December, 2019

article thumbnail

What Do CIOs Need To Know About Managing Millennials?

The Accidental Successful CIO

CIOs need to know a few basic things in order to lead millennials Image Credit: ITU Pictures. I’m hoping that we can all agree that the nature of our IT department’s workforce has been changing over the past few years. It sure seems like as importance of information technology grows, the department keeps getting younger and younger and younger. What has been happening is that we have been employing more and more members of the so-called millennial generation.

Firewall 173
article thumbnail

DDoS: An Underestimated Threat

CTOvision

Read why Marc Wilczek says distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers on Dark Reading. On the flip side of the proliferation of Internet of Things (IoT) devices, the quest for increased connectivity and bandwidth (think 5G) and skyrocketing cloud adoption, IT is increasingly being weaponized to […].

Internet 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Just How Much Do Design And Data Science Collaborate?

Forrester IT

What if I told you that less than half of design teams frequently work with analytics or data science employees during an iterative design process? It’s hard to be “dataful” without talking to people who have lots of data (to borrow a phrase from design author John Maeda). Earlier this year, I worked with my […].

Data 229
article thumbnail

My Top Books 2019: Digital Transformation, Entrepreneurship, AI

Social, Agile and Transformation

One of my 2019 new year resolutions was to read more books. I signed up for GoodReads and stated a reading challenge with a modest goal of finishing twelve books. I finished twenty-four, and many of these books are great reads for entrepreneurs, CIOs, and other digital transformation leaders. What makes a good book? My favorites have a strong focus, come from a unique perspective, are easy.

Agile 210
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Learn How to Troubleshoot SCCM Task Sequence Debugger

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, we are going to discuss about a tool Microsoft Endpoint Configuration Manager “Task sequence debugger“ which helps with above challenges. I have presented this topic in “How To Manage Devices” event on 14th Dec. Related Post from Vishal – [link] Introduction Most of the Windows 10 admins who manage task sequence goes […].

How To 218
article thumbnail

Are you eating your brain?

Eric D. Brown

I know — Are you eating your brain? — is a strange title…but stick with me here. I’m listening to an audiobook titled Understanding Complexity by Scott Pag e and heard an interesting bit of trivia about a marine animal called the Sea Squirt. What’s interesting about the sea squirt is the following : …almost as soon as it stops moving, its brain is absorbed by its body.

Exercises 162

More Trending

article thumbnail

The 10 Best Examples Of How Companies Use Artificial Intelligence In Practice

CTOvision

All the world’s tech giants from Alibaba to Amazon are in a race to become the world’s leaders in artificial intelligence (AI). These companies are AI trailblazers and embrace AI to provide next-level products and services. Chinese company Alibaba is the world’s largest e-commerce platform that sells more than Amazon and eBay combined. Artificial intelligence […].

article thumbnail

How To Prove That Fixing Customer Experience Problems Cuts Costs

Forrester IT

There’s an alternative approach to proving the economic value of CX, and it has some advantages: The math is simple and it’s hard to argue against. What’s more, you’ll be measuring something that executives like in good times and love in bad times: cost savings.

How To 413
article thumbnail

Why it's been a Remarkable Pivotal Year for Digital Leaders

Social, Agile and Transformation

What will you remember about 2019? I believe 2019 will go down as a pivotal year for how businesses will continue to invest in technology, data, automation, and customer experience. In 2020 and beyond, more companies will look for digital transformation to drive growth opportunities and expand to new markets, while disruption will increase to those that are lagging.

Data 193
article thumbnail

The Most Asked Questions in 2019 Related to SCCM Intune More

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The top five (5) questions!! Let’s discuss about the most asked questions in 2019 through this post. I keep getting many messages/questions via all social media channels (Twitter, Facebook, LinkedIn, etc.). Let’s check The Top 5 Questions. Join another 16K subscribers What is the latest SCCM (ConfigMgr) Exam?

Windows 216
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The power of relationships in data

All Things Distributed

Have you ever received a call from your bank because they suspected fraudulent activity? Most banks can automatically identify when spending patterns or locations have deviated from the norm and then act immediately. Many times, this happens before victims even noticed that something was off. As a result, the impact of identity theft on a person's bank account and life can be managed before it's even an issue.

Data 162
article thumbnail

Top 5 enterprise technologies of the decade

Tech Republic Cloud

Manufacturing IoT, video conferencing, and cloud computing are just some of the biggest advancements of the decade. Tom Merritt lists the five top enterprise technologies of the 2010s.

article thumbnail

How can attackers abuse artificial intelligence?

CTOvision

Read how the cybercriminals can target artificial intelligence devices on Helpnet Security : But a new report published by the SHERPA consortium – an EU project studying the impact of AI on ethics and human rights – finds that while human attackers have access to machine learning techniques, they currently focus most of their efforts […].

article thumbnail

2020: The Year Of Digital Products

Forrester IT

Is your firm ready for the roaring twenties? Nigel Fenwick predicts the winners in the next decade will be the businesses that master digital product management.

348
348
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

John Cusack Practical Quotes on Strong Digital Leadership

Social, Agile and Transformation

Every once and a while, I draw inspiration from movies and actors/actresses. I have a post paying tribute to the great movie. What about Bob? Baby Steps - A Guide to Digital Transformation. I have another post comparing executive meetings with a classic Darth Vadar scene from The Empire Strike's Back. My two personal favorite movie posts are product management advice from the Tom Hanks movie.

