October, 2019

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. Yet, the stories of these breaches are often framed with vague explanations — a “misconfigured database” or mismanagement by an unnamed “third party.”. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services.

Cloud architecture that avoids risk and complexity

David Linthicum

One of the truisms about cloud architecture is that there are typically 100x100 architecture solution patterns. They all work, but only one is the right solution. If your head is swimming, let me explain. Indeed, many technology stacks and approaches will solve the same problems using cloud-based technologies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

7 Required DevOps Practices Before Increasing Deployment Frequencies

Social, Agile and Transformation

In my last post, I shared 7 Prerequisites on Whether to Improve Deployment Frequencies with DevOps. I firmly believe that CI/CD is not enough to support stable releases and also shared 5 pre-deployment priorities for Agile DevOps teams.

Devops 204

Fend off the increasing container attacks in the cloud

David Linthicum

The computer security company Skybox Security released an update to its 2019 Vulnerability and Threat Trends report. As the name implies, this report analyzes the computer vulnerabilities in play during the first half of 2019. Some of the key findings included the rapid growth of vulnerabilities in cloud containers.

Linux 183

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

The Reality of Blockchain

CEB IT

Generally, anyone looking to open a restaurant would need to go to various government agencies to obtain the required certifications. For example, the owners may need a health certification, worker’s comp certification or a liquor license depending on the type of establishment.

More Trending

CIOs Want To Know: How Do Phishing Attacks Happen?

The Accidental Successful CIO

To stop a phishing attack, you need to know how they work Image Credit: Pankaj Kaushal. Let’s agree on one thing: the people who work at your firm are smart people. Right? There’s no way that they would fall for one of those phishing attacks that we read about in the paper all the time. Or is there?

Can microsegmentation help IoT security?

Network World

The Internet of Things ( IoT ) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and better customer services. The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives.

What To Do If Your Data Was Breached

CTOvision

Read Nicole Martin explain what you can do if your data was breached on Forbes : Data breaches seem to be everywhere in today’s society. Just this week it was announced that a massive data breach exposed sensitive data of nearly every individual in Ecuador. The breach impacted an estimated 20 million people, 6.7 million […].

Data 85

It's time to change your cloud operating model

David Linthicum

Enterprises need to change workflows and internal processes around the use of public cloud computing. There, I said it. Organizations understand that the cloud has a huge impact on how they work. This includes the ability to improve agility and efficiency. Cloud computing can be adopted in ways that are most productive for the business. The process of defining the future state of workflows and organizational behavior around the use of cloud computing is called a “cloud operating model.”

Agile 192

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Gartner Top Strategic Predictions for 2020 and Beyond

CEB IT

In Japan, one restaurant is exploring artificial intelligence (AI) robotics technology to enable paralyzed employees to remotely pilot robotic waiters. JPMorgan Chase, Microsoft and Ford are hosting virtual career fairs tailored to the needs of neurodiverse candidates.

Predictions 2020: AI Shakes Up Customer Service Workforce And Operations

Forrester IT

AI will change how organizations staff, run, and manage their customer service teams. Read Forrester's 2020 customer service predictions to learn more. age of the customer customer engagement customer service solutions prediction promoted

186
186

The Legacy of Go

SPF13

This presentation was developed for GoLab in Firenze Italy and delivered as the closing keynote of the conference. The presentation talks about legacy, looking both backwards and forwards. It talks about the legacy of langauage Go inherited and how it is paying respect to that legacy. It concludes talking about the legacy Go hopes to leave behind

CI/CD is not Enough! 5 Pre-Deployment Priorities for Agile DevOps Teams

Social, Agile and Transformation

Having CI/CD pipelines doesn't mean that continuous delivery is a business need or a good idea. I wrote about this a couple of years ago when I asked, "Is Continuous Delivery Right for Your Business?" I know this is a debated topic.

Agile 185

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

A data breach could be game over for a brand

CTOvision

Data security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more concerned about protecting their personal information than they were one year ago.

Survey 123

Be prepared for microservices challenges

David Linthicum

Last week I wrote about how containers are becoming popular attack targets both inside and outside of a public cloud. This week let’s drill down on a common byproduct of containers: microservices. Microservices is both an architecture and a way of deploying applications. Indeed, microservices is a term used to describe the practice of breaking up an application, within a container or not, into a series of smaller specialized parts.

Gartner Top 10 Strategic Technology Trends for 2020

CEB IT

Human augmentation conjures up visions of futuristic cyborgs, but humans have been augmenting parts of the body for hundreds of years. Glasses, hearing aids and prosthetics evolved into cochlear implants and wearables. Even laser eye surgery has become commonplace. .

Trends 208

Predictions 2020: Privacy And Data Ethics Bring Marketing To The Boardroom

Forrester IT

Regulations, consumer wariness, and the consequences of misbehavior will create a challenging landscape for B2C marketers and brands. age of the customer B2C marketing prediction privacy promoted

B2C 184

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

MLOps can help overcome risk in AI and ML projects

Datacponomy

Aleksandar Kova?evi?, Sales Engineer at InterSystems, shares how companies use MLOps combined with a central multi-model database to get the most out of their machine learning initiatives. Artificial Intelligence (AI) and Machine Learning (ML) are hot topics at the moment.

7 Prerequisites on Whether to Improve Deployment Frequencies with DevOps

Social, Agile and Transformation

In my last post, I advised that having CI/CD automation is very important to drive frequent and reliable releases, however, it is not a sufficient process or steps to establish responsible releases.

Devops 177

Fraud with a deepfake: the dark side of artificial intelligence

CTOvision

Read how the dark side of artificial intelligence was exploited by cybercriminals on Panda Security Blog : Over the last few years, fake news has been a major worry.

Cloud architects who earn $150,000 are likely underpaid

David Linthicum

According to this source, “cloud architects earn between $140,000 and $150,000” per year. I’ve paid more and less, depending on where the architect lives. However, a good cloud architect can make as much as $250,000 with proper experience and a proven track record of success. Many may scoff at “proven track record” because cloud-based resources are relatively new, and configuring those resources to form the optimum solution is a still-evolving science.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Leading the Digital Society

CEB IT

The responsibility and challenges of leading organizations in a digital society can be daunting. But, according to Mike Harris, EVP, Research & Advisory, Gartner, successful digital transformation can actually change the way people interact with an organization. . swg_ad].

Predictions 2020: B2B Marketers Pivot From Products To Experiences

Forrester IT

Learn why experience will be the gift that keeps on giving for B2B marketing and sales. age of the customer B2B marketing prediction promoted

B2B 184

4 Steps to Get Started with Containers

Perficient - Digital Transformation

The following is the fifth blog in a series about software containers and Kubernetes, and their importance in modern application delivery.

SCCM Orchestration Group Setup Step by Step Guide for Server Patching

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Microsoft recently released SCCM 1909 version of technical preview. Let’s check what SCCM Orchestration Group (controlled patching) setup guide is.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.