January, 2021

10 CIO Resolutions for 2021

CEB IT

In January of 2020, New Year’s resolutions could not have taken into account the rollercoaster of events that year would bring.

SAP 289

Top IT Skills in Demand in 2021

CompTIA on Cybersecurity

2021 will be a challenging but exciting year for IT pros. Here are the top skills in demand they will need in order to gain ground in their career

108
108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

CIOs to Accelerate Digital Business Transformation in 2021

Information Week

With 2020 in the rearview mirror, finally, CIOs are looking at bigger budgets and an acceleration in their digital transformations

Mind the (skills) gap: Cybersecurity talent pool must expand to take advantage of quantum computing opportunities

CTOvision

The “second age” of quantum computing is poised to bring a wealth of new opportunities to the cybersecurity industry – but in order to take full advantage of these benefits, […]. News QuintessenceLabs

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrators that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

Tech Trends and Your IT Career: How to Level Up in 2021

Association of Information Technology Professional

2021 will offer many opportunities for you to advance your IT career and gain new IT skills. Set yourself up for success with these tech tips

Trends 278

The Proper Way to Watch Star Wars

Doctor Chaos

Many of us have stress in our lives. We have our jobs to worry about, we need to think about our retirement, and we have to figure out what the health care law means to us. However, a few of us know there are more immediate concerns that must be dealt with.

153
153

More Trending

Automating the Deletion of Windows.old

Mick's IT Blog

It is the beginning of 2021 and my first project for the new year is upgrading all systems to Windows 10 20H2. At the end of the upgrades comes the cleanup and there is no clean way to do this for system admins. Cleanmgr.exe is now deprecated as of Windows 10 2004.

Digital Transformation: How Leaders Can Stand Out

Information Week

Here are three things leaders in digital transformation are doing to set themselves ahead of the competition in 2021 and beyond

170
170

Palo Alto: You think you’re prepared for the next SolarWinds? You Are Not!

CTOvision

Instead of winding down at the end of the year, already strapped security teams were scrambling over the last week to ensure their organizations are safe in the wake of […]. News Palo Alto Networks SolarWinds

How to Get a CompTIA A+ Certification

Association of Information Technology Professional

Find out how to get a CompTIA A+ certification. Get a CompTIA A+ certification and start your IT career today

How To 270

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

Beware of the Surge in Covid-19 Vaccine Phishing Scams

Doctor Chaos

As the world makes steady progress towards ending the pandemic, the road ahead is still a long one. Previously unforeseen obstacles can pop up at any time and skew the trajectory of how the world handles Covid-19. One obstacle, in particular, that is on the rise currently is phishing scams.

Combine, Cluster, Complement: 3 Fundamentals of Combinatorial Digital Innovation

CEB IT

The digital industrial revolution has changed the world in profound ways — and it’s far from over. A global digital society infrastructure continues to expand, fueled by increasing digitalization of data, ubiquitous connectivity, decreasing computing costs and readily available storage.

Trends 268

Cisco tags critical security holes in SD-WAN software

Network World

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio.

WAN 137

Why DevOps Will Have To Change This Year

Information Week

Rocked by COVID in 2020, DevOps teams will face new challenges -- and opportunities -- over the next 12 months. Here's a look at what to expect

Devops 171

Deliver Effective Online Education and Events Your Members Will Love

This guide identifies the biggest challenges for associations moving their training online and provides practical solutions so that you can hit the ground running. Download now to keep your members engaged and growing even in times of COVID-19.

RiskIQ CEO on the SolarWinds Attack: ‘This Hit the Security Community Hard’

CTOvision

The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ. “The […]. News RiskIQ SolarWinds

Most Popular IT Certifications for 2021

Association of Information Technology Professional

You know the value of IT certification. But do you know which ones will get you where you want to go? These are the most popular certifications

229
229

3 Digital Transformation Strategies in SMB

Social, Agile and Transformation

Digital transformation requires leaders to reconsider their business models in the face of market disruptions, changing customer needs, new technology capabilities, greater security threats, and new opportunities to empower a digital workforce.

SMB 192

5 Key Predictions for Identity and Access Management and Fraud Detection

CEB IT

Security and risk management leaders are experiencing widespread disruption in identity and access management (IAM) solutions for many reasons, most notably because of the increased drive to customer-facing interactions on digital channels and the sudden and rapid expansion of the remote workforce because of the pandemic.

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

LISP Multihop Extended Subnet Mode

Doctor Chaos

(This blog posting was written with the understanding that the reader already understands how standard LISP operates from a control and data plane perspective.). Overview.

Are No Code and Low Code Answers to the Dev Talent Gap?

Information Week

An expected escalation of low-code app development might mean more IT duties could be shifted to citizen developers

Learning From Leaders: The OODA Loop Member Profile Series

CTOvision

One of my great joys of being the CTO at OODA is being able to continuously learn from a community that includes our own analysts and researchers but also a […].

Fortifying Your Cloud: Mitigation Techniques for Cloud Security Flaws

Association of Information Technology Professional

To benefit from the cloud, you must be able to anticipate these common security flaws and know how to mitigate them

Cloud 209

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Gartner: The future of AI is not as rosy as some might think

Tech Republic Security

A Gartner report predicts that the second-order consequences of widespread AI will have massive societal impacts, to the point of making us unsure if and when we can trust our own eyes

Report 171

How to Respond to a Supply Chain Attack

CEB IT

In late December, software company SolarWinds became aware of a supply chain attack on one of its software systems. The attackers added malware to signed versions of the supplier’s software, which was then used to infiltrate 18,000 private government and private organizations.

How To 217

ConfigMgr 2010 Known Issues Fixes | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will learn more about ConfigMgr 2010 known issues. The production version of 2006 is generally available. Let’s understand the fixes already issued for SCCM 2010.

How To 169

10 Things IT Leaders Learned in 2020

Information Week

The pandemic had a lot of negative effects, but it also resulted in some unexpected benefits for enterprise technology leaders and teams

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Insights From Palantir’s Live Demo Day 2021

CTOvision

Editor’s note: We frequently encounter people who think of Palantir as a high end analytical tool. It certainly transforms and improves analysis. But for years Palantir has been doing far […]. CTO News Palantir

The Best UK City for IT Pros to Work and Live (It's Not London!)

Association of Information Technology Professional

Finding the best city for you is about more than a job. Learn how growth, cost of living and lifestyle contribute to the best UK cities for IT pros

179
179

SolarWinds attack: Cybersecurity experts share lessons learned and how to protect your business

Tech Republic Security

The highly sophisticated SolarWinds attack was designed to circumvent threat detection—and it did, for much too long. Two cybersecurity experts share some valuable lessons learned from the attack

How To 170

The 4 Pillars of Privileged Access Management

CEB IT

No matter how good the features and functionalities of a privileged access management (PAM) tool are, they can never replace the need for a comprehensive PAM vision.

Tools 204

What is Contextual Analytics? The Next Evolution of Embedded Analytics

Download this whitepaper to learn what contextual analytics is, how BI platforms like Yellowfin revolutionize the way users discover insights from their data with native contextual analytics, and how it adds value to your software solution by elevating the user experience.