January, 2018

Meltdown and Spectre Vulnerability Fixes Have Started, But Don't Solve Everything

The Investing Edge

Meltdown and Spectre Fixes Arrive—But Don't Solve Everything. Security

Lack of cloud skills and training begin to take a toll

David Linthicum

According to a recent report by cloud and datcenter vendor Rackspace, “Nearly three quarters of IT decision-makers (71 percent) believe their organizations have lost revenue due to a lack of cloud expertise. On average, this accounts for 5 percent of total global revenue, or $258,188,279 per organization.” That’s a pretty good hunk of cheddar! This is a real issue and it’s starting to get noticed by enterprises leadership, and even by the stockholders. What is cloud computing?

5 Interview Questions To Determine Whether the Candidate Shares Your Company’s Core Values

Computer Weekly

When Tony Hsieh, CEO of Zappos, was just out of college, he sold his first company to Microsoft for $265 million. But for him, the sale wasn’t about money—he was actually most concerned about the company culture he had created. “I I just didn’t look forward to going to the office.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Call for entries: 2018 Building Team Awards

Eric D. Brown

Building Design+Construction's Building Team Awards recognize newly built (opened or occupied January 1, 2017 or later) projects that best exemplify the collaboration between owner, architect, engineer, and contractor to produce buildings that exhibit architectural and construction excellence.

More Trending

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

No, edge computing will not replace cloud computing

David Linthicum

The press is still having a field day with this relatively new tech term edge computing , and how it will soon displace cloud computing. I’ve seen more a half dozen articles in just the last two months that advancing the perception that edge computing will displace, not complement, cloud computing.

Cloud 218

4 Ways AI Will Improve the Way You Work

Computer Weekly

When AI springs to mind, you can’t help but think of the endless possibilities it could bring. With machine learning, robotics, and more, breaking new grounds year after year. It’s exciting to think where we could be by 2030.

"We are more successful onboarding new technology versus maturing it" - And five things CIO must do to drive digital platforms

Social, Agile and Transformation

I was speaking with a few CIOs at the SINC USA West conference in Scottsdale late last year on the state of managing digital technology in their organizations. One CIO told me, "We are more successful onboarding new technology versus maturing it." Here's the logic behind his thinking and why this is a real issue for organizations investing in digital platforms When a new technology is. cio cmo digital transformation innovation organizational change

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Are your machine learning models good enough?

Eric D. Brown

Imagine you’re the CEO of XYZ Widget company. Your Chief Marketing Officer (CMO), Chief Data Officer (CDO) and Chief Operations Officer (COO) just finished their quarterly presentations and were highlighting the success from the various machine learning projects that have been in the works.

Budget 161

How the Internet of Things is Influencing a New Cybersecurity Era

CTOvision

Cybersecurity is the new chief concern for every organization. Recent global attacks like Wannacry and NotPetya have proved that hackers aren’t sparing any institution in their latest show of might. Most companies have thus resulted in the internet of things, and it's cybersecurity features to help keep their digital assets safe. But does IoT offer […]. Artificial Intelligence Cyber Security News

How to Raise Your Series A

The Investing Edge

Early stage investing has remained exciting and seen healthy, even increasing , capital flows since 2010. While it is defined differently by different venture industry participants, at Ascent, we separate angel and seed into a separate category that comes before the early stage.

B2B 130

4 surprise cloud computing trends for 2018

David Linthicum

First of all, I hate doing yearly predictions. Also, this is the time of year that every PR firm in the country asks me to read the cloud computing predictions of their clients, which are all pretty much wrong and self-serving. So, I’ve put together four cloud predictions for 2018 that you won’t see coming but that should help shape your cloud strategy for the new year. Learn all about the cloud at InfoWorld. Start with the basics: What is cloud computing? Everything you need to know now.

Trends 213

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Beware fake Meltdown and Spectre patches

Computer Weekly

Security experts have warned that cyber attackers will be quick to use the Meltdown and Spectre exploits, but the first attempt to capitalise on them has come in the form of fake updates

TheFatRat and BeEF – Pre and Post Exploitation Method

Doctor Chaos

A few weeks ago, I wrote about TheFatRat remote post exploit tool. The blog was primarily a guide to installing it and performing some basic functions. This article will go a little deeper. We’re going to explore the entire attack life cycle… how a victim may potentially be infected and what an attacker could do […]. Tools hacking metasploit RAT tools

Tools 122

Agile Marketing Based on Analytical Data Insights: Improving Scrum Tactics in Brand Outreach

Eric D. Brown

This post is written by Mathias Lanni (Executive VP, Marketing – Velocidi). Agile management and scrum-style techniques have long been accepted in fields of technology development, but have been increasingly adopted outside the tech industry over the years.

SCRUM 151

Mac Vs. PC: Which is Better for Your Business?

CTOvision

The debate about Mac vs. PC has been around for quite some time and may not end anytime soon. Some users prefer the Mac because of its elegant and sleek design, intuitive interface, and reliable security. On the other hand, PCs attract a large fan base because they are versatile, readily available, and affordable. Typically, […].

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Excited to be working with Connected2Fiber

The Investing Edge

Boston-based Connected2Fiber just announced a new round of funding , which we lead along with Osage Ventures and existing investors Nauta Capital and NXT Ventures. So why did we invest?

Don’t fall for the ‘pluggable cloud’ siren call

David Linthicum

People once made requests for hybrid cloud because of the perception of flexibility. Now they make multicloud requests, for the same reasons. Multicloud is just part of a cloud architecture that uses more than two clouds, private and/or public. However, most multicloud deployments involve more than two public clouds, typically AWS, Microsoft, and sometimes one other, such as Google.

Computer science is fastest-growing subject for undergraduates

Computer Weekly

Computer science is the fastest-growing subject for undergraduate intake in UK universities, according to 2017 statistics

200
200

CIOs Struggle To Deal With The Challenge Of Doxing

The Accidental Successful CIO

Your emails are safe from prying eyes, aren’t they? Image Credit: AJC1.As CIO, we are aware of the importance of information technology and all of the threats that our firms are facing on an almost daily basis.

Budget 163

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Taking Back Ownership of Your Data

Datacponomy

The internet has long been a consummate environment for collecting immense amounts of data from large swathes of the population. With the increased use of cookies and other data mining tools, the internet is, essentially, a bottomless trove of useful data.

Vulnerabilities In Almost Every Chip: “Could Something Like This Really happen?”

CTOvision

I've been tracking computer security issues, including vulnerabilities for decades, and have never seen anything quite like this. Newly announced vulnerabilities, which were publicly disclosed by the Register on Tuesday, are in almost every modern computer chip. The vulnerability cannot be changed in hardware of course (you would have to buy new hardware that is designed differently), […]. CTO Cyber Security News

Future of SCCM ConfigMgr Intune Admin Jobs

Anoop

I keep getting questions about the future of SCCM Intune admin jobs. I got the similar questions during the last BITPro event. So I thought of writing about the SCCM job opportunities in future.

Why you should not worry about cross-tenant cloud attacks

David Linthicum

We’ve all heard the concerns: While public clouds do a good job protecting our cloud-based systems from outside attackers, what about attacks that may come from other public cloud users? These are known as cross-tenant attacks (sometimes called side-channel attacks ), where other tenants on the same public cloud somehow access your data. Should you pay more attention to this fear? No, you should not pay more attention to cross-tenant attack fears. Here’s why. What is cloud computing?

Cloud 210

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.