Wed.Nov 06, 2019

CIO Agenda 2020: Is Your Culture Adaptable?

CEB IT

Thirty-eight percent of fit organizations say their culture embraces appropriate risk taking and learning from failure, as compared to just 21% of fragile organizations. Fit enterprises see uncertainty as a guarantee and develop a culture prepared to adapt to changing environments.

Agile 130

Healthcare Organizations Must Future-Proof Revenue Strategies By Embracing Value-Based Care

Forrester IT

The time to transition from fee-for-service models to value-based care (VBC) models is here, as those that continue to delay will be left behind!

Global Firms Under-Insured Despite Breach Concerns

CTOvision

Half of global organizations still don’t have cyber insurance, despite the majority believing cyber-attacks will increase next year, according to FireEye. The security vendor polled 800 CISOs and senior executives across the globe to compile its new Cyber Trendscape Report. More than half (56%) said they believe the risk of attacks will grow next year and 51% […].

Another CMP Gets Swallowed Up (Percolate, By Seismic), And What It Means To You

Forrester IT

Sales enablement automation (SEA) vendor Seismic announced its acquisition of content marketing platform (CMP) Percolate yesterday at its annual customer event, Seismic Shift.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

With a Laser, Researchers Say They Can Hack Alexa, Google Home or Siri

CTOvision

Since voice-controlled digital assistants were introduced a few years ago, security experts have fretted that systems like Apple’s Siri and Amazon’s Alexa were a privacy threat and could be easily hacked. But the risk presented by a cleverly pointed light was probably not on anyone’s radar. Researchers in Japan and at the University of Michigan said Monday […].

Apple 70

More Trending

8 Tips for More Secure Mobile Computing

CTOvision

Security professionals often talk about the importance of enlisting users as allies in the battle for better security. When it comes to mobile security, that alliance must be a working reality rather than a managerial dream — namely because these handheld machines are typically employee-owned, thus placing their use and precise configuration out of the […].

Focus HCM Investments On Two Key Overlooked Areas For Higher Business Value

Forrester IT

As Warren Buffett said, “Only when the tide goes out do you discover who’s been swimming naked.” Or, put another (potentially less embarrassing) way, you really don’t know the risks you’re taking until you’re tested by changing conditions.

Intune Endpoint Security Policies Microsoft Endpoint Manager Updates

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Sneak peak of Microsoft Endpoint Manager security topics discussed in the section hosted by Paul Mayfield, Terrell Cox, and Micro-Scott. More details about the session and Intune Endpoint Security are given below.

RIP The RFP – This Is Not Your 1990s Vendor Selection Process

Forrester IT

Yes, you read correctly. The RFP (Request For Proposal) is close to extinction. Let me explain why.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Intune Reporting Strategies Advanced Reporting Options from Ignite 2019

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link].

5 Practical Implementations of Performance Management that Can Solve all Employee Performance Related Issues

Galido

Information Technology Blog - - 5 Practical Implementations of Performance Management that Can Solve all Employee Performance Related Issues - Information Technology Blog.

iOS Android macOS Mobile Enrollment Options with Intune Updates from Ignite 2019

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s check the Mobile device management options with Microsoft Endpoint Manager (MEM). Intune Enrollment options(iOS Android macOS Mobile Enrollment) are discussed in the Ignite 2019 sessions.

How Cloud Improves Disaster Recovery

Perficient - Digital Transformation

The following is the sixth blog in a series about why businesses are moving to the cloud to modernize and improve business performance. In our last blog in this series, we examined how security improves with cloud.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Cisco Meraki ups security with new switch, software

Network World

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.

The Organizational Learning Scoreboard

Future of CIO

People are always one of the most invaluable assets for running the business.

How to copy a file from one server to another from a third with SSH

Tech Republic Security

Find out how to work some SSH magic, by transferring a file from one machine to another from a third

The Best “Design Intelligence” Quotes of “Digital Master” Nov. 2019

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.”

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Cybercriminals using Google Analytics to enhance phishing efforts

Tech Republic Security

A report from security firm Akamai found that hackers were using analytics services to optimize their phishing efforts

The Monthly “Digital Maturity” Book Tuning: Sorting Critical Puzzle Pieces of Digital Transformation Nov 2019

Future of CIO

Digital makes a significant impact on every aspect of the business from people, process to technology, both horizontally and vertically. The digitalization flattens the organizational hierarchy and blurs the functional, organizational and geographical borders in the business ecosystem.

How to locate and close an open port in Linux

Tech Republic Data Center

Locating and blocking unwanted open ports in Linux should be a task every network admin knows how to do

How to use the Advanced Search in Gmail

Tech Republic Cloud

Empower your Gmail searches to make it easier to find the needle in the proverbial haystack

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

IBM develops financial services-ready public cloud

Tech Republic Security

A new platform is being unveiled that is aimed at banks and their suppliers. The goal is to help them adhere to strict industry regulatory compliance, security and resiliency requirements

How to use the Advanced Search in Gmail

Tech Republic Cloud

Empower your Gmail searches to make it easier to find the needle in the proverbial haystack

How to Fail: Digital Transformation Mistakes

Information Week

Don't make these nine digital transformation mistakes that will slow down your efforts to be competitive in a new era

What's new in OneDrive for Business?

Tech Republic Cloud

OneDrive for Business now includes more options and control over sharing files, more options for working with files in the web interface and improved options for admins to manage the OneDrive client on users' PCs

52

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.