September, 2019

article thumbnail

A new type of DDoS attack can amplify attack strength by more than 15,300%

Tech Republic Security

By abusing a little-known multicast protocol, attackers can launch DDoS attacks of immense power, but there may be an easy fix.

167
167
article thumbnail

Unlocking the Business Value of Cloud

Information Week

Enterprises have been pivoting to the cloud -- attracted by hopes of increased agility, higher service levels and lower cost. Are they getting what they expected?

Cloud 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Companies still unprepared for GDPR rule changes and potential EU data breaches

Tech Republic Security

A new survey finds many companies are still in the dark about GDPR compliance.

Company 151
article thumbnail

Lessons from the Basketball Court for Data Management

Dataconomy

A data management plan in a company is not something that can be implemented in isolation by one department or a team in your organisation, it is rather a collective effort – similar to how different players perform in a basketball court. From the smallest schoolyard to the biggest pro. The post Lessons from the Basketball Court for Data Management appeared first on Dataconomy.

Data 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why smart home devices may be an open invitation to hackers

Tech Republic Data Center

Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.

System 147
article thumbnail

7 principles of modern web application development

mrc's Cup of Joe Blog

Summary: Driven in part by recent trends, web application development has changed over the past few years. Development principles that applied in the past no longer make sense, while new ones have sprung up. In this article, we explore the principles that modern web developers must follow when building successful applications. photo credit: geralt via pixabay cc What makes a “productive developer?”.

More Trending

article thumbnail

How DataOps Can Accelerate Your Data Journey

CTOvision

Read Mike Capone’s article about how data management can help you transform your business on Forbes : The potential for data to transform organizations is huge, but the ability to achieve this potential is continually threatened by the inherent vastness of data and the ever-increasing needs of data consumers. Many organizations are trying unsuccessfully to […].

Data 267
article thumbnail

15 Reasons Why StarCIO Agile Planning Drives Results!

Social, Agile and Transformation

I have been introducing different aspects of StarCIO Agile Planning. Last week I shared how continuous planning is used to deliver solid roadmaps. Prior to that, I posted on how StarCIO Agile Planning drives architecture standards and developing great products! Get the white paper! This week I published a first white paper titled StarCIO Agile Planning: The Missing Practices to Gain.

Agile 170
article thumbnail

7 Tips for Effective Leadership

Kitaboo

A practical, influential, and inspirational leader is an essential need for running a successful business or organization. There is much more to leadership than a high-ranking position and being in charge. In practice, effective leadership is a combination of personal values and practical skills used together to create an atmosphere in which people feel valued and motivated to work towards the attainment of set goals.

Training 166
article thumbnail

Fix Zero Day Patch Missing from SCCM? How to Import into WSUS?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Whenever you have a Zero Day patch and you don’t have the patches in WSUS? What are the options you have as an SCCM admin to patch your Windows 10 devices? How to Fix the issue of latest Zero Day patch missing from SCCM. How to import them into WSUS console manually?

How To 167
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Top desktop as a service (DaaS) providers: Amazon, Citrix, Microsoft, VMware, and more

Tech Republic Cloud

Desktop as a service adoption lags behind on-premise VDI, but the popularity of cloud-hosted desktops is growing. Here's a look at the top DaaS providers and their services.

Vmware 164
article thumbnail

New CEO Pledge Opens A Big Door For EX Improvement

Forrester IT

Last week, Business Roundtable issued new guidance on the role of corporations, as it has periodically since 1978. This revision was significant for employee experience (EX) improvement efforts because, for the first time, employees are included as “important stakeholders” in the language. Each version of that document issued since 1997 has stated that corporations exist […].

315
315
article thumbnail

Samsung Files Patent for ‘Programmable Blockchain Solid State Drive’

CTOvision

Local industry news outlet Decenter reported on Sept. 3 that Samsung applied for the “programmable blockchain solid state drive and switch” patent on Jan. 15 and that it has been published on Feb. 2. Details of the newly designed system are sparse, but it will reportedly be used to improve the speed and lifespan of blockchain-aware […].

Report 239
article thumbnail

Agile Planning: Leverage Customer Feedback and Usage Data

Social, Agile and Transformation

The happy path of agile planning is around breaking down features and releasing them. The required path is to itemize technical debt, business and technical operational needs, and compliance requirements into the plan and ensuring some of this work gets prioritized. But many organizations leave our one crucial element of prioritization. require(["mojo/signup-forms/Loader"], function(L) {.

