Wed.Sep 11, 2019

Top Trends on the Gartner Hype Cycle for Artificial Intelligence, 2019


Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.

A Recession Looms — How Will You Keep Experience In Focus?

Forrester IT

In this short video, I ask a simple question with no simple answer: How can customer service organizations avoid wild swings between a focus on experience and a focus on efficiency if macroeconomic conditions deteriorate?

Video 176

What Can CIOs Do To Boost Workplace Diversity?

The Accidental Successful CIO

The key to diversity starts with data analytics Image Credit: Ron Mader. As CIOs, because of the importance of information technology we spend our days surrounded by servers and making decisions about things like firewalls and moving into the cloud.

It’s Time To Fight For Consumer Hope

Forrester IT

“Digital platform” is a term I first proposed more than a decade ago to describe a new breed of company that was about to dominate in our economic and social discussions. The term never caught on, sad to say, probably because it wasn’t catchy enough, but the prediction proved true. I used the word platform […]. age of the customer

Social 136

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Intune Win32 App Failure Log Collection Backend Secrets


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Today in this post, I will talk about the Intune Win32 app log collection back-end process. This Intune log collection feature got introduced in Feb 2019.

More Trending

To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. This has been particularly true for the area of industrial IoT (IIoT). Connected industrial devices are nothing new, but most IT people aren’t familiar with them because they have been managed by operational technology (OT) teams. More and more, though, business leaders want to bring OT and IT together to drive better insights from the combined data set.

Moving to an Agile “New” Big Data Paradigm

Perficient - Digital Transformation

A few years ago, I was in the middle of getting together a conceptual architectural document for a project that required very agile methodologies based on microservices and cross- functional teams.

Agile 85

How to set up Microsoft Teams for security and compliance

Network World

These are the security and compliance decisions you need to make when deploying Microsoft Teams

Driving Data

Perficient - Digital Transformation

Stuck In Rush Hour. A few days ago I was driving home from Atlanta during rush hour and my phone died. All I could see in front of me were brake lights and red lights. Not a huge deal, I knew where I wanted to go and I knew how to get there.

Data 83

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Zero Touch Dell Command Update for SCCM and MDT

Mick's IT Blog

I have used the Dell Command | Update in the build for quite some time for managing the drivers on systems because it makes it a hand-off approach with little setup and reliable updates direct from Dell.

Dell 114

8 AI Trends in Today's Big Enterprise

Information Week

A new KPMG report provides an inside view into how big companies are investing in and deploying artificial intelligence and machine learning technology

Driving Innovation with Automation in the Cloud

Perficient - Digital Transformation

The following is the third blog in a series about why businesses are moving to the cloud to modernize and improve business performance. In our first blog in this series, we looked at the current state of cloud , while the second blog highlighted how cloud enables innovation.

How to use the docker-compose command

Tech Republic Cloud

Find out how to get started working with the docker-compose command

How To 100

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

How to cleanly remove a package from a Debian-based distribution

Tech Republic Data Center

When you uninstall an application from Linux, make sure you're doing it in such a way as to remove both configuration files and dependencies

Linux 93

Spearline Podcast | Episode 1: How Remote Working Can Benefit Your Company

Spearline Testing

Keeping you up to date and informed with all the latest news, queries and questions with some of the biggest names in the telecommunications world.

The Internet: Privacy Enabler or Detractor?

Information Week

The Internet has created more individual privacy than any technology in human history. So why are we constantly told otherwise

Uber’s Path of Destruction

I'm not lost, I'm wondering

Since it began operations in 2010, Uber has grown to the point where it now collects over $45 billion in gross passenger revenue, and it has seized a major share of the urban car service market. But the widespread belief that it is a highly innovative and successful company has no basis in economic reality. Hubert Horan: Uber’s Path of Destruction – American Affairs Journal. Pound of Obscure capitalism debt design service design

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

How Data Scientists Can Tear Down Fears of Innovation

Information Week

AI and other fresh ideas can put organizations on the path to transformation, but their champions may face systemic pushback from entrenched team members

Holistic Information Management

Future of CIO

Digital is the era of information abundance, information provide significant opportunities for business growth, also brings unprecedented risks when mismanaged and cause the business failures all the time. With the fast pace of changes, the information management challenges will only intensify.

TV Is Dead! Long Live TV! (A Forrester New Wave™ On Cross-Channel Video Ad Platforms)

Forrester IT

It’s become de rigeur for digital types to claim that traditional TV advertising is fast becoming obsolete. And they’re not entirely wrong. But they’re also not entirely right. Long and short, it’s complicated.

Video 37

The Monthly “Digital Hybridity” Book Tuning: The Multitude of Digital Hybridity Sep. 2019

Future of CIO

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

An Introduction to Kustomize

Scott Lowe

kustomize is a tool designed to let users “customize raw, template-free YAML files for multiple purposes, leaving the original YAML untouched and usable as is” (wording taken directly from the kustomize GitHub repository ). Users can run kustomize directly, or—starting with Kubernetes 1.14—use —use kubectl -k to access the functionality (although the standalone binary is newer than the functionality built into kubectl as of the Kubernetes 1.15 release).

How a small business should respond to a hack


Read Sam Bocetta explain how small and medium businesses should respond to a hack attack on CSO Online : Hacks and data breaches are, unfortunately, part of doing business today. Ten years ago, it was the largest corporations that were most targeted by hackers, but that has changed.

Beginner-friendly Nmap Tutorial

Linux Academy

You know it seems like every day we’re hearing about new data breaches happening. Ten million users affected here 30 million users over there, but don’t worry, everybody gets free credit monitoring! Now doesn’t that just give you warm fuzzies?

Linux 16

Rapid Rise in Monetization of IoT Attacks


An investigation by Trend Micro into the dark dealings of the cyber underground has found a rapid increase in the monetization of IoT attacks. In a report released today, the global security software company revealed that forums across Russian, Portuguese, English, Arabic, and Spanish language-based markets are all brimming with chatter of how to compromise devices […].

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.