Thu.Nov 07, 2019

Forrester Publishes NPS Benchmarks For 260 Brands In 16 Industries

Forrester IT

Forrester has been measuring Net Promoter Score (NPS)* for four years as a part of our annual CX Index survey. Because customer experience (CX) pros have been asking how their firm’s NPS compares to other firms’ scores and what “good” is, we decided to publish our NPS data for the first time.

How to harden web browsers against cyberattacks

Network World

Use these techniques to limit attackers’ ability to compromise systems and websites

Factors to Consider While Choosing a Programming Language

Galido

Information Technology Blog - - Factors to Consider While Choosing a Programming Language - Information Technology Blog. The world of code is limitless. Like the Universe, it keeps expanding with additions, modifications, and necessities.

Windows 10 1909 Deployment Enhancement Enablement Package

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, we will see what is the difference in Windows 10 1909 deployment or update. The screen shots of this post is taken from Microsoft Ignite session by Vivek Singh Gaur.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Guide to Email Marketing for Small Business

Galido

Information Technology Blog - - Guide to Email Marketing for Small Business - Information Technology Blog. Email marketing can be a great way for small businesses to reach out and communicate with their leads and consumers.

More Trending

What are the most over-hyped tech trends right now?

mrc's Cup of Joe Blog

Summary: Technology trends can be tricky. Some receive a massive amount of publicity, and live up to the hype. Others receive a lot of hype, yet don’t go anywhere. How can you identify which trends are worth your time, and which are overhyped?

Printers: The overlooked security threat in your enterprise | TECHtalk

Network World

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network

Predictive Model Ensembles: Pros and Cons

Perficient - Digital Transformation

Many recent machine learning challenges winners are predictive model ensembles. We have seen this in the news. Data science challenges are hosted on many platforms. Techniques included decision trees, regression, and neural networks. And, winning ensembles used these in concert.

Intune Guided Scenarios with Policy Set Templates Help Admins MEM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I learned more about Intune guided scenarios from the Ignite session hosted by Paul Mayfield, Terrell Cox, and Micro-Scott. Most of the screenshots are taken from the demo and slides of the same ignite session.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

5 Point Guide to Publishing a Research Paper in a STEM Journal

Kitaboo

In the field of STEM (Science, Technology, Engineering, Mathematics), academic writing and publishing of papers in a reputed journal emerge as one of the most competitive engagements for many aspirants.

Intune Policy Sets Collection of Workflows Admin Friendly MEM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Intune policy sets give user friendly experience to Intune admins. The screenshots are taken from the Ignite session slides and demos by Paul Mayfield, Terrell Cox, and Micro-Scott.

Five Ways to Make Better Data-Driven Decisions in 2020

Datacponomy

Is your organization data-driven? Across industries, data has become a core component of most modern businesses. Here is how budgets and corporate planning reflect this trend.

The Ultimate, Non-Technical Guide to AWS

Linux Academy

One of the most common questions people ask us is, “Do I need to have an IT background to start using AWS?” The answer is absolutely not. Don’t get me wrong, having a technical background will give you an advantage. Knowing how networking works, and being familiar with the client-server model will help you understand the ins and outs of AWS, but what if you need something even more basic than that? Part of what makes AWS so useful is its technical complexity.

eBook 40

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

5 Point Guide to Publishing a Research Paper in a STEM Journal

Kitaboo

In the field of STEM (Science, Technology, Engineering, Mathematics), academic writing and publishing of papers in a reputed journal emerges as one of the most competitive engagements for many aspirants. Today, innumerable academic STEM publishing journals have surfaced, but simultaneously, the number of applicants has also soared. In the wake of such developments, many publishing houses have revised the rules that need to be followed by aspirants wanting to publish their research papers.

Knowledge Powers of Digital CIOs

Future of CIO

Microsoft wants to kill the password using FIDO2 security for better authentication

Tech Republic Security

Andrew Conway, general manager for Microsoft 365 Security, discusses how to prevent credential theft by relying on biometric security

The Best “Wholeness” Quotes of “Digital Master” Nov. 2019

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Handling endpoint security without overwhelming professionals with information overload

Tech Republic Security

Chris Bell, director of product management at Secureworks, describes the difficult balance to strike for presenting actionable information to security professionals without exhausting them with information overload

The Strategic Communication in the Boardroom

Future of CIO

The corporate board is one of the most critical leadership pillars in contemporary organizations. At the board level, it is a matter of leadership guidance to make sound judgments and steer the organization in the right direction. Language influences perception.

How Barracuda leverages Microsoft Azure to deliver application security to customers

Tech Republic Security

Nitzan Miron, VP of application security services at Barracuda Networks, discusses the Azure-delivered WAF-as-a-Service product offering announced at Microsoft Ignite 2019

How to install applications from the command line in CentOS 8

Tech Republic Data Center

The default package manager for CentOS 8 has migrated from yum to dnf. Find out how this tool is used

Tools 52

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

How to control location tracking on your iPhone in iOS 13

Tech Republic Security

The latest version of iOS offers some convenient ways to manage location tracking by apps

How to install applications from the command line in CentOS 8

Tech Republic Data Center

The default package manager for CentOS 8 has migrated from yum to dnf. Find out how this tool is used

Tools 52

What Happens When You Inject Security into DevOps: DevSecOps

Information Week

If you think that the security reviews that your DevOps team conducts are enough, give it another thought

How can you protect yourself from hackers? An IBM social engineer offers advice

Tech Republic Security

Stephanie "Snow" Carruthers, Chief People Hacker at IBM, gives advice about protecting yourself online. She also explains how the robocalls and spoofing process works

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.