October, 2019

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. Yet, the stories of these breaches are often framed with vague explanations — a “misconfigured database” or mismanagement by an unnamed “third party.”. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services.

Cloud architecture that avoids risk and complexity

David Linthicum

One of the truisms about cloud architecture is that there are typically 100x100 architecture solution patterns. They all work, but only one is the right solution. If your head is swimming, let me explain. Indeed, many technology stacks and approaches will solve the same problems using cloud-based technologies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

7 Required DevOps Practices Before Increasing Deployment Frequencies

Social, Agile and Transformation

In my last post, I shared 7 Prerequisites on Whether to Improve Deployment Frequencies with DevOps. I firmly believe that CI/CD is not enough to support stable releases and also shared 5 pre-deployment priorities for Agile DevOps teams.

Devops 185

Fend off the increasing container attacks in the cloud

David Linthicum

The computer security company Skybox Security released an update to its 2019 Vulnerability and Threat Trends report. As the name implies, this report analyzes the computer vulnerabilities in play during the first half of 2019. Some of the key findings included the rapid growth of vulnerabilities in cloud containers.

Linux 263

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

The Reality of Blockchain

CEB IT

Generally, anyone looking to open a restaurant would need to go to various government agencies to obtain the required certifications. For example, the owners may need a health certification, worker’s comp certification or a liquor license depending on the type of establishment.

Consumer data might be the new oil, but who gets to decide how it’s used?

Datacponomy

From the Cambridge Analytica scandal to GDPR and data breach headlines, the idea that consumers should know how their data is used is gaining traction with governments and consumer groups. What does this trend mean for companies that rely on consumer data for their business model?

More Trending

Can microsegmentation help IoT security?

Network World

The Internet of Things ( IoT ) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and better customer services. The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives.

What To Do If Your Data Was Breached

CTOvision

Read Nicole Martin explain what you can do if your data was breached on Forbes : Data breaches seem to be everywhere in today’s society. Just this week it was announced that a massive data breach exposed sensitive data of nearly every individual in Ecuador. The breach impacted an estimated 20 million people, 6.7 million […].

Data 183

Predictions 2020: For CX, It’s All About Proving Business Results

Forrester IT

The ability to deliver business results will be a career-defining issue in the year ahead. age of the customer customer experience prediction promoted

425
425

Gartner Top Strategic Predictions for 2020 and Beyond

CEB IT

In Japan, one restaurant is exploring artificial intelligence (AI) robotics technology to enable paralyzed employees to remotely pilot robotic waiters. JPMorgan Chase, Microsoft and Ford are hosting virtual career fairs tailored to the needs of neurodiverse candidates.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Be prepared for microservices challenges

David Linthicum

Last week I wrote about how containers are becoming popular attack targets both inside and outside of a public cloud. This week let’s drill down on a common byproduct of containers: microservices. Microservices is both an architecture and a way of deploying applications. Indeed, microservices is a term used to describe the practice of breaking up an application, within a container or not, into a series of smaller specialized parts.

The Legacy of Go

SPF13

This presentation was developed for GoLab in Firenze Italy and delivered as the closing keynote of the conference. The presentation talks about legacy, looking both backwards and forwards. It talks about the legacy of langauage Go inherited and how it is paying respect to that legacy. It concludes talking about the legacy Go hopes to leave behind

SCCM Orchestration Group Setup Step by Step Guide for Server Patching

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Microsoft recently released SCCM 1909 version of technical preview. Let’s check what SCCM Orchestration Group (controlled patching) setup guide is.

Groups 162

A data breach could be game over for a brand

CTOvision

Data security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more concerned about protecting their personal information than they were one year ago.

Survey 265

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Predictions 2020: B2B Marketers Pivot From Products To Experiences

Forrester IT

Learn why experience will be the gift that keeps on giving for B2B marketing and sales. age of the customer B2B marketing prediction promoted

B2B 350

Gartner Top 10 Strategic Technology Trends for 2020

CEB IT

Human augmentation conjures up visions of futuristic cyborgs, but humans have been augmenting parts of the body for hundreds of years. Glasses, hearing aids and prosthetics evolved into cochlear implants and wearables. Even laser eye surgery has become commonplace. .