Agile 143
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Zero Touch Dell Command Update for SCCM and MDT

Mick's IT Blog

I have used the Dell Command | Update in the build for quite some time for managing the drivers on systems because it makes it a hand-off approach with little setup and reliable updates direct from Dell. The one thing I have wanted to be able to rerun this task several times without having to have duplicate tasks in the task sequence. Sometimes there are multiple reboots required because not all drivers can be installed at the same time.

Dell 152
article thumbnail

Windows Autopilot WhiteGlove Provisioning Backend Process- Deep Dive – Post 4

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. This is the last concluding article of the Autopilot series which I started. In my previous articles of this series, I have explained in depth the working details behind Windows Autopilot. If you have not read them yet, I would definitely suggest to give them a read. Let’s see what is Window Autopilot WhiteGlove.

Windows 167
article thumbnail

Small businesses underestimate financial damage of cyberattacks

Tech Republic Security

The average breach causes an average of $149,000 in damages, yet most small-to-medium-sized businesses thought cyberattacks would cost them under $10,000, survey reports.

article thumbnail

Are You Ready For AI And Automation?

Forrester IT

The Future of work is a constellation of innovations that address new or accelerating challenges for companies that aim to be customer-obsessed. High on the list of those innovations are what we can broadly term robots: artificial intelligence, automation, blockchain, other intelligent software, and even physical robots play a key role in changing how we […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The History Making Quantum Computing News We Have Been Anticipating Was Just Announced

CTOvision

Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they […].

IBM 223
article thumbnail

Webinar: Docker and Kubernetes

Association of Information Technology Professional

Join CompTIA Chief Technology Evangelist, Dr. James Stanger to discuss how Docker and Kubernetes operates and how it can help with security issues if used correctly.

Security 130
article thumbnail

To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. This has been particularly true for the area of industrial IoT (IIoT). Connected industrial devices are nothing new, but most IT people aren’t familiar with them because they have been managed by operational technology (OT) teams.

Industry 150
article thumbnail

Windows Autopilot FAQ Clarifying the General Misconceptions Part 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. I have come across many scenarios where people still do not have excellent clarity on what Windows Autopilot is and its purposes. This post is my effort to help clear the general misconceptions regarding Windows Autopilot (Windows Autopilot FAQ) and help people with the underlying blocks and concepts.

Windows 166
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Financial impact of ransomware attacks increasing despite overall decrease in attacks

Tech Republic Security

Vulnerabilities originally discovered by US government security services have been used by cybercriminals against municipalities, costing taxpayers an estimated $11.5 billion in 2019.

Financial 160
article thumbnail

5G In The Manufacturing Sector

Forrester IT

5G and Industrie 4.0 are a very powerful combination. Together, they can lift and shift the manufacturing sector to a much higher level of digitization, in particular by maximizing the mobility, flexibility, and versatility of production. 5G in the industrial manufacturing context offers opportunities beyond factory automation, as it also covers process automation, human/machine interfaces, […].

Mobile 311
article thumbnail

The Worlds Of AI And Blockchain Are Colliding

CTOvision

Nowadays just about everyone understands the importance of data. And when it comes to AI, the more data the better. Data can be an incredibly valuable and powerful tool and it’s growing at an exponential rate. In just the past two years, 90% of the world’s data was created and companies are needing to store […].

Tools 221
article thumbnail

First 53-qubit IBM Q system to roll out at NY Quantum Computation Center

Tech Republic Cloud

IBM's new Quantum Computation Center in Armonk, NY will be home to 14 quantum computers, with cloud-delivered access to enterprises and academia.

IBM 154
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

IoT security essentials: Physical, network, software

Network World

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology. And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.

Security 140
article thumbnail

Windows Autopilot Behind The Scenes Secrets – Admin Side – Part 2

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In my previous post (Autopilot FAQs), I tried to clarify the general misconceptions and give a clear overview of what is Windows Autopilot. This post is a part of a series and continuation to that, where I want to talk about Windows Autopilot Behind the Scenes from the Admin end configuration perspective.

Windows 166
article thumbnail

Exposed RDP servers see 150K brute-force attempts per week: Here's how to protect them

Tech Republic Security

BlueKeep and DejaBlue renewed interest in brute-force scanning for vulnerable systems, which negatively impacts Windows Server performance. Cameyo has solutions to protect your Virtual Desktop server.

Windows 155
article thumbnail

The NSW Government Embarks On A Bold Journey To Improve Customer Experience (CX)

Forrester IT

Weak Government CX Harms Mission Performance As customer expectations keep rising, governments around the world struggle to improve customer experience (CX). In 2018, Australian government customer experience was weak compared to the private sector — mirroring what we see in the US, where most federal agencies had scores that were poor or very poor.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.