Tue.Oct 08, 2019

Key Takeaways And Our Take On Oracle OpenWorld 2019

Forrester IT

Allen Bonde and I chat about key takeaways and our take on the recent Oracle OpenWorld 2019 event. age of the customer

Oracle 288

Be prepared for microservices challenges

David Linthicum

Last week I wrote about how containers are becoming popular attack targets both inside and outside of a public cloud. This week let’s drill down on a common byproduct of containers: microservices. Microservices is both an architecture and a way of deploying applications. Indeed, microservices is a term used to describe the practice of breaking up an application, within a container or not, into a series of smaller specialized parts.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Citizens Challenge 2019: Driving Innovation In Banking

Forrester IT

Hackathons can be an excellent way for financial services firms to round out their innovation portfolios. Innovation events like these can help address changing consumer needs and behaviors, as well as competitors’ responses to them.

Exciting use cases of Artificial Intelligence in four industry sectors


As the digital transformation of businesses and services continues with full force, artificial intelligence (AI) has become somewhat of a buzzword in the technology sector. While it’s true that we haven’t quite reached the level of technology sophistication often shown off in Hollywood blockbusters, there already are a variety of use cases where machine learning […].

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

SCCM Driver Import Driver Package Creation Process Guide


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Hello folks, In this blog post, I will try to share my experience on how to import SCCM Driver Import and create a driver package in SCCM. It also includes how to integrate into the SCCM task sequence.

Robocalls annually scam one in 10 Americans, to a loss of $9.5 billion

Tech Republic Security

Computerized auto dialers deliver pre-recorded phone calls with 60 billion expected in 2019 alone. Here's how to handle robocalls

How To 170

More Trending

How MIT researchers use machine learning to detect IP hijackings before it occurs

Tech Republic Security

The goal is to predict incidents in advance by tracing it back to the actual hijackers

A Beginner’s Guide to Content Marketing


Information Technology Blog - - A Beginner’s Guide to Content Marketing - Information Technology Blog. Way back in 1996, Bill Gates wrote an essay titled “Content is King”. How right he was. As we witness life’s everyday migration into the digital sphere, this is truer than ever.

Video 96

Cyberattacks are increasing, but AV and intrusion detection software are asleep at the wheel

Tech Republic Security

Over three quarters of US businesses have faced cyberattacks in the past 12 months, with 86% of US firms experiencing attacks feeling let down by their antivirus

AI, Automation Drive Progress in Government Data Centers

Information Week

government data centers have consolidated and become more efficient in the last 10 years. Now they are adding AI and automation to the mix

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

How to build a better cybersecurity defense with deception technologies

Tech Republic Security

This new cybersecurity defense mechanism proactively protects organizations and prevents attacks

How To 144

Tips for Getting Started with Application Modernization

Perficient - Digital Transformation

Our previous post, Tackle Security Concerns for Application Modernization , addressed common security concerns and revealed a shift in this perspective. The final post in this series offers tips to secure buy in and make sure the change sticks.

More companies use multi-factor authentication, but security still weak from poor password habits

Tech Republic Security

Users still have to juggle far too many passwords, which leads to password sharing, reuse, and other bad habits, according to a new report from password manager LastPass

Spearline’s Automated Number Test Campaign: 10 Years Strong

Spearline Testing

10 years ago, Spearline developed the first-ever automated testing platform to proactively monitor global toll, toll-free, inbound and dial-out numbers.

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

UT Austin launches first ever healthcare cybersecurity leadership program in the US

Tech Republic Security

With the shortage of cybersecurity professionals in the US, UT's program aims to develop individuals who can mitigate security risks in healthcare

How to install Google Cloud SDK on Linux for easy remote access to your Google Cloud Platform

Tech Republic Cloud

Interacting with your Google Cloud Platform can be done from the Linux terminal window

Only 1 in 5 enterprises have DMARC records set up with an enforcement policy

Tech Republic Security

More companies than ever are adopting new email security methods, like DMARC, but few actually put them to full use

Top enterprise VPN vulnerabilities

Network World

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

74% of global workers say the tech industry needs more regulation

Tech Republic Security

The majority of workers worldwide think the tech industry needs more regulation, but the US in particular is falling behind

2020 IT Budgets Are Up, But.

Information Week

A Spiceworks report highlights the where's and why's of 2020 IT budget plans

How to install Google Cloud SDK on Linux for easy remote access to your Google Cloud Platform

Tech Republic Cloud

Interacting with your Google Cloud Platform can be done from the Linux terminal window

How to build curl with SFTP support

Tech Republic Security

The curl package can be build to include SFTP support. Find out how easy this is to do

How To 103

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Three Clarifications Enable Smooth Digital Transformation

Future of CIO

Digital transformation is the radical change and a tough journey with many obstacles on the way. Riding ahead of the change curve takes both principles and practices, strategy and discipline.

U.S. Blacklists Chinese Artificial Intelligence Firms Over Abuses Against Muslim Minorities


The United States is blacklisting a group of Chinese tech companies that develop facial recognition and other artificial intelligence technology that the U.S. says is being used to repress China’s Muslim minority groups. A move Monday by the U.S.

The Best “Discernment” Quotes of “Digital Master” Oct. 2019

Future of CIO

It’s more important than ever to have strong discernment and sound judgement to make effective decisions and bring wisdom to the workplace.

How to build curl with SFTP support

Tech Republic Security

The curl package can be build to include SFTP support. Find out how easy this is to do

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

The Monthly “Digitizing Boardroom” Book Tuning: The Corporate Board’s Mindset, Skillset, Toolset Oct. 2019

Future of CIO

Modern corporate boards play significant roles in guiding businesses in the right direction and achieve expected business results.

Meet Your New Identity And Access Management Research Analyst

Forrester IT

As of September, I’m the new identity and access management (IAM) analyst on Forrester’s security and risk research team. I am grateful to have joined a very talented group of analysts at a company that is fun, intellectually stimulating, and committed to high-quality, objective research.

Join OODA and CTOvision in Boston at AI World 23-25 Oct


Mapping’s Third Wave: Unlocking The Physical Future Of Business

Forrester IT

We’ve just finished a report on the next wave of innovation in what we call the mapping industry. Here’s the blurb and a video introducing the ideas. Please let me know if you’d like to talk about the potential for developers in every company to build unique applications for the physical future. Forrester clients can […]. age of the customer

Video 42

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

When it comes to the modern tech stack, one of the fastest changing areas is around containers, serverless, and choosing the ideal path to cloud native computing. How do you as a technology leader point your team in the right direction, especially given how quickly this is evolving?