Unconventional Metrics for IT Applications Portfolio Investment

CEB IT

One of the perennial jobs for IT applications teams who develop and maintain in-house software applications is to manage the portfolio of existing apps used by the company. And what separates the good from bad investment decisions in the applications budget is economic insight.

Application Build Reporting for MDT and SCCM

Mick's IT Blog

This new script I have written is designed to query the programs and features registry entries to verify if an application is installed and to write that verification to a.CSV file. It was going to grab the name of the application that was exactly how it was listed in programs and features.

Trending Sources

IT Applications: 3 Changes Needed to Run Agile at Scale

CEB IT

Most applications teams have brought in coaches and new tools to help them and nearly half are trying to implement enterprise frameworks like SAFe , according to CEB data.

PowerShell: Uninstall MSI by Application Name

Mick's IT Blog

Here is a function that will uninstall an MSI installed application by the name of the app. You just need to enter Adobe Reader as the application name and the desired switches. You do not need to input the entire name either. For instance, say you are uninstalling all previous versions of Adobe Reader. Adobe Reader is always labeled Adobe Reader X, Adobe Reader XI, and so forth.

Understanding Application Containers and OS-Level Virtualization

Data Center Knowledge

Application container platforms like Docker are enabling creation of better distributed systems Read More. Cloud Computing application container cloud

PowerShell: Pin and Unpin Applications to the Start Menu and Taskbar

Mick's IT Blog

I am in the middle of building a new Windows 10 image and testing out all of the GPOs and applications. The first of the features I added is being able to generate an official list of all applications on the machine that are listed within the specified GUID. Name -eq $Application }).verbs()

IT Applications: How to Create a Culture of Quality

CEB IT

Over the past several years, those in charge of IT applications teams have emphasized the need for their staff to be as quick as possible in getting applications in to day-to-day use. But this mindset can lead to low quality applications development and time-consuming rework.

IT Applications: How to Hire a ‘Digital-Ready’ Developer

CEB IT

Faced with a line-up of eager applicants, and after a day of repetitive interviews, it’s never been easy for managers to predict which job candidate will actually be the most successful in the job that’s up for grabs. For IT applications teams that develop software in-house for large companies, this proportion is likely to rise in the next few years. Two approaches from applications teams in CEB’s network will help.

Amazon DynamoDB Accelerator (DAX): Speed Up DynamoDB Response Times from Milliseconds to Microseconds without Application Rewrite.

All Things Distributed

You can add DAX to your existing DynamoDB applications with just a few clicks in the AWS Management Console – no application rewrites required. For their applications, they have 20-50 ms to decide whether or not to place a bid for an ad.

Are You An Application Or An Infrastructure CIO?

The Accidental Successful CIO

Does a CIO have to choose between applications and infrastructure? Which do you favor more – applications or infrastructure ? There’s the (somewhat) glamorous world of application development and then there is the infrastructure team.

PowerShell: Uninstall Windows 10 Built-In Applications with Verification

Mick's IT Blog

It can also uninstall multiple app via a text file containing the application names. I am in the beginning stages of building a Windows 10 image for the firm I work at. One of the things that needs to be configured is the built-in apps. Obviously, we do not want all of them. You maybe wondering why you would use this over GPO or DSC.

IT Applications: Three Questions You Should Ask About the Applications Portfolio

CEB IT

For IT applications teams – whose job it is to develop software for a company in-house – this focus on digitization gives them a great opportunity to discuss the applications portfolio roadmap.

Cybersecurity: A vertical industry application?

Network World

Generic security requirements will remain forever, but I see a burgeoning trend transforming cybersecurity from a set of horizontal technologies to a vertical industry application. bank demands language skills and business process and regulatory knowledge that isn’t applicable for attacking banks in France or Germany. This is the big Papi of change agents for cybersecurity, as industry IoT applications will radically alter business processes, technology elements and threats.

Mobile Application Security in 2016

Galido

Arxan recently did a 5th annual State of Application Security report, which takes an in-depth look into the security of some of the most popular mobile health and mobile finance applications available. How safe is your app? And how do you feel about the security of the apps you install?

IT Applications: Four Ways Business Analysts are ‘Going Digital’

CEB IT

IT applications teams, who develop software in house for companies, employ business analysts to deal with internal customers and make sure the software is as useful as it can be. Blog Collaborate Across the Organization Information Technology IT Applications

NGA and DigitalGlobe Release Powerful Application To Community Under Open Source License

CTOvision

From NGA''s Press Release: NGA, DigitalGlobe application a boon to raster data storage, processing. By Bob Gourley. Never doubt that a small group of thoughtful, committed, citizens can change the world. Indeed, it is the only thing that ever has.”. ? Margaret Mead.

