June, 2020

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges.

Trends 311

The Pandemic Recession Demands a Digital Response

Forrester's Customer Insights

Digital transformation was never optional. But most firms treated it that way, applying digital technology in dribs and drabs — until COVID-19 shuttered economies and forever altered the patterns of life and work and commerce. That is, until uncertainty and volatility became the new normal.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Technology and Its Limits: Transformation is About People

Information Week

In the argot of today's technology world, transformation is about "People + Machine." The machine alone is, well, just a machine

170
170

Accelerate Digital Transformation With The Right Strategic Partner

Forrester's Customer Insights

In March 2020, as the implications of a global shutdown of physical offices became apparent, executives responsible for digital initiatives went into overdrive. If your firm is already digitally advanced, it’s likely to be faring far better than less advanced competitors by now.

50

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Do Channel Vendors Need Public Relations Anymore?

Forrester's Customer Insights

The communications industry is facing a perfect storm of converging forces, from COVID-19 to the rise of influencer marketing and even AI. At Forrester, we research around 10,000 global technology vendors that utilize indirect sales and often get asked about the value of PR in the channel.

Use These First Principles To Succeed With Robotic Process Automation In 2020

Forrester's Customer Insights

Let’s just say that one measure of the hype that surrounds any emerging technology is the amount of new (and largely superfluous) jargon that it generates. Enterprise automation market needs pragmatic advice The market for Robotic Process Automation (RPA) has been in hypergrowth for a while now.

More Trending

Jump-Start Your E-Commerce Platform in 3 Steps

CEB IT

Social-distancing norms and lockdown measures during the COVID-19 pandemic have increased the need for customers to shop online. Brands that had a strong digital presence find themselves at an advantage in catering to this increased online traffic.

B2C 218

The CIO?s Guide to Serverless Computing

CEB IT

The term “serverless computing” is a misnomer: The technology eliminates the need for infrastructure provisioning and management, but certainly does not eliminate the need for servers.

ACM calls for governments and businesses to stop using facial recognition

Venture Beast

ACM, one of the largest computer science orgs in the world, today called for the halt of facial recognition use by governments and businesses in the U.S. Read More. AI Business category-/Law & Government

The biggest hacks, data breaches of 2020 (so far)

CTOvision

In January, Microsoft disclosed a data breach occurring through one of the tech giant’s internal customer support databases. Microsoft said anonymized user analytics, contained in roughly 250 million entries, were exposed. […].

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Create SCCM Automatic Deployment Rule | ADR | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. ConfigMgr ADRs are Automatic Deployment Rules created for automatic deployment of Software Updates (monthly patches).

Study: Cloud Migration Gaining Momentum

Information Week

A new survey finds that organizations plan to migrate the majority of their applications to the cloud over the next year. Microservices and SRE are also gaining steam

Study 170

Microsoft is buying CyberX to bolster its Azure IoT security

Network World

Microsoft has announced it will purchase the industrially focused network security vendor CyberX for an undisclosed sum in an effort to bolster the security capabilities of its Azure IoT platform. The acquisition strikes at the heart of two key IIoT security pain points.

Lack of Skills Threatens Digital Transformation

CEB IT

Even before there was a coronavirus pandemic, boards ranked digital/technology disruption as their top business priority for 2020 — followed by obtaining the talent needed to execute tech transformation.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

By chasing the big might, you might just ignore the small

Eric D. Brown

It seems like people are always looking for the ‘next big thing.’ ’ They want that ‘big’ thing to get the ‘big’ improvement for themselves or their organizations.

What is Blockchain Technology?

CTOvision

Read David Hamilton explain all the nitty-gritty of blockchain technology on Security.io Its been almost ten years since Satoshi Nakamoto first introduced Blockchain technology to the world in his 2008 […].

352
352

WVD Architecture Changes for v2| New Portal Admin Experience

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Well, it’s not officially WVD v2, instead, it’s new Portal for WVD with new Admin Experience. However, the WVD architecture for the 2020 spring update is changed significantly with the WVD spring release.

Business Intelligence before Artificial Intelligence

Information Week

BI is the transformation of data from services, including software and assets, into accessible insights and reports. But, otherwise, why is BI important

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Machine learning in Palo Alto firewalls adds new protection for IoT, containers

Network World

Palo Alto Networks has released next-generation firewall (NGFW) software that integrates machine learning to help protect enterprise traffic to and from hybrid clouds , IoT devices and the growing numbers of remote workers.

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. However, a lengthy, in- depth presentation is more likely to leave the board scratching their heads than directing resources the right way.

Transforming the Workforce with Governed Citizen Development

Social, Agile and Transformation

It’s an unprecedented time to be a CIO or any technology leader. On the one hand, technology organizations are working hard on digital transformation and developing many new customer and employee-facing applications.

The Internet of Things Has a Consent Problem

CTOvision

Read why Stacey Higginbotham says that the Internet of Things has a consent problem on IEEE Blog : Consent has become a big topic in the wake of the Me […].

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Deploy Windows 10 2004 Using SCCM | ConfigMgr | MEMCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, You will learn about bare metal deployment using the configuration manager (Windows 10 2004 Using SCCM).

10 Cyberattacks on the Rise During the Pandemic

Information Week

Cybercrime and cyber espionage have skyrocketed during COVID-19 lockdowns. Are your work-from-home employees aware of these security traps

Know-It-All CIOs Are The Source Of The Problem

The Accidental Successful CIO

Know-it-all CIOs don’t think that they need input from anyone Image Credit: Charles Kremenak. CIOs who are excited about their jobs and who are ambitious often like to act like they know everything. This kind of behavior becomes very visible to everyone that they work with.

Gartner Top 10 Trends in Data and Analytics for 2020

CEB IT

In response to the COVID-19 emergency, over 500 clinical trials of potential COVID-19 treatments and interventions began worldwide. The trials use a living database that compiles and curates data from trial registries and other sources.

Trends 305

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

5 Ways to Better Manage Technical Debt

Social, Agile and Transformation

There are specific topics that will get CIO and IT leaders to vent. Talk about show many spreadsheets bounce around through email, midyear budget cuts, or hundreds of projects everyone won't prioritize, and you'll get an earful.

Budget 185

How are Big Data and IoT Interrelated?

CTOvision

There has been rapid growth in the Internet of Things (IoT) and big data technologies amongst organizations and individuals. According to Forbes, it’s predicted that the amount of data generated […].

SCCM 2002 Known Issues Bugs Fixes|ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will learn more about SCCM 2002 known issues. ConfigMgr 2002 is generally available and all SCCM infrastructure with online Service Connection Point.

How To 157

Why a Master Data Strategy Is Key to Digital Transformation

Information Week

Find out why deploying an effective master data strategy across an enterprise is an important foundation to building a successful digital transformation journey

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.