July, 2020

8 Macro Factors That Will Shape the 2020s

CEB IT

COVID-19 might dominate the headlines, but it’s just one of eight key factors that will reshape business in this decade.

How Machine Learning is Influencing Diversity & Inclusion

Information Week

Here's how IT leaders can better manage the bias that becomes embedded in algorithms and datasets to help increase opportunities for minority tech professionals

132
132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Leader Checklist to Foster Trust on Remote Teams

CEB IT

The COVID-19 pandemic has revolutionized the way people work. To maintain the safety and well-being of the workforce, the majority of organizations across the world have adopted a remote work culture.

How CTOs Can Innovate Through Disruption in 2020

Information Week

CTOs and other IT leaders need to invest in innovation to emerge from the current COVID-19 crisis ready for the next opportunities

144
144

Going to Market Smarter in the New Economy

The fight to find new customers and retain existing ones is the biggest business challenge for many companies. Technology will continue to play a part in fostering buyer allegiance and building brands in the “new normal.” In 2021, as companies continue to move more functions online, employees will take a more virtual -- and flexible -- mindset and lifestyle in parallel to the digitization of businesses. To succeed, you must change the way you conceive and build new products as a digital business. Download the report today to discover more!

Who Is Spying On Me? A taxonomy of spies in the modern technology landscape

CTOvision

Watching the cyber threat evolve over the last few decades has made it clear: we are all targets. As individuals we need to do what we can to minimize the […]. Cyber War Spies

314
314

Lead Through Volatility With Adaptive Strategy

CEB IT

As businesses reset strategy post-COVID-19 , many face a harsh reality: Their traditional methods for crafting strategy aren’t effective in today’s rapidly changing and increasingly uncertain world.

More Trending

Apple overtakes Saudi Aramco as world’s most valuable public company

Venture Beast

After achieving another record quarter despite the coronavirus pandemic, Apple stock surged, briefly surpassing its largest rival in market capitalization. Read More.

How General Managers Lead Through Disruption

CEB IT

Prior to COVID-19, the top priority of 51% of general managers (GMs) for 2020 was to grow revenue from existing products and services, and 35% agreed their second priority was to grow revenue from new products and services. But leading high-tech GMs now must pivot.

Survey 249

Shopping Gets More Conversational: How AI Is Changing The Experience

CTOvision

Read Kathleen Walch’s article in Forbes about how AI is making shopping more conversational. A few decades ago, if a person wanted to buy something they had to physically go […].

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

5 Priorities for IT Leaders During this Summer of COVID

Social, Agile and Transformation

It's been a very challenging year for everyone and indeed, this has been the case for first responders. Somewhere a couple of rungs further down the ladder, most organizations owe plenty of thanks to CIOs, IT leaders, and especially the IT service desk.

IT Certifications + Persistence Lead to a Cybersecurity Career

Association of Information Technology Professional

Meet Damarn Carroll, an ambitious cybersecurity professional who has successfully made his own career path with hard work and IT certifications

Reassessing Security Vulnerabilities and Gaps After COVID

Doctor Chaos

Written by: Kayla Matthews journalist & writer kaylaematthews@gmail.com. link]. The ongoing COVID-19 pandemic has highlighted a few areas of improvement in the business world. As the world's systems try to adapt to changing needs, their shortcomings become increasingly evident.

What Functional Leaders Should Know About Scenario Planning

CEB IT

The COVID-19 pandemic has triggered a wide range of strategic planning activities. As the focus turns largely to recovery and renewal , functional leaders are increasingly pulled into enterprise conversations about likely outcomes when the way forward is neither clear nor certain.

How to Empower Your Users So You Can Create a Great Product

Speaker: Johanna Rothman, Management Consultant, Rothman Consulting Group

Join Johanna Rothman, Author and Consultant, for her session that will discuss why instead of designing for the users, CTOs and their teams should collaborate with empowered users to create a great product together.

