July, 2020

8 Macro Factors That Will Shape the 2020s

CEB IT

COVID-19 might dominate the headlines, but it’s just one of eight key factors that will reshape business in this decade. The global pandemic will have long-lasting and far-reaching impact on the business world, but other shifts in macrobusiness environment areas — such as oil prices, weakening international relationships and climate change — have not gone away. Highly leveraged debt, crumbling international alliances and bubble-like asset prices.

How Machine Learning is Influencing Diversity & Inclusion

Information Week

Here's how IT leaders can better manage the bias that becomes embedded in algorithms and datasets to help increase opportunities for minority tech professionals

126
126

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Leader Checklist to Foster Trust on Remote Teams

CEB IT

The COVID-19 pandemic has revolutionized the way people work. To maintain the safety and well-being of the workforce, the majority of organizations across the world have adopted a remote work culture. Accurate expectation-setting and transparency of data are key to build mutual trust and lead successful remote teams. Gartner research shows that organizations with high levels of trust increase their average employee engagement by 76% over those with low levels of trust.

How CTOs Can Innovate Through Disruption in 2020

Information Week

CTOs and other IT leaders need to invest in innovation to emerge from the current COVID-19 crisis ready for the next opportunities

130
130

Facebook Causes Continue to Show Little Promise as Fundraising Tools

Who Is Spying On Me? A taxonomy of spies in the modern technology landscape

CTOvision

Watching the cyber threat evolve over the last few decades has made it clear: we are all targets. As individuals we need to do what we can to minimize the […]. Cyber War Spies

282
282

Lead Through Volatility With Adaptive Strategy

CEB IT

As businesses reset strategy post-COVID-19 , many face a harsh reality: Their traditional methods for crafting strategy aren’t effective in today’s rapidly changing and increasingly uncertain world. Enterprise strategy often takes too long to create, is slow to respond to change and relies on leaders being able to make safe assumptions about the future.

More Trending

Apple overtakes Saudi Aramco as world’s most valuable public company

Venture Beast

After achieving another record quarter despite the coronavirus pandemic, Apple stock surged, briefly surpassing its largest rival in market capitalization. Read More. Business Commerce Mobile Apple category-/Business & Industrial/Energy & Utilities/Oil & Gas category-/Finance category-/News/Business News/Company News most valuable public listed Saudi Aramco stock trillion world's largest company

How General Managers Lead Through Disruption

CEB IT

Prior to COVID-19, the top priority of 51% of general managers (GMs) for 2020 was to grow revenue from existing products and services, and 35% agreed their second priority was to grow revenue from new products and services. But leading high-tech GMs now must pivot. Although GMs were previously concerned with making their numbers, today their top question is, “How do we successfully navigate the crisis?”

Survey 175

Shopping Gets More Conversational: How AI Is Changing The Experience

CTOvision

Read Kathleen Walch’s article in Forbes about how AI is making shopping more conversational. A few decades ago, if a person wanted to buy something they had to physically go […]. Artificial Intelligence Artificial Intelligence Companies News AI AI-enabled commerce artificial intelligence commerce conversation conversational

Robotics Will Prevail Over Other Tech Sectors Post-Pandemic

Information Week

The COVID-19 pandemic has highlighted the importance of robotics in roles normally reserved for susceptible humans, but which robotics applications will thrive once we get ahead of the virus

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

SCCM Client Push Installation Status Using SQL Query | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s check the SCCM Client SCCM Client Push Installation Status Using SQL Query. You can use different methods to install the ConfigMgr client software.

Imagine… a global economy optimized around everyone’s unique ability to contribute

Trends in the Living Networks

Every one of the almost 8 billion people on this planet is unique. And everyone can contribute to the world and humanity in a unique way. Most of us spend our lives trying to work out quite how.

US Secret Service warns about increased cyberattacks against MSPs

Tech Republic Security

The US Secret Service has warned organizations about a rise in hacks of MSPs and offers advice on how to beef up security

Avoid 5 Pitfalls When Building Data and Analytics Teams

CEB IT

The primary mission of many data and analytics leaders and chief data officers (CDOs) consists of building an effective data and analytics team to establish data and analytics as a strategic discipline within their organization.

