Sat.Aug 17, 2019 - Fri.Aug 23, 2019

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Summary: Sovrin is an identity metasystem that provides the Internet's missing identity layer. By creating a general-purpose system for constructing context-specific identity systems, the metasystem represents a universal trust framework. Imagine you are planning to meet a friend for lunch. You arrive at the restaurant on time and she’s nowhere to be found. You go to the host to inquire about the reservation. He tells you that your reservation is correct, and your friend is already there.

Have a Failing Big Data Project? Try a Dose of AI

Information Week

A growing number of AI experts are turning their attention to big data. Will that be enough to save doomed projects

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Adulting - CIO Style

CIO Musings

I love the Urban Dictionary. I'm not sure why, I guess it makes me feel hip to read through some of the posts. I have contributed a few along the way like the term "Camel Up", my proudest moment. The Urban Dictionary defines "adulting" like this. I like the part about being a fully developed individual. Recently I was in a difficult steering committee meeting for a major enterprise project. After the meeting one of my staff members complimented me for my adulting skills.

How to stop people from causing bad cloud architectures

David Linthicum

I’ve been in some knock-down, drag-out battles over both the configuration and the use of technology. On one side, you have somebody with a very different opinion as to what technology should be used and how. On the other side, you know that you are right. These days the battles are about which cloud provider to choose, what database to use, what devops tool chain to engage. So many new things fly at us each day and so many more choices have to be made that conflicts are a foregone conclusion. [

Going to Market Smarter in the New Economy

The fight to find new customers and retain existing ones is the biggest business challenge for many companies. Technology will continue to play a part in fostering buyer allegiance and building brands in the “new normal.” In 2021, as companies continue to move more functions online, employees will take a more virtual -- and flexible -- mindset and lifestyle in parallel to the digitization of businesses. To succeed, you must change the way you conceive and build new products as a digital business. Download the report today to discover more!

6 Ways the Workplace Will Change in the Next 10 Years

CEB IT

Current trends in business and technology show that the way employees work — where, when, why and with whom — will change completely over the next decade and bear little resemblance to work as it stands today. CHROs need to be prepared for what’s coming. De’Onn Griffin , Senior Director Analyst at Gartner, outlines six ideas about the future direction of the workplace and how organizations can prepare for it. . "We We Working" will eliminate middle management.

Don’t worry about shadow IT. Shadow IoT is much worse.

Network World

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface. That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation.

Agile 126

More Trending

Machine learning operations don’t belong with cloudops

David Linthicum

It’s Monday morning, and after a long weekend of system trouble the cloud operations team is discussing what happened. It seems that several systems that were associated with a very advanced, new inventory management system enabled with machine learning had issues over the weekend. The postmortem concluded the following: The batch process that moved raw data from the operational database to the training database failed, as well as the auto recovery process.

Cloud Adoption: Where Does Your Country Rank?

CEB IT

Cloud computing initially emerged in the United States. Since 2015, the U.S. has been the leader in cloud adoption and has set the pace for such adoption around the world. However, not all countries are on par with the U.S. In fact, by 2022, cloud adoption for all other countries will lag behind the U.S. by one to seven or more years. Also in 2022 in the U.S., 14% of total IT spending will be on cloud services. .

Cloud 234

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black. VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1

Vmware 114

Three Tips for Laying the Groundwork for Machine Learning

Information Week

While machine learning may seem overwhelming and complicated, creating an infrastructure for ML projects is more achievable than many organizations think

99

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

8 tips on how to save your iPhone’s battery life 

Galido

Information Technology Blog - - 8 tips on how to save your iPhone’s battery life - Information Technology Blog. The good news for iPhone users is there are a couple of tricks you can do to save your battery life on your beloved iPhone, actually in fact I know of 8 tips that can help you avoid running around looking for a place to charge up your device. Read more to find out how. Update iOS on your iPhone. You can update your iPhone to the latest version of iOS.

Media 95

5 Security Questions Your Board Will Definitely Ask

CEB IT

How secure are we? Why do we need more money for security, when we just approved X last year? What do you mean we’ve had 4 incidents? I thought you had everything under control. Chances are, most security and risk leaders have heard these questions, possibly multiple times, from their boards of directors. But the problem is that these questions are unanswerable. They are driven by exaggerated, incomplete or contradictory public information, and are a distraction from more relevant questions. .

Cisco: 6 critical security alarms for UCS software, small-biz routers

Network World

Cisco today warned its Unified Computing System (UCS) customers about four critical fixes they need to make to stop nefarious agents from taking over or attacking their systems.The problems all have a severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System ( CVSS ). The critical bugs are found