The Short Story From Arthur C. Clarke Every Officer in Space Force Should Read and Heed

CTOvision

Like so many others in the national security domain I am tracking what I can about the new US Space Force, the newest US military force. I believe their mission […]. News SciFi

Cisco urges patching flaws in data-center, SD-WAN gear

Network World

Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offering customers should deal with now. On the data center side, the most critical – with a threat score of 9.8

WAN 149

What is the Most Important Agile KPI?

Social, Agile and Transformation

I'm asked this question on selecting agile KPIs all the time from leaders. . Some want to try measuring agile methodologies with the same project management measurements that worked for them in the past, while others are trying to establish some oversight on a process that they don' fully understand.

Agile 205

4 Things to Know About Emerging Technology

Association of Information Technology Professional

As emerging technology continues to be a hot topic, the benefits and potential of all these new things are best realized in the context of a modern IT approach

204
204

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

10 Ways AI Is Transforming Enterprise Software

Information Week

AI capabilities are showing up in places you might not expect

CIOs: Ask 3 Questions Before Updating Strategy Post-Pandemic

CEB IT

As organizations move beyond the immediate response to COVID-19 and reset business strategy , CIOs have to decide how best to contribute.

What are AI and machine learning adding to threat intelligence – brains, brawn or both?

CTOvision

Read Ariadna Miret take a look at what artificial intelligence and machine learning bring to threat intelligence on Security Boulevard : Too much information and not enough time. This, and […].

Are newer medical IoT devices less secure than old ones?

Network World

Experts differ on whether older connected medical devices or newer ones are more to blame for making healthcare networks more vulnerable to cyberattack. The classic narrative of insecure IoT centers on the integration of older devices into the network.

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

From Legacy to Intelligent ERP: A Blueprint for Digital Transformation

Social, Agile and Transformation

Do you cringe when it’s time to upgrade the ERP because of all the testing that’s required? Do you have frequent nightmares of executives and managers coming after you because the ERP is down or performing slowly?

Your Next Move: Tier II IT Support Technician

Association of Information Technology Professional

If you want to move up at the help desk, a tier II IT support technician may be a good next step for you. Keep reading to learn what a tier II tech does and how to get there

How To 191

Data Science: Why Humans Are Just as Important as Math

Information Week

It's not easy to teach machines how to apply a critical lens to data. Businesses need human intuition and creativity for multi-faceted problems

How To 136

Avoid 5 Pitfalls When Building Data and Analytics Teams

CEB IT

The primary mission of many data and analytics leaders and chief data officers (CDOs) consists of building an effective data and analytics team to establish data and analytics as a strategic discipline within their organization.

Data 285

The Beauty and Brains of Actionable Data: How to Go From Concept to Reality

Speaker: Dr. Joe Perez, Senior Systems Analyst at NC Dept. of Health & Human Services, and Chief Technology Officer at SolonTek

Join Dr. Joe Perez, Senior Systems Analyst at NC DHHS, and Chief Technology Officer, SolonTek, to learn how you can capitalize on your ideas by blending internal with external while leveraging them into a cohesive strategy for both the short term and the long term.

Magellan Health Data Breach Victim Tally Reaches 365K Patients

CTOvision

The extent of the ransomware attack that hit Arizona-based Magellan Health in April became clear this week, with eight Magellan Health affiliates and healthcare providers reporting breaches stemming from the […].

SCCM Patch Status SQL Query Based on Particular Collection | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s find out SCCM Patch Status SQL Query Based on Particular Collection.

Report 133

How to tailor SASE to your enterprise

Network World

Businesses considering the secure access service edge (SASE) model need to understand that there are numerous ways to implement it that can be tailored to their future needs and the realities of their legacy networks.

WAN 132

Swans Reflecting Elephants

Doctor Chaos

Original article appears at [link]. The famous painting “ Swans Reflecting Elephants ” creates a double image and is an ideal metaphor of what we know about the Internet and the hidden layer beneath (the Darknet).

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.