August, 2019

article thumbnail

Get ready for the convergence of IT and OT networking and security

Network World

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and security.

Network 134
article thumbnail

Don’t worry about shadow IT. Shadow IoT is much worse.

Network World

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface. That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation.

Agile 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Alternative Data Meets Fintech: Tweets, Parking Lot Pictures and Criminal Take-downs

Dataconomy

In an increasingly competitive market, how are fintech companies adapting to improve their decision making? In industries such as insurance, capital markets, cryptocurrency, wealth and asset management — alternative data is proving to be a valuable source of insight. Like a broken leaf to a hunter or a change of. The post Alternative Data Meets Fintech: Tweets, Parking Lot Pictures and Criminal Take-downs appeared first on Dataconomy.

Meeting 75
article thumbnail

US Tech Spending Slowdown Amidst Rising Cloud Adoption Will Squeeze Tech Budgets

Forrester IT

Recent stock and bond market turmoil has highlighted the growing risk of a US economic slowdown and even a recession — a prospect that 74% of economists think will happen by 2021, according to a survey of US economists by the National Association of Business Economists. We at Forrester are not quite as pessimistic. But […].

Budget 287
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Top 5 IoT networking security mistakes

Network World

Even though Brother International is a supplier of many IT products, from machine tools to head-mounted displays to industrial sewing machines , it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things. That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations.

Security 150
article thumbnail

Potential Malicious Use Of IT By NASA Astronaut While On Orbit: Thought provoking but probably not hacking

CTOvision

Have you been numbed by constant reports of breaches? They get old for sure, especially since so many have at their core common issues that could have been avoided by application of best practices. Now here is an interesting/new story: A NASA astronaut is accused of hacking her estranged spouse’s bank account from space I […].

Banking 270

More Trending

article thumbnail

SCCM OneTrace Log Viewer to Replace CMTrace

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s check the new SCCM log viewer in SCCM called Onetrace. Also, let’s check out whether it can replace CMTrace. Learn about the user experience of Onetrace? You will see in this post. More details SCCM Onetrace in the below section. Introduction Microsoft announced a new log reader tool for SCCM admins with the SCCM […].

Microsoft 168
article thumbnail

Modern applications at AWS

All Things Distributed

Innovation has always been part of the Amazon DNA, but about 20 years ago, we went through a radical transformation with the goal of making our iterative process—" invent, launch, reinvent, relaunch, start over, rinse, repeat, again and again "—even faster. The changes we made affected both how we built applications and how we organized our company.

article thumbnail

Channel Marketers Need To Become Community Marketers – Here’s How

Forrester IT

A lot has changed in the 25+ years I have spent in the technology channel. New technologies, partner business models, shifting demographics, expanding communication vehicles, and most recently, new technology buyers with different psychology, behavior, and journey have created a whirlwind of change for vendors, distributors, and partners alike. The one constant is the […].

Strategy 419
article thumbnail

Agile Planning Business Roadmaps, Architecture Standards, and DevOps Releases

Social, Agile and Transformation

Agile planning doesn't end when stories are written, accepted by the team, sized, and ready for development. Story writing is one aspect of agile planning, but it's not the only one. At StarCIO, agile planning is done at several levels depending on the complexity of the requirement. require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl":"mc.us14.list-manage.

Agile 142
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Microsoft finds Russia-backed attacks that exploit IoT devices

Network World

The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT -based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday. Microsoft said in a blog that the attack, which it discovered in April, targeted three specific IoT devices – a VoIP phone, a video decoder and a printer (the company declined to specify the brands) –

Microsoft 153
article thumbnail

Getting IT Certifications and Help Desk Experience with an Apprenticeship

Association of Information Technology Professional

The students running the IT help desk at Christian Brothers High School weren’t necessarily the school’s techiest. But a new apprenticeship program gave them a life-changing opportunity to get hands-on experience … and IT certifications.

article thumbnail

Download 30 Azure eBooks from Microsoft

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Hope this post will help you to learn Azure. You can refer the following table to download 30 Azure eBooks for free. All these eBooks are provided by Microsoft. Check out the following section to Download 30 Azure eBooks. Introduction Let’s check some details about Azure architecture from Mark Russinovich!

eBook 168
article thumbnail

Enterprises Put More Data Infrastructure in the Cloud

Information Week

More enterprises are putting their data operations in the cloud, a trend that will continue as AI, machine learning, and other analytics efforts accelerate.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Infrastructure Automation Platforms: Coopetition At Its Fiercest

Forrester IT

Why Infrastructure Automation? I used to kid around with my research director, Glenn O’Donnell, that my previous Forrester Wave™ evaluation on configuration management was the “Wave no vendor wanted to be in.” The term, while valid, is old. Further, configuration management is one part of a larger infrastructure automation story. This led to an interesting […].

Research 382
article thumbnail

Developing great products with StarCIO Agile Planning

Social, Agile and Transformation

Writing user stories was once a relatively straightforward exercise. Product owners wrote stories in customer-centric language defining why, what, and for whom the story was being implemented. The goal was, and still is, to establish a shared understanding of the requirements with the agile development team without overly specifying how the story should be implemented.