Grown-Up IT For Grown-Up Applications

Chuck's Blog - EMC

If you’re running critical applications — especially those built on Oracle’s database — Oracle's engineered systems deserve your consideration. And a VBLOCK has almost zero native application awareness. 1 — Optimized for Critical Applications.

Solarflare’s Application Nanosecond TCP Send

CTOvision

Certain classes of network application fall into the category of high-performance request-response applications. These applications require either very low latency (<< 1μs) between receipt of request and transmission of response, the ability to handle a very large number of such transactions (>>100ktps), or both. Marty Meehan.

Threema, the Seriously Secure Messaging Application: Check It Out!

CTOvision

If you’ve ever been worried that the messages you are sending your friends and co-workers via the normal texting applications were not secure enough and you felt unsafe giving out personal information, then Threema might be the application for you to use. By May Gourley.

The cloud can’t fix poor application performance

David Linthicum

Have you heard the fairy tale that application performance on the cloud is automatically optimized, without any effort from developers or administrators? Although elasticity does let you scale on demand by provisioning servers, or perhaps automatically these days using serverless computing technology, the elasticity concept unto itself does not guarantee well-performing applications.

The Browser as an application platform : spf13.com

SPF13

The Browser as an application platform. For the first time ever, the application platform. The browser once, a simple tool for fetching and rendering content is now the most important application platform in the world. t matter and every application would be written in java.

Bebop: Build and support cloud applications

CTOvision

We only know that they are founded and run by some of the greatest creators of true value for enterprise technologists and are on a mission to enable more teams to build and deploy cloud applications. They describe themselves as: We are an early-stage startup that has developed a platform optimized for building powerful and easy-to-use enterprise applications. Research Team. Guess what, we don't have a clue what Bebop is really up to.

Business applications embrace IoT, blockchain to face future

Computer Weekly

Next-generation ERP systems could intersect with IoT, blockchain and smart contracts to drive a new wave of automation aimed at operational efficiency

DARPA opens massive “Colosseum” to develop radical wireless applications

Network World

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies. Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75

Deploying Your Cloud: Three Real-World Applications and Use-Cases

Data Center Knowledge

Let’s talk about cloud. Not that we don’t normally talk cloud, but let’s actually focus on a few specific use-cases. Before we dive in, it’s very important to see that very soon cloud will simply become a normal part of your data center and business process. A recent Cisco Service Provider report. Cloud Computing Shared

Hovis boosts job applications after HR tech roll-out

Computer Weekly

Baker and flour miller expects a quick payback from HR technology project

Most cloud applications not GDPR-ready, report reveals

Computer Weekly

Just 2% of more than 15,000 enterprise cloud application analysed are GDPR-ready, according to a cloud risk report

Cisco unveils Tetration 2.0, focuses on application security

Network World

The product moved Cisco into the analytics market, with the information being used to help customers better understand application performance and improve data center security. This week, Cisco announced the next version of Tetration Analytics , which is focused at providing security at the application layer. The middle of last year, Cisco held an event in New York to release its newest product, Tetration.

What it takes to become an application security engineer

ComputerWorld IT Management

Jeff Williams became an application security engineer in the late 1990s, before it was a common job title. To read this article in full or to leave a comment, please click here (Insider Story

The Open Web Application Security Project (OWASP): An online community with a virtuous goal

CTOvision

One of our CTOvision Pro subscribers requested we provide more context on web based and mobile application security and referenced the good work underway by OWASP. The Open Web Application Security Project is a non-profit online community dedicated to web application security.

Systems Application Architecture (SAA) Part 1

IT Toolbox

Common communications support was designed to interconnect SAA applications, systems, networks, and devices

Managing App-V 5 Virtual Applications with System Center 2012.

IT Pros Rock!

Managing App-V 5 Virtual Applications with System Center 2012 Configuration Manager Service Pack 1. Managing App-V 5 Virtual Applications with System Center 2012 Configuration Manager Service Pack 1. Managing App-V 5 Virtual Applications with System Center 2012 Configuration Manager Service Pack 1. Tune in as we discuss new support for App-V 5 virtual applications and virtual environments. New Support for App-V 5 virtual applications. Sign in. IT Pros ROCK!

TT 24: Nutanix isn’t an application

Virtualized Greek

Additionally, he claimed that Nutanix is just an application that rides atop of vSphere and an application shouldn't OEM the hypervisor. I found application statement to be interesting and dig deeper on the podcast. It's not just an application that rides up top the hypervisor. Nutanix CEO’s response to VMware’s vSphere support concerns is interesting.