack

Network World

Security experts at Cisco Talos have released a report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.” Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated.

Revenge Of The Nerds? Marketing Ops Takes The Stage

Forrester IT

During the SiriusDecisions 2019 Summit (May 5–8, Austin, Texas), I will join Sirius Research Director and new colleague Jeff Clark in presenting the Future Vision session on marketing operations.

3 Change Management Strategies to Drive Digital Transformation Success

Perficient - Digital Transformation

Digital transformation causes disruption because it holistically changes an organization. It changes the way people work, a company’s essence, and how it operates. Consequently, it sometimes even changes the culture. Change management ’s role is to help along the entire journey.

IoT security market to reach $35.2 bn by 2023: Report

CTOvision

According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 billion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […]. Cyber Security News

Report 143

How to Change Office 365 Update Channel with SCCM Run Script

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. My name is Sharad Singh, and I have more 15 years of experience in IT and SCCM technologies, MS Intune. This post is my first one here in this blog!

Keys to a Successful IoT Deployment

Information Week

IoT is growing rapidly, but lingering connectivity, security, and data storage concerns will need to be resolved to guarantee its continued flourishing