Trends 312

It's time to change your cloud operating model

David Linthicum

Enterprises need to change workflows and internal processes around the use of public cloud computing. There, I said it. Organizations understand that the cloud has a huge impact on how they work. This includes the ability to improve agility and efficiency. Cloud computing can be adopted in ways that are most productive for the business. The process of defining the future state of workflows and organizational behavior around the use of cloud computing is called a “cloud operating model.”

Agile 256

Blockchain Loses Its Luster, for Now

Information Week

Last year if you had a tech problem, blockchain was the answer. Now blockchain has reached the "trough of disillusionment," according to Gartner

153
153

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

The Missing Puzzle Piece in SCCM 3rd Party Patching Live Free Webinar

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. The Missing Puzzle Piece in SCCM 3rd Party Patch management webinar is coming soon. This webinar will give you an opportunity interact live with me and ask questions about SCCM third-party patching (with LIVE DEMO).

Fraud with a deepfake: the dark side of artificial intelligence

CTOvision

Read how the dark side of artificial intelligence was exploited by cybercriminals on Panda Security Blog : Over the last few years, fake news has been a major worry.

Predictions 2020: AI Shakes Up Customer Service Workforce And Operations

Forrester IT

AI will change how organizations staff, run, and manage their customer service teams. Read Forrester's 2020 customer service predictions to learn more. age of the customer customer engagement customer service solutions prediction promoted

338
338

Leading the Digital Society

CEB IT

The responsibility and challenges of leading organizations in a digital society can be daunting. But, according to Mike Harris, EVP, Research & Advisory, Gartner, successful digital transformation can actually change the way people interact with an organization. . swg_ad].

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Cloud architects who earn $150,000 are likely underpaid

David Linthicum

According to this source, “cloud architects earn between $140,000 and $150,000” per year. I’ve paid more and less, depending on where the architect lives. However, a good cloud architect can make as much as $250,000 with proper experience and a proven track record of success. Many may scoff at “proven track record” because cloud-based resources are relatively new, and configuring those resources to form the optimum solution is a still-evolving science.

AI Keeps Buggy Code From Crashing The Cloud

Information Week

AI-based test automation will be a key feature of DevOps in enterprise multi-cloud environments in the 2020s

Devops 148

Install Subscribe Windows RD Client for WVD End User Step by Step Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will see an end user guide to install & Subscribe Windows RD Client for WVD manually. I will cover the automatic installation of Windows RD Client for WVD in the upcoming posts.

The State of Machine Learning Frameworks in 2019

CTOvision

Read Horace He’s analysis of AI research papers which shows TensorFlow is the platform of choice in the industry, but most researchers are now using PyTorch on The Gradient : Since deep learning regained prominence in 2012, many machine learning frameworks have clamored to become the new favorite among researchers and industry practitioners. From the […].

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

The Client Book Club

Forrester IT

This week, Forrester’s Board of Clients was in Cambridge. This amazing group advises the company on strategy, new products, and improving our service. Over the years, they have had a big influence on how we work and where we are going — this year, the discussion was particularly valuable.

Groups 338

CIO Agenda 2020: Do You Have A Clear and Consistent Business Strategy?

CEB IT

Have a clear and consistent overall business strategy. . This seems like a simple, common-sense business rule, but it is one that organizations struggle with often.

Thinking about the security of IoT and the cloud

David Linthicum

Most of those who implement IoT linked with centralized cloud systems have little clue about security solutions for these architectures. You need to keep a few things in mind. First, this is all about data security. You’re persisting data on the IoT device, let’s say within a drone, and you’re transmitting data to a centralized server, such as a database on a public cloud.

4 Steps to Get Started with Containers

Perficient - Digital Transformation

The following is the fifth blog in a series about software containers and Kubernetes, and their importance in modern application delivery.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.