March, 2017

Understanding Cloud Computing for Your Business

CTOvision

Carol M. Evenson. Over the last decade, cloud computing has gone from being a buzzword to an essential component of web technology.

Both Sides of Enterprise Mobility

Cloud Musings

Photo credit: Shutterstock Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché.

Mobile 119

Trending Sources

What’s New in Windows Server 2016 Remote Desktop Services for On-Premises and Cloud Deployments

IT Pros Rock!

The Remote Desktop Services (RDS) platform has been refined in Windows Server 2016.

The Top Emerging Technologies For Digital Predators

Forrester IT

If you've been following my research, you know I like to divide the business world into three categories of company: Digital Predators successfully use emerging digital technologies to gain market share and/or displace traditional incumbent companies (e.g. Amazon, Lyft, Priceline, AirBnB, Netflix).

More Trending

Cloud Computing Forensics Readiness

Cloud Musings

Photo credit: Shuterstock In today’s globally connected world, data security breaches are bound to occur.

Windows Server 2016 Storage will Blow Your Mind! – Part 2

IT Pros Rock!

The second in a three part series covering the amazing storage features found in Windows Server 2016. In this second video we will focus on the amazing capabilities provided by Storage Replica features in Windows Server 2016. Windows Server 2016 Storage Replica. [ 1:10 ] What is Storage Replica? [

DevOps has reached critical mass, CIOs need to get on board

Forrester IT

DevOps is one of the most powerful weapons that CIOs have in their arsenal. DevOps unites the entire enterprise in delivering business transformation with superior customer experience.

Why CIOs Have To Worry About Their Company Being Disrupted

The Accidental Successful CIO

Just when you think you have the ball, that’s when a disruption can occur Image Credit: Matthew Wilkinson.

IT Project Management: 4 Principles of a High-Impact Dashboard

CEB IT

IT project managers’ job is to steer highly complex and expensive IT projects to completion on time and – if possible – under budget, so a big part of their role is letting everyone know how projects are progressing.

Cybersecurity Due Diligence: Now a best practice in Merger & Acquisition (M&A)

CTOvision

Bob Gourley. Cooley is an international law firm recognized for its technology practice and experience in multiple practice areas, including Mergers and Acquisition (the firm has handled over 1,000 M&A transactions since 2010).

Quantum Computing Delivered From The Cloud

Cloud Musings

Photo credit: Shutterstock IBM Cloud is now providing developers with the infrastructure and portal to a 5 qubit quantum computer. This equips them with the ability to build interfaces between classic computers and IBM’s quantum platform.

IBM 114

Windows Server 2016 Storage will Blow Your Mind! – Part 3

IT Pros Rock!

The third in a three-part series covering the amazing storage features found in Windows Server 2016. In this third video, we will focus on the amazing capabilities provided by Storage Quality of Service features in Windows Server 2016. Windows Server 2016 Storage Quality of Service (QoS). [

The Disruptive Force of Disruption

Forrester IT

Digital disruption is a fairly well understood dynamic: new entrant uses technology in new ways to upend existing business models and disrupt markets. In other words, digital disruption is a distinct force with a distinct life span that is mostly external to traditional markets and businesses. But what if it is more than that? What if it is the canary in the coal mine representing the first signals of a shift in our economy and society?

81

Amazon Makes it Free for Developers to Build and Host Most Alexa Skills Using AWS

All Things Distributed

Amazon today announced a new program that will make it free for tens of thousands of Alexa developers to build and host most Alexa skills using Amazon Web Services (AWS).

IT Applications: How to Create a Culture of Quality

CEB IT

Over the past several years, those in charge of IT applications teams have emphasized the need for their staff to be as quick as possible in getting applications in to day-to-day use.

Update on Apache Spot: Tremendous advancement in cybersecurity data analytics and event management capabilities

CTOvision

Bob Gourley. The trend of applying machine learning and artificial intelligence to the mission of cyber defense is one of the most promising activities in the cybersecurity community.

The BYOD Problem

Cloud Musings

Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security.

Mobile 106

Step-by-Step: Deploy Windows Server 2016 Storage Spaces Direct (S2D) Cluster in Microsoft Azure

IT Pros Rock!

In this short video, we’ll walk through deploying a Windows Server 2016 Storage Spaces Direct (S2D) Cluster to a Microsoft Azure subscription using Azure Resource Manager (ARM) Templates. Storage Spaces Direct (S2D) on Microsoft Azure.

Video 88

The Cloud Is Disrupting Hadoop

Forrester IT

Forrester has seen unprecedented adoption of Hadoop in the last three years. We estimate that firms will spend $800 billion in Hadoop software and related services in 2017. Not surprisingly, Hadoop vendors have capitalized on this -- Cloudera, Hortonworks, and MapR have gone from a "Who?"

IBM 81

How to Make a WordPress Website that Instantly Attracts your Target Audience

Galido

WordPress is a great tool for website development. In fact, it is one of the most used development platforms at the present day. 22% of the newly built websites are powered by WordPress. It offers a lot of features for the developers and also adds to the better user experience for the users.

Media 42

Does How You Look Really Matter?

The Accidental Successful CIO

Studies show that what you wear to work may impact how effective you are Image Credit: Matthew Kenwrick. When you go into the office, how do you dress? Do you put on a suit, find just the right tie, and make sure that your shoes are polished?

Study 41

Digital Risk of Data Increases When Employees Leave

CTOvision

Crystal Lister. Employee turnover can potentially have serious effects on an organization’s productivity, morale, profit, financial resources, and increase an organization's digital risk posture.

Back-to-Basics Weekend Reading: The Foundations of Blockchain

All Things Distributed

More and more we see stories appearing, like this one in HBR by MIT Media Lab's Joi Ito and crew. It praises the power of blockchain as a disruptive technology, on par with how "the internet" changed everything.

Improve Deployment Speed and Reduce Overhead with Containers in Windows Server 2016

IT Pros Rock!

Learn how containers work in Windows Server 2016 and how they can be used to increase deployment speed, workload density and decrease server overhead to create a more efficient IT environment.

Make Omnichannel A Cornerstone Of Your Digital Transformation – The Telco Angle

Forrester IT

Source: Forrester, "Make Omnichannel A Cornerstone Of Your Telecom Digital Transformation" Poor customer experiences remain the Achilles' heel of telcos' digital transformation efforts.

After CIA leak, Intel Security releases detection tool for EFI rootkits

Network World

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code. The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple's Macbooks. A rootkit is a malicious program that runs with high privileges -- typically in the kernel -- and hides the existence of other malicious components and activities.

Apple 39

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The rise of more iterative and constant technology development methods – such as Agile and DevOps – and a rising number of line managers and vendors involved in sourcing, creating, and using a vast and growing store of data makes it incredibly hard to balance the traditional but necessary “operational”-type activities and new, more high-impact activities like risk management and governance.

Agile 39

Leveraging The FFIEC Cybersecurity Assessment Tool (CAT) To Improve Corporate Culture and Raise Security Posture

CTOvision

Bob Gourley.