May, 2017

Crisis Response Using Cloud Computing

Cloud Musings

Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver.

VOIP 106

Local Administrators Automated Reporting Tool

Mick's IT Blog

Back in November 2016, I posted the blog entry on reporting local administrators on machines. That script is deployed to machines via an SCCM package that reports the local administrators back to SCCM to be able to be queried into a report.

Tools 105

Trending Sources

Windows Server 2016 – What’s New for Web Servers with IIS 10

IT Pros Rock!

Windows Server 2016 includes a new version of Internet Information Server IIS – in this episode we will reveal all of the great new features and performance enhancements included so that you can understand how this may affect your deployment decisions with Windows Server 2016.

The Skills all IT Professionals Will Need for 2020

CEB IT

Digitization is changing every aspect of a big company , from the way it uses technology to create its products, to the way it markets and sells them to customers, to the way it runs its operations to make all of that happen.

Budget 102

More Trending

Check Out Our New Website!

The Investing Edge

No, you haven’t landed on the wrong page. We at Ascent Venture Partners are proud to present our shiny new website! I think you would agree – it was about time. Being a 30+ year old firm, we’ve gone through a number of website iterations.

Why You Are Getting Disrupted

Forrester IT

The overriding theme of every disruption story I've ever heard is that firms thought they had more time than they did. So, I've been pondering the why. We can see disruption happening all around us, but why is it so difficult to get out in front of it?

How Digitization is Changing the Structure of Corporate IT

CEB IT

For some time now, IT functions have been rethinking their entire operating model as they help – and often lead – their companies through digitization. This has understandably forced them to consider what they should do with all their IT strategy, governance, and management functions.

Steps for Fortifying Your Organization’s Data in the Cyber War

CTOvision

Roger Hockenberry. The most recent ransomware attacks should make every executive in every company take notice, and be worried. Last week, I spoke at a cyber event and came with a message: the continued focus on legacy endpoint and network security is almost worthless.

Weekend Reading: Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases.

All Things Distributed

In many, high-throughput, OLTP style applications the database plays a crucial role to achieve scale, reliability, high-performance and cost efficiency. For a long time, these requirements were almost exclusively served by commercial, proprietary databases.

How Quantum computing with DNA storage will affect your health

Cloud Musings

Intel 83

Sidecar Raises Series C to Fuel Rapid Growth

The Investing Edge

About 18 months ago, we led the Series B investment round in Sidecar Interactive. We were excited to back Andre and his vision for applying advanced analytics and machine learning to transform the ecommerce ad market.

DevOps Has Reached “Escape Velocity”, CIO’s Need To Get Onboard!

Forrester IT

In an era where velocity and agility are driving technology management organizations over simple cost reduction, every business must constantly evolve to drive business differentiation.

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it.

How Cybersecurity Benefits from Hackers

CTOvision

Carol M. Evenson. With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word.

Implementing Your Company’s Cybersecurity, Military Style

The Accidental Successful CIO

You can never have too much cybersecurity Image Credit: Randen Pederson. Implementing a cyber-defense system for your company sure sounds like a good thing for the person with the CIO job to do. Just exactly what does that mean?

Blockchain Business Innovation

Cloud Musings

Is there more than bitcoin to blockchain ? Absolutely, because today’s blockchain is opening up a path towards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it’s more famous bitcoin use case.

Ascent B2B IT Forum – CX in the Age of Innovation: The Convergence of Digital & Physical

The Investing Edge

It’s hard to dispute that we’re living in an increasingly digitally-driven world, proven by the fact that Americans log more than 10 hours of screen time per day presenting a huge, new market opportunity.

B2B 70

Bimodal IT Is Past Its Due Date: Providing Speed And Innovation Need To Top The CIO's Agenda

Forrester IT

Many CIOs have embraced bimodal IT as a way to create relevance for the technology organization in the age of the customer. With marketing, CX, and other teams increasingly building their own development teams or turning to outside agencies for their technology needs, CIOs have recognized that they need to help drive fast change, not be a source of friction. They also need to be a source of innovation for the business.

Corporate IT’s Big Role in Customer Centric Design

CEB IT

The likes of Google, Amazon, and many other “digital disrupters” have changed our expectations of a good customer experience forever. While this is undoubtedly a good thing – one of the key benefits of free market capitalism is that people are provided with more choice and better goods and services than they would otherwise be – it hasn’t made life easy for many of the world’s customer service teams.

CTOvision Assessment On The Megatrend of Artificial Intelligence

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity.

Faster, higher, stronger: How the digitalization of industry is redefining value creation

All Things Distributed

This article titled " Wie die Digitalisierung Wertschöpfung neu definiert " appeared in German last week in the "Größer, höher, weiter (bigger, higher, further)" column of Wirtschaftwoche.

B2C 38

New products of the week 5.22.17

Network World

Running its course Image by Untangle Network World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters. Thank you to all who have submitted products.

Facebook Building Own Fiber Network to Link Data Centers

Data Center Knowledge

Claims 200-mile underground fiber cable will be 50 percent more efficient than most other cables in existence Read More. Facebook Networks North America

Data is the perimeter, defend it that way

Forrester IT

Data is the perimeter, defend it that way. Unless you have been living under a rock or possibly hiding in the mountains of Montana with a giant beard and eating way too many government issued MRE's you probably heard about the nuclear bomb of a ransomware attack that kicked off last week. Welcome to the post apocalypse folks.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

10 Tips to Keep Hackers Out of Your Smart Home

CTOvision

Jeremy Sutter. As technology continues to make life more convenient for users, it is making the lives of thieves easier as well. Owners of smart homes are under constant threat of electronic theft and violation. The even scarier part is that sometimes you can't even tell when you have been hacked. A smart door can be remotely unlocked and show no sign of forced entry into your home. Months could go by before you notice that your expensive jewelry is missing.

Driving Digital: The CIO's Playbook

Social, Agile and Transformation

Thanks to Landmark Ventures and Anthony Juliano for a great CIO Summit last week and for giving me a speaking spot for Driving Digital: The CIO's Playbook.

Top 5 misconceptions of IoT network and device security

Network World

Security in multiples Image by Shutterstock The Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet infrastructure, providing greater insight and control over elements in our increasingly connected lives.