Meeting 173
article thumbnail

New Microsoft Edge Browser Deployment with Intune MEM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Microsoft Edge browser deployment guide using Endpoint Manager Intune. Intune team created an out of box experience to create an Intune application for new edge browser (chromium based) deployment. Related Post Deploy Microsoft Edge Browser with SCCM Endpoint Manager Introduction As per Microsoft, the new chromium based edge browser is the only one browser required […].

Microsoft 207
article thumbnail

Using PowerShell for SQL Backup Verification

Mick's IT Blog

Earlier this year, we had a non-critical SQL server to crash. Come to find out, the backups were successful every night, but the data in the backup was corrupt. Needless to say, the server had to be recreated from scratch. Thankfully it was a non-critical server. We wanted a way to automatically verify SQL backups are valid. Using PowerShell, I wrote the following script that runs RESTORE VERIFYONLY against the latest backup contained in the designated directory.

Backup 142
article thumbnail

Top 5 enterprise technologies of the decade

Tech Republic Cloud

Manufacturing IoT, video conferencing, and cloud computing are just some of the biggest advancements of the decade. Tom Merritt lists the five top enterprise technologies of the 2010s.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DeepMind co-founder Mustafa Suleyman switches to Google

CTOvision

Mustafa Suleyman, the co-founder of British artificial-intelligence firm DeepMind, has announced that he is joining Google. He had previously said he was taking time off from DeepMind. Mr. Suleyman helped develop Streams, a controversial health app which gathered data from millions of NHS patients without direct consent. Streams was integrated into Google Health earlier this year. […].

Google 200
article thumbnail

Make Edge Computing A Key Investment for 2020

Forrester IT

Traditional technologies are no longer addressing the growing needs of modern business, that’s why a massive quantity of tech and telecom vendors, and now a significant amount of enterprises & government agencies are all expanding their investments in Edge Computing for 2020. And why you should do the same. Verizon and Amazon Web Services announced a new partnership on December 3rd, 2019 – 5G […].

article thumbnail

Spearline Podcast | Episode 6: #HereToStay

Spearline Testing

For further information, or if you have any further questions. In this penultimate episode of the first series of the Spearline Podcast, Josh O Farrell-Hurley talks to Lorraine McCarthy about her role as the Chief People and Culture Officer in Spearline, how broadband became a game-changer, helping improve Spearline growth and the #HereToStay initiative in Skibbereen - Home in conjunction with The Ludgate Hub, Skibbereen and O'Donnell Design, providing more recruitment opportunities for West

145
145
article thumbnail

Microsoft Intune Vs Jamf macOS Device Management Enhancements

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see what are the different macOS device management options with Jamf and Microsoft Intune. Andy Cerat & Neil Johnson had a great session in Ignite 2019 and they discussed following topics. Introduction Following are the key messages from Microsoft about macOS device management.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

WMI Query for Dell Manufacture and First Power On Date

Mick's IT Blog

A recent project of mine was to obtain the Dell manufacture and ownership dates from all systems for depreciation and lifecycle purposes. This information is not readily available in SCCM and on the local machines. Luckily, the newest version of Dell Command | Configure now includes the manufacture date and first power on date. The first power on date, as referenced in DCC, is also the Ownership Date in the BIOS, as shown below.

Dell 142
article thumbnail

Cybersecurity in 2020: Eight frightening predictions

Tech Republic Security

Jack Wallen shares cybersecurity predictions that might make your IT skin crawl. Find out what he thinks could be the silver lining to this security nightmare.

Security 153
article thumbnail

Rise of the Internet of Things (IoT)

CTOvision

Read Darren Anstee take a look at how the Internet of Things will fare in 2020 on Tech Radar : They are already here. And they might already have outnumbered us. Their proliferation is breath-taking, with an estimated population reaching 125 billion in the next 10 years. IoT devices are the poster boys of a […].

Internet 200
article thumbnail

Decade Retrospective: Cybersecurity From 2010 To 2019

Forrester IT

The Decade Cyber Went Mainstream Yes, technically, decades begin in years that end in one, but it’s easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn’t work. Devices blew up due to malware or adware, and users got […].

Malware 322
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The VPN is dying, long live zero trust

Network World

The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of digital business. VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside.

article thumbnail

How To Deploy Windows 10 Image Using Microsoft Deployment Toolkit (MDT)

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. This post will help you to manage the deployment of Windows Captured Image & Deploy Windows Image using MDT + SCCM. Let’s learn How To Deploy Windows 10 Image Using Microsoft Deployment Toolkit (MDT) and the same image can be used in SCCM or MECM. In my previous post,described about the working mechanism of Sysprep […].

Windows 181
article thumbnail

Reviewing my map of the 2010s at the end of the decade

Trends in the Living Networks

Ten years ago I released my map of the 2010s , consisting of 14 “ExaTrends” (Exa being the cube of Mega). Click through on the images for the full size pdf. The complete text describing the ExaTrends on pdf is also on the post below the images. What are your thoughts on how well I did at anticipating the decade just past? Overall the themes seem to be pretty accurate, though the pace of some may have been a little off, and among other misses, the key theme of social polarization, whi

Energy 142
article thumbnail

How to install and use Firejail on Linux

Tech Republic Security

Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.

Linux 185
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.