August, 2019

Get ready for the convergence of IT and OT networking and security

Network World

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention.

Don’t worry about shadow IT. Shadow IoT is much worse.

Network World

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface. That may be true, but it’s not the whole story.

Agile 109

Alternative Data Meets Fintech: Tweets, Parking Lot Pictures and Criminal Take-downs

Datacponomy

In an increasingly competitive market, how are fintech companies adapting to improve their decision making? In industries such as insurance, capital markets, cryptocurrency, wealth and asset management — alternative data is proving to be a valuable source of insight.

US Tech Spending Slowdown Amidst Rising Cloud Adoption Will Squeeze Tech Budgets

Forrester IT

Recent stock and bond market turmoil has highlighted the growing risk of a US economic slowdown and even a recession — a prospect that 74% of economists think will happen by 2021, according to a survey of US economists by the National Association of Business Economists.

Budget 172

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

The Data Center Is (Almost) Dead

CEB IT

In the past, when business units requested new applications or services, IT organizations would first ask themselves, “How can we build it?” Now, the question is “Where can we find it?”. Gartner predicts that by 2025, 80% of enterprises will shut down their traditional data centers.

More Trending

Where did all the cloud computing thought leaders go?

David Linthicum

I’m not citing studies that demonstrate a diminished number of thought leaders in the cloud computing space—this is only my impression.

Study 217

Adulting - CIO Style

CIO Musings

I love the Urban Dictionary. I'm not sure why, I guess it makes me feel hip to read through some of the posts. I have contributed a few along the way like the term "Camel Up", my proudest moment. The Urban Dictionary defines "adulting" like this.

Potential Malicious Use Of IT By NASA Astronaut While On Orbit: Thought provoking but probably not hacking

CTOvision

Have you been numbed by constant reports of breaches? They get old for sure, especially since so many have at their core common issues that could have been avoided by application of best practices.

Embed AI in your digital supply chain to win, serve, and retain customers

Forrester IT

It’s now just over 12 months since we first published research on Digital Supply Chain. Some Forrester clients have made progress with Integrated Business Planning and with Control Towers. And they are on the lookout for Blockchain opportunities.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

5 Trends Appear on the Gartner Hype Cycle for Emerging Technologies, 2019

CEB IT

Today, insurance fraud is detected by a combination of claim analysis, computer programs and even private investigators. The FBI estimates the total cost of non-healthcare-related insurance fraud to be around $40 billion per year.

Trends 207

Developing great products with StarCIO Agile Planning

Social, Agile and Transformation

Writing user stories was once a relatively straightforward exercise. Product owners wrote stories in customer-centric language defining why, what, and for whom the story was being implemented.

Agile 161

How to stop people from causing bad cloud architectures

David Linthicum

I’ve been in some knock-down, drag-out battles over both the configuration and the use of technology. On one side, you have somebody with a very different opinion as to what technology should be used and how. On the other side, you know that you are right.

SCCM OneTrace Log Viewer to Replace CMTrace

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s check the new SCCM log viewer in SCCM called Onetrace. Also, let’s check out whether it can replace CMTrace. Learn about the user experience of Onetrace? You will see in this post.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Insights into threats, risks and opportunities

CTOvision

OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues.

Collective Bargaining: Your Biggest Risk In The Age Of The Customer

Forrester IT

Social media has created customer groups that coalesce around a brand — in effect, a union. They collectively can and will change your corporate policy. With collective bargaining, business as usual is no longer acceptable. Are you ready for the empowered, technically savvy, and motivated customer?

Cloud Adoption: Where Does Your Country Rank?

CEB IT

Cloud computing initially emerged in the United States. Since 2015, the U.S. has been the leader in cloud adoption and has set the pace for such adoption around the world. However, not all countries are on par with the U.S.

Cloud 187

Agile Planning Business Roadmaps, Architecture Standards, and DevOps Releases

Social, Agile and Transformation

Agile planning doesn't end when stories are written, accepted by the team, sized, and ready for development. Story writing is one aspect of agile planning, but it's not the only one. At StarCIO, agile planning is done at several levels depending on the complexity of the requirement.

Agile 155

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Machine learning operations don’t belong with cloudops

David Linthicum

It’s Monday morning, and after a long weekend of system trouble the cloud operations team is discussing what happened. It seems that several systems that were associated with a very advanced, new inventory management system enabled with machine learning had issues over the weekend.

Microsoft finds Russia-backed attacks that exploit IoT devices

Network World

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT -based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday.

VOIP 107

Download 30 Azure eBooks from Microsoft

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Hope this post will help you to learn Azure. You can refer the following table to download 30 Azure eBooks for free. All these eBooks are provided by Microsoft.

eBook 101

Infrastructure Automation Platforms: Coopetition At Its Fiercest

Forrester IT

Why Infrastructure Automation? I used to kid around with my research director, Glenn O’Donnell, that my previous Forrester Wave™ evaluation on configuration management was the “Wave no vendor wanted to be in.” ” The term, while valid, is old.

3 Major Trends Drive the Gartner Hype Cycle for Midsize Enterprises, 2019

CEB IT

Cloud. Machine learning. Edge computing. Internet of Things (IoT). The reality of being a CIO is dealing with the constant influx of new, shiny technologies. .

Trends 162

Micromobility : What does it mean for the future of transportation?

Datacponomy

How will micromobility change the way we travel from point “A” to “B”? How will micromobility co-exist with the traditional models of transportation? What is the importance of network effects in micromobility?

Learn to love legacy systems

David Linthicum

I’ve been corrected more than once. I’ve used the term “legacy system” in meetings and been quickly taken to the woodshed by the language police for saying something that was a clear pejorative. Even here I’ve started saying “traditional system” instead.

System 199

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.

Microsoft VDI Story WVD Concept Setup Guide Myths Known Issues

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I thought of sharing my experience with Windows Virtual Desktop (WVD) in the world of Citrix VDI (Virtual Desktop Infrastructure).

Data Science And Design Collide — There’s A Better Way

Forrester IT

Last August, a tweet from a data scientist reminding colleagues to get out of tables of data and talk to real people — you know, do qualitative research — went viral among these two constituencies.