Data 286

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Magellan Health Data Breach Victim Tally Reaches 365K Patients

CTOvision

The extent of the ransomware attack that hit Arizona-based Magellan Health in April became clear this week, with eight Magellan Health affiliates and healthcare providers reporting breaches stemming from the […].

Taking Steps To Boost Automated Cloud Governance

Information Week

ONUG's recent whitepaper outlines how establishing uniform event reporting could lead to improved transparency from cloud providers

SCCM Patch Status SQL Query Based on Particular Collection | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s find out SCCM Patch Status SQL Query Based on Particular Collection. I have seen many questions in HTMDForum that we want the patch report, how to write a SQL query to write a report on patching etc… In this post, you will learn how to make a working SCCM patch status SQL query to […].

Report 131

Natural language processing: A cheat sheet

Tech Republic Cloud

Learn the basics about natural language processing, a cross-discipline approach to making computers hear, process, understand, and duplicate human speech

170
170

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure. F-Secure says its investigators found that while the counterfeit Cisco 2960-X units did not have any backdoor-like features, they did employ various measures to fool security controls.

How Security and Risk Leaders Can Prepare for Reduced Budgets

CEB IT

In the wake of a global pandemic, a CIO of a large tech firm asked the chief information security officer (CISO) to reduce spend by 10%.

Budget 251

The CSA IoT Security Controls Framework

CTOvision

Read Anastasios Arampatzis make a case for IoT Security Framework on Tripwire : The Internet of Things (IoT) is growing in technical, social, and economic significance. ENISA defines the increasingly […].

3 Tips to Recognize Hidden Costs of the Cloud

Information Week

Cloud usage and demand has spiked, but businesses must be wary of hidden cloud "gotchas" when it comes to modernizing and scaling their cloud infrastructure

Cloud 136

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Fix Missing SCCM Community Hub Issue| Enable | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s find out how to fix missing SCCM Community Hub. ConfigMgr Community hub is released in SCCM 1902 Production version with limited capabilities.

How To 132

Joker billing fraud malware eluded Google Play security to infect Android devices

Tech Republic Security

A new variant targeted Android users to subscribe them to premium services without their consent, according to Check Point Research

DeepMind researchers propose rebuilding the AI industry on a base of anticolonialism

Venture Beast

DeepMind researchers argue that anticolonial theory should be part of the AI development process to avoid perpetuating algorithmic oppression. Read More. AI Big Data Business Dev AI ethics anti-colonialism artificial intelligence category-/Science/Computer Science DeepMind machine learning

CIOs: Ask 3 Questions Before Updating Strategy Post-Pandemic

CEB IT

As organizations move beyond the immediate response to COVID-19 and reset business strategy , CIOs have to decide how best to contribute. While CIOs have continually re-evaluated operations during the pandemic, they must now focus on more strategic priorities: making their enterprise more resilient and better able to respond to uncertainties, capturing value from new digital opportunities and enabling digital business outcomes. Read more: A Framework for Executive Decision Making During COVID-19.

The Complete Guide to Distributed Tracing

Distributed tracing is a diagnostic technique that reveals how a set of services coordinate to handle individual user requests. Distributed tracing helps enable loosely coupled work across teams for fast, independent problem-solving.

The Short Story From Arthur C. Clarke Every Officer in Space Force Should Read and Heed

CTOvision

Like so many others in the national security domain I am tracking what I can about the new US Space Force, the newest US military force. I believe their mission […]. News SciFi

10 Ways AI Is Transforming Enterprise Software

Information Week

AI capabilities are showing up in places you might not expect

ConfigMgr Client Deployment Using Intune | Workflow | SCCM | CMG

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s understand the workflow of ConfigMgr Client Deployment Using Intune. In this post, we will analyze the sequence of events that occur in the back-end when we deploy the ConfigMgr client from Intune. Understanding this workflow may help in troubleshooting ConfigMgr client deployment using CMG. In autopilot deployments, Windows 10 devices are managed by Intune. […].

How much malware tools sell for on the Dark Web

Tech Republic Security

A low-quality batch of malicious tools can sell for as low as $70, while a premium set can go as high as $6,000, according to the security research site Privacy Affairs

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.