Agile 135
article thumbnail

How to Use Digital Textbooks in the Classroom

Kitaboo

The use of digital textbooks in classrooms is growing in the face of the easy availability of smartphones and the Internet. The interactive features that form part of digital textbooks have captured the attention of both students and teachers, providing the former a more engaging and immersive experience and allowing the latter easy access to online resources to supplement their teaching.

How To 137
article thumbnail

Worth the Hype? Experts Weigh In on Overrated and Underrated Tech Trends

Association of Information Technology Professional

On a recent episode of Volley, Dave Sobel, senior director of MSP evangelism, SolarWinds, discussed a tech trend that is overrated—the branding around digital transformation—and a trend that is underrated—the attention paid to digital rights and privacy in the age of data.

Trends 148
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SCCM CMG Schema Workflow Scenarios – Part 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. SCCM Cloud management gateway (CMG) is an Azure service (PAAS) to manage SCCM client over the internet. We can say CMG is an SCCM Management point in Cloud. SCCM CMG helps to reduce SCCM infrastructure complexity and cost. CMG also open up different scenarios for modern device management.

article thumbnail

Voice Assistants Bring AI to the Workplace

Information Week

More enterprise organizations are experimenting with AI-based voice assistants to boost internal efficiencies, but it will be a while before they realize the ROI they seek.

article thumbnail

Asia Pacific To Drive Global Social Ad Spend In The Next Five Years

Forrester IT

Forrester expects global social advertising spend to reach $165.6 billion in 2023, up from $75 billion in 2018 — a CAGR of 17.1%. Asia Pacific and the rest of world will grow fastest, capturing the US and Europe’s share of global social advertising spend. Asia Pacific’s share of global spend will increase from 30% in […].

Social 375
article thumbnail

MDT: How to initiate a reboot during a task without corrupting the task sequence

Mick's IT Blog

Recently, I have been working on updating several scripts I have written for the build process. One big thing I have wanted is for the script to be able to initiate a reboot without the build process becoming corrupt. An additional functionality I have wanted to implement is to be able to restart the task sequence at the same point it left off before the reboot.

How To 125
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Top 10 Sales Enablement Tools to Empower your Sales Force

Kitaboo

What is a Sales Enablement Tool? A sales enablement tool/ platform provides your sales force with all the resources they need to engage with prospective buyers and increase the chances of a sale. A sales enablement tool should provide useful information that will expedite the sales process and result in positive outcomes, which is, converting a prospect to a client.

Tools 128
article thumbnail

Video: How IT Certifications Advance Careers | Road to ChannelCon

Association of Information Technology Professional

IT pros and students shared firsthand how IT training and certifications help them get into IT, perform well on the job and best serve their customers.

Video 148
article thumbnail

Microsoft VDI Story WVD Concept Setup Guide Myths Known Issues

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. I thought of sharing my experience with Windows Virtual Desktop (WVD) in the world of Citrix VDI (Virtual Desktop Infrastructure). I will also cover the WVD SCCM and Intune support, WVD Setup, WVD known issues, and WVD myths in this post. Introduction Windows Virtual Desktop (WVD) is a new VDI offering from Microsoft.

Microsoft 167
article thumbnail

Is SD-WAN a Better Bet for Unified Communications?

Information Week

As momentum continues to build for managed services with SD-WAN, providers try to make the case to migrate communications to these networks.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Embed AI in your digital supply chain to win, serve, and retain customers

Forrester IT

It’s now just over 12 months since we first published research on Digital Supply Chain. Some Forrester clients have made progress with Integrated Business Planning and with Control Towers. And they are on the lookout for Blockchain opportunities. But the most common question we hear, is about the role of AI in Supply Chain. The […].

Research 356
article thumbnail

Extract SCCM WIM from ISO and Configure for WDS via PowerShell

Mick's IT Blog

One issue, more like a time-waster, I have had as we are migrating to SCCM from MDT is getting the boot image on the WDS server. SCCM is not configured to manage WDS because we use it for other things, so we manually upload the WIM. SCCM creates an ISO that needs to be mounted to extract the WIM for WDS. Thanks to this blog post , it is explained. I wanted the steps automated, so I wrote the following PowerShell script that will perform all of the steps needed to extract and configure the WIM.

Windows 123
article thumbnail

How to Create and Deliver Cost Effective Remote Training

Kitaboo

You must at some point have sat through a conference or a video call where you struggled with getting the screen connected, or the audio wasn’t clear, with frequent interruptions from your or the other end like “your voice is breaking off”, or “the screen went black, we can’t see you”. Typically, around 10-15 minutes are then lost in fixing the issue, with wires being pulled and pushed to check if they are properly connected, opening and closing tabs, reconnecting the session etc.

Training 125
article thumbnail

How to Prepare for, and Survive, Hurricane Dorian

Association of Information Technology Professional

Hurricane Dorian could strengthen from a Category 2 hurricane to a Category 4 hurricane over the weekend and will threaten parts of the Bahamas and the southeastern U.S. over Labor Day weekend. Mike Semel of Semel Consulting shares valuable resources to prepare for a hurricane.

How To 130
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.