Mon.Feb 18, 2019

Develop a Convincing Business Case for IAM

CEB IT

Security and identity and access management (IAM) leaders often struggle with developing compelling business cases to secure funding to support their organization's IAM programs , which requires resources for projects as well as head count for ongoing operations.

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […]. CTO Cyber Security News china cyberattack

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Travel 148

2019: The Year IT Makes a Comeback

Information Week

It's time for IT leaders to recognize that the IT group is crucial to their companies' future growth and success, and to let the business know that IT is there to help

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Veeam Vanguard Award 2019 – Proud IT Pro

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. It’s been a great pleasure to be part of an elite team of IT Pros called Veeam Vanguards. I’m honored to be part of Veeam Vanguard 2019 team. This award is my 5th (fifth) Veeam Vanguard award. Many thanks to all the support! Related Post – Video on Veeam Vanguard experience of VeeamON 2017] What […].

Video 48

More Trending

Vulnerability Scanning – Roadmap to Securing Your Infrastructure

Linux Academy

As we continue down the path to successfully securing our infrastructure, we come to vulnerability scanning. This is not to be confused with penetration testing (pentesting), which may include vulnerability scanning, but then also attempts to exploit identified vulnerabilities. A vulnerability scan simply scans for security flaws in systems and devices known as vulnerabilities and reports them. Do I really need to do this? You may be asking yourself, do I really need to do this?

Linux 40

Going Digital by Taking the “CEADA” Scenario

Future of CIO

The digital paradigm has many dimensions. Going digital is no brainer. However, it is the thorny journey with many curves, bumps, and pitfalls on the way. It represents the next stage of business maturity which will improve how the enterprise works and interacts with its ecosystem.

Kubernetes, Kubeadm, and the AWS Cloud Provider

Scott Lowe

Over the last few weeks, I’ve noticed quite a few questions appearing in the Kubernetes Slack channels about how to use kubeadm to configure Kubernetes with the AWS cloud provider. You may recall that I wrote a post about setting up Kubernetes with the AWS cloud provider last September, and that post included a few snippets of YAML for kubeadm config files.

The Best “Creative Leadership” Quotes of “Digital Master” Feb. 2019

Future of CIO

“ Digital Master ” is the series of guidebooks (25+ books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Monthly “Change Agent CIO” Book Tuning: IT Change Practices Feb. 2019

Future of CIO

Change is inevitable, organizational change has become a common practice within an organization, but too often changes are made as a reaction to outer impulses, crisis, and demands. This is the bureaucracy’s way of meeting the challenges.