Tue.Oct 08, 2019

Be prepared for microservices challenges

David Linthicum

Last week I wrote about how containers are becoming popular attack targets both inside and outside of a public cloud. This week let’s drill down on a common byproduct of containers: microservices. Microservices is both an architecture and a way of deploying applications. Indeed, microservices is a term used to describe the practice of breaking up an application, within a container or not, into a series of smaller specialized parts.

Key Takeaways And Our Take On Oracle OpenWorld 2019

Forrester IT

Allen Bonde and I chat about key takeaways and our take on the recent Oracle OpenWorld 2019 event. age of the customer

Oracle 150

SCCM Driver Import Driver Package Creation Process Guide


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Hello folks, In this blog post, I will try to share my experience on how to import SCCM Driver Import and create a driver package in SCCM. It also includes how to integrate into the SCCM task sequence.

Citizens Challenge 2019: Driving Innovation In Banking

Forrester IT

Hackathons can be an excellent way for financial services firms to round out their innovation portfolios. Innovation events like these can help address changing consumer needs and behaviors, as well as competitors’ responses to them.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Exciting use cases of Artificial Intelligence in four industry sectors


As the digital transformation of businesses and services continues with full force, artificial intelligence (AI) has become somewhat of a buzzword in the technology sector. While it’s true that we haven’t quite reached the level of technology sophistication often shown off in Hollywood blockbusters, there already are a variety of use cases where machine learning […].

More Trending

Top enterprise VPN vulnerabilities

Network World

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities

Robocalls annually scam one in 10 Americans, to a loss of $9.5 billion

Tech Republic Security

Computerized auto dialers deliver pre-recorded phone calls with 60 billion expected in 2019 alone. Here's how to handle robocalls

How To 114

What is CI/CD?

Tech Republic Data Center

The new Continuous Integration/Continuous Delivery software development life cycle promises serious improvements for enterprise companies

Cyberattacks are increasing, but AV and intrusion detection software are asleep at the wheel

Tech Republic Security

Over three quarters of US businesses have faced cyberattacks in the past 12 months, with 86% of US firms experiencing attacks feeling let down by their antivirus

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Tips for Getting Started with Application Modernization

Perficient - Digital Transformation

Our previous post, Tackle Security Concerns for Application Modernization , addressed common security concerns and revealed a shift in this perspective. The final post in this series offers tips to secure buy in and make sure the change sticks.

More companies use multi-factor authentication, but security still weak from poor password habits

Tech Republic Security

Users still have to juggle far too many passwords, which leads to password sharing, reuse, and other bad habits, according to a new report from password manager LastPass

A Beginner’s Guide to Content Marketing


Information Technology Blog - - A Beginner’s Guide to Content Marketing - Information Technology Blog. Way back in 1996, Bill Gates wrote an essay titled “Content is King”. How right he was. As we witness life’s everyday migration into the digital sphere, this is truer than ever.

Video 62

How to build a better cybersecurity defense with deception technologies

Tech Republic Security

This new cybersecurity defense mechanism proactively protects organizations and prevents attacks

How To 109

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

How to install Google Cloud SDK on Linux for easy remote access to your Google Cloud Platform

Tech Republic Cloud

Interacting with your Google Cloud Platform can be done from the Linux terminal window

UT Austin launches first ever healthcare cybersecurity leadership program in the US

Tech Republic Security

With the shortage of cybersecurity professionals in the US, UT's program aims to develop individuals who can mitigate security risks in healthcare

Spearline’s Automated Number Test Campaign: 10 Years Strong

Spearline Testing

10 years ago, Spearline developed the first-ever automated testing platform to proactively monitor global toll, toll-free, inbound and dial-out numbers.

Only 1 in 5 enterprises have DMARC records set up with an enforcement policy

Tech Republic Security

More companies than ever are adopting new email security methods, like DMARC, but few actually put them to full use

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How to install Google Cloud SDK on Linux for easy remote access to your Google Cloud Platform

Tech Republic Cloud

Interacting with your Google Cloud Platform can be done from the Linux terminal window

74% of global workers say the tech industry needs more regulation

Tech Republic Security

The majority of workers worldwide think the tech industry needs more regulation, but the US in particular is falling behind

AI, Automation Drive Progress in Government Data Centers

Information Week

government data centers have consolidated and become more efficient in the last 10 years. Now they are adding AI and automation to the mix

How to build curl with SFTP support

Tech Republic Security

The curl package can be build to include SFTP support. Find out how easy this is to do

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

2020 IT Budgets Are Up, But.

Information Week

A Spiceworks report highlights the where's and why's of 2020 IT budget plans

Three Clarifications Enable Smooth Digital Transformation

Future of CIO

Digital transformation is the radical change and a tough journey with many obstacles on the way. Riding ahead of the change curve takes both principles and practices, strategy and discipline.

How to build curl with SFTP support

Tech Republic Security

The curl package can be build to include SFTP support. Find out how easy this is to do

The Best “Discernment” Quotes of “Digital Master” Oct. 2019

Future of CIO

It’s more important than ever to have strong discernment and sound judgement to make effective decisions and bring wisdom to the workplace.

Meet Your New Identity And Access Management Research Analyst

Forrester IT

As of September, I’m the new identity and access management (IAM) analyst on Forrester’s security and risk research team. I am grateful to have joined a very talented group of analysts at a company that is fun, intellectually stimulating, and committed to high-quality, objective research.