January, 2018

Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware

CTOvision

As we usher in the new year of 2018, we are confronted with an ever-expanding network-borne threat landscape especially from ransomware. Ransomware is a type of malicious software which is used by malicious actors to encrypt systems or data. When the ransom is paid the key is in some cases provided to unlock the data. […].

Lack of cloud skills and training begin to take a toll

David Linthicum

According to a recent report by cloud and datcenter vendor Rackspace, “Nearly three quarters of IT decision-makers (71 percent) believe their organizations have lost revenue due to a lack of cloud expertise. On average, this accounts for 5 percent of total global revenue, or $258,188,279 per organization.” That’s a pretty good hunk of cheddar! This is a real issue and it’s starting to get noticed by enterprises leadership, and even by the stockholders. What is cloud computing?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Interview Questions To Determine Whether the Candidate Shares Your Company’s Core Values

Computer Weekly

When Tony Hsieh, CEO of Zappos, was just out of college, he sold his first company to Microsoft for $265 million. But for him, the sale wasn’t about money—he was actually most concerned about the company culture he had created. “I I just didn’t look forward to going to the office.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Call for entries: 2018 Building Team Awards

Eric D. Brown

Building Design+Construction's Building Team Awards recognize newly built (opened or occupied January 1, 2017 or later) projects that best exemplify the collaboration between owner, architect, engineer, and contractor to produce buildings that exhibit architectural and construction excellence.

Meltdown and Spectre Vulnerability Fixes Have Started, But Don't Solve Everything

The Investing Edge

Meltdown and Spectre Fixes Arrive—But Don't Solve Everything. Security

More Trending

No, edge computing will not replace cloud computing

David Linthicum

The press is still having a field day with this relatively new tech term edge computing , and how it will soon displace cloud computing. I’ve seen more a half dozen articles in just the last two months that advancing the perception that edge computing will displace, not complement, cloud computing.

Cloud 239

4 Ways AI Will Improve the Way You Work

Computer Weekly

When AI springs to mind, you can’t help but think of the endless possibilities it could bring. With machine learning, robotics, and more, breaking new grounds year after year. It’s exciting to think where we could be by 2030.

Future of SCCM ConfigMgr Intune Admin Jobs

Anoop

I keep getting questions about the future of SCCM Intune admin jobs. I got the similar questions during the last BITPro event. So I thought of writing about the SCCM job opportunities in future.

"We are more successful onboarding new technology versus maturing it" - And five things CIO must do to drive digital platforms

Social, Agile and Transformation

I was speaking with a few CIOs at the SINC USA West conference in Scottsdale late last year on the state of managing digital technology in their organizations. One CIO told me, "We are more successful onboarding new technology versus maturing it." Here's the logic behind his thinking and why this is a real issue for organizations investing in digital platforms When a new technology is. cio cmo digital transformation innovation organizational change

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Mac Vs. PC: Which is Better for Your Business?

CTOvision

The debate about Mac vs. PC has been around for quite some time and may not end anytime soon. Some users prefer the Mac because of its elegant and sleek design, intuitive interface, and reliable security. On the other hand, PCs attract a large fan base because they are versatile, readily available, and affordable. Typically, […].

4 surprise cloud computing trends for 2018

David Linthicum

First of all, I hate doing yearly predictions. Also, this is the time of year that every PR firm in the country asks me to read the cloud computing predictions of their clients, which are all pretty much wrong and self-serving. So, I’ve put together four cloud predictions for 2018 that you won’t see coming but that should help shape your cloud strategy for the new year. Learn all about the cloud at InfoWorld. Start with the basics: What is cloud computing? Everything you need to know now.

Trends 237

Beware fake Meltdown and Spectre patches

Computer Weekly

Security experts have warned that cyber attackers will be quick to use the Meltdown and Spectre exploits, but the first attempt to capitalise on them has come in the form of fake updates

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Are your machine learning models good enough?

Eric D. Brown

Imagine you’re the CEO of XYZ Widget company. Your Chief Marketing Officer (CMO), Chief Data Officer (CDO) and Chief Operations Officer (COO) just finished their quarterly presentations and were highlighting the success from the various machine learning projects that have been in the works.

Budget 163

SCCM Status Summarizers and Health Monitoring Details

Anoop

SCCM ConfigMgr CB health monitoring connected well with SCCM Status Summarizers. All the monitoring solutions like custom scripts and SCOM management pack for SCCM are using SCCM Status Summarizers to get the detailed health status of your SCCM infra.

The moving target of IoT security

Network World

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure and is much more likely to be made up of hardware and software from different sources.

Intel 128

Vulnerabilities In Almost Every Chip: “Could Something Like This Really happen?”

CTOvision

I've been tracking computer security issues, including vulnerabilities for decades, and have never seen anything quite like this. Newly announced vulnerabilities, which were publicly disclosed by the Register on Tuesday, are in almost every modern computer chip. The vulnerability cannot be changed in hardware of course (you would have to buy new hardware that is designed differently), […]. CTO Cyber Security News

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Don’t fall for the ‘pluggable cloud’ siren call

David Linthicum

People once made requests for hybrid cloud because of the perception of flexibility. Now they make multicloud requests, for the same reasons. Multicloud is just part of a cloud architecture that uses more than two clouds, private and/or public. However, most multicloud deployments involve more than two public clouds, typically AWS, Microsoft, and sometimes one other, such as Google.

Computer science is fastest-growing subject for undergraduates

Computer Weekly

Computer science is the fastest-growing subject for undergraduate intake in UK universities, according to 2017 statistics

199
199

Agile Marketing Based on Analytical Data Insights: Improving Scrum Tactics in Brand Outreach

Eric D. Brown

This post is written by Mathias Lanni (Executive VP, Marketing – Velocidi). Agile management and scrum-style techniques have long been accepted in fields of technology development, but have been increasingly adopted outside the tech industry over the years.

SCRUM 151

SCCM Intune Windows 10 Hands On Labs Training for IT Admins

Anoop

Acquire the SCCM, Intune, Windows 10, and Azure cloud skills at your own pace.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

TheFatRat and BeEF – Pre and Post Exploitation Method

Doctor Chaos

A few weeks ago, I wrote about TheFatRat remote post exploit tool. The blog was primarily a guide to installing it and performing some basic functions. This article will go a little deeper. We’re going to explore the entire attack life cycle… how a victim may potentially be infected and what an attacker could do […]. Tools hacking metasploit RAT tools

Tools 122

Big Data’s Impact on Advertising

CTOvision

Big data is a megatrend, and one that has bulldozed its way into a variety of industries and causes. It’s not just a small chain of disruptions, but rather a complete evolution. Healthcare, aviation, education and job training are all excellent examples of how big data is changing the current landscape. Healthcare, in particular, will […]. Big Data CTO Cyber Security News

Enterprise IoT threatens to undermine cloud and IT security

David Linthicum

The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption. How did this happen? Well, for example, as thermostats and sensor fail in buildings’ HVAC systems, they are often replaced with smart devices, which can process information at the device.

Why GDPR is great for SMEs

Computer Weekly

SME laggards facing potential fines for non-compliance should wake up and smell the tasty carrot of a leaner, smarter business post-GDPR

193
193

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Why You Need Python Machine Learning to Build a Recommendation System

Datacponomy

Recommendation systems are ever-present in our lives today. The largest web giants – such as Google, Facebook and Amazon – use algorithms to help you find search results most relevant to you, based on your previous searches and similar data from other users.

System 171

2018 state of resilience: The pressure is on

Network World

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.

CIOs Struggle To Deal With The Challenge Of Doxing

The Accidental Successful CIO

Your emails are safe from prying eyes, aren’t they? Image Credit: AJC1.As CIO, we are aware of the importance of information technology and all of the threats that our firms are facing on an almost daily basis.

Budget 163

Which Technologies Will Help Usher in Big Data?

CTOvision

Big Data and Technology Become Intertwined The technology revolution has arrived and it is only going to grow and grow. When Gutenberg invented the printing press, the dissemination of information grew at an incredible rate. Equally important was the printing press’ ability to store information. Informational repositories can be tapped for many additional uses. Big […]. Big Data big data

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.