Wed.Sep 11, 2019

A Recession Looms — How Will You Keep Experience In Focus?

Forrester IT

In this short video, I ask a simple question with no simple answer: How can customer service organizations avoid wild swings between a focus on experience and a focus on efficiency if macroeconomic conditions deteriorate?

Video 317

Top Trends on the Gartner Hype Cycle for Artificial Intelligence, 2019

CEB IT

Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

It’s Time To Fight For Consumer Hope

Forrester IT

“Digital platform” is a term I first proposed more than a decade ago to describe a new breed of company that was about to dominate in our economic and social discussions. The term never caught on, sad to say, probably because it wasn’t catchy enough, but the prediction proved true. I used the word platform […]. age of the customer

Social 252

8 AI Trends in Today's Big Enterprise

Information Week

A new KPMG report provides an inside view into how big companies are investing in and deploying artificial intelligence and machine learning technology

Trends 170

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Intune Win32 App Failure Log Collection Backend Secrets

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Today in this post, I will talk about the Intune Win32 app log collection back-end process. This Intune log collection feature got introduced in Feb 2019.

To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. This has been particularly true for the area of industrial IoT (IIoT). Connected industrial devices are nothing new, but most IT people aren’t familiar with them because they have been managed by operational technology (OT) teams. More and more, though, business leaders want to bring OT and IT together to drive better insights from the combined data set.

More Trending

Zero Touch Dell Command Update for SCCM and MDT

Mick's IT Blog

I have used the Dell Command | Update in the build for quite some time for managing the drivers on systems because it makes it a hand-off approach with little setup and reliable updates direct from Dell.

Dell 170

What Can CIOs Do To Boost Workplace Diversity?

The Accidental Successful CIO

The key to diversity starts with data analytics Image Credit: Ron Mader. As CIOs, because of the importance of information technology we spend our days surrounded by servers and making decisions about things like firewalls and moving into the cloud.

Groups 163

How Data Scientists Can Tear Down Fears of Innovation

Information Week

AI and other fresh ideas can put organizations on the path to transformation, but their champions may face systemic pushback from entrenched team members

System 113

Driving Data

Perficient - Digital Transformation

Stuck In Rush Hour. A few days ago I was driving home from Atlanta during rush hour and my phone died. All I could see in front of me were brake lights and red lights. Not a huge deal, I knew where I wanted to go and I knew how to get there.

Data 111

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

How to cleanly remove a package from a Debian-based distribution

Tech Republic Data Center

When you uninstall an application from Linux, make sure you're doing it in such a way as to remove both configuration files and dependencies

Linux 151

Driving Innovation with Automation in the Cloud

Perficient - Digital Transformation

The following is the third blog in a series about why businesses are moving to the cloud to modernize and improve business performance. In our first blog in this series, we looked at the current state of cloud , while the second blog highlighted how cloud enables innovation.

Quality over quantity: putting actionable metrics above vanity

Datacponomy

Actionable metrics allow marketers to assess their activities for in-depth reporting and real-time optimisation. Marketers must look beyond vanity metrics and the number of integrations data intelligence providers can offer to focus on actionable metrics relevant to their business goals.

Report 130

The Internet: Privacy Enabler or Detractor?

Information Week

The Internet has created more individual privacy than any technology in human history. So why are we constantly told otherwise

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

How to set up Microsoft Teams for security and compliance

Network World

These are the security and compliance decisions you need to make when deploying Microsoft Teams

Spearline Podcast | Episode 1: How Remote Working Can Benefit Your Company

Spearline Testing

Keeping you up to date and informed with all the latest news, queries and questions with some of the biggest names in the telecommunications world.

How to use the docker-compose command

Tech Republic Cloud

Find out how to get started working with the docker-compose command

How To 116

TV Is Dead! Long Live TV! (A Forrester New Wave™ On Cross-Channel Video Ad Platforms)

Forrester IT

It’s become de rigeur for digital types to claim that traditional TV advertising is fast becoming obsolete. And they’re not entirely wrong. But they’re also not entirely right. Long and short, it’s complicated.

Video 68

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Holistic Information Management

Future of CIO

Digital is the era of information abundance, information provide significant opportunities for business growth, also brings unprecedented risks when mismanaged and cause the business failures all the time. With the fast pace of changes, the information management challenges will only intensify.

How a small business should respond to a hack

CTOvision

Read Sam Bocetta explain how small and medium businesses should respond to a hack attack on CSO Online : Hacks and data breaches are, unfortunately, part of doing business today. Ten years ago, it was the largest corporations that were most targeted by hackers, but that has changed.

The Monthly “Digital Hybridity” Book Tuning: The Multitude of Digital Hybridity Sep. 2019

Future of CIO

The purpose of the book “ Digital Hybridity: How to Strike the Right Balance for Digital Paradigm Shift ” is to shed some light on how to strike the right balance of stability and changes; being transactional to keep spinning and being transformational to leap forward for making a seamless digital paradigm shift.

Rapid Rise in Monetization of IoT Attacks

CTOvision

An investigation by Trend Micro into the dark dealings of the cyber underground has found a rapid increase in the monetization of IoT attacks. In a report released today, the global security software company revealed that forums across Russian, Portuguese, English, Arabic, and Spanish language-based markets are all brimming with chatter of how to compromise devices […].

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

An Introduction to Kustomize

Scott Lowe

kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHub repository ). Users can run kustomize directly, or—starting with Kubernetes 1.14—use —use kubectl -k to access the functionality (although the standalone binary is newer than the functionality built into kubectl as of the Kubernetes 1.15 release).

Uber’s Path of Destruction

I'm not lost, I'm wondering

Since it began operations in 2010, Uber has grown to the point where it now collects over $45 billion in gross passenger revenue, and it has seized a major share of the urban car service market. But the widespread belief that it is a highly innovative and successful company has no basis in economic reality. Hubert Horan: Uber’s Path of Destruction – American Affairs Journal. Pound of Obscure capitalism debt design service design

Millions of Exim servers vulnerable to root-granting exploit

CTOvision

Millions of Exim servers are vulnerable to a security bug that when exploited can grant attackers the ability to run malicious code with root privileges. All Exim servers running version 4.92.1 and before are vulnerable, the Exim team said in an advisory this week. Version 4.92.2 was released on Friday, September 6, to address the issue. The […].

Beginner-friendly Nmap Tutorial

Linux Academy

You know it seems like every day we’re hearing about new data breaches happening. Ten million users affected here 30 million users over there, but don’t worry, everybody gets free credit monitoring! Now doesn’t that just give you warm fuzzies?

Linux 24

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack

CTOvision

Researchers have identified a new side-channel attack impacting all modern Intel server processors made since 2012. The vulnerability could allow bad actors to sniff out encrypted passwords as they are being typed into a secure shell session (SSH); but, luckily, such an attack would be difficult to launch. The attack, disclosed on Tuesday and dubbed NetCAT […].

Intel 37

The Best “Peace” Quotes of “Digital Master” Sep. 2019

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

What is fileless malware and how do you protect against it?

CTOvision

Read Mary Branscombe explain the nature of fileless malware and what you can do to protect against it on Tech Republic : When you get tricked by a phishing mail and open a document attachment that has a malicious macro or a link to a malicious site, or you download an infected application, there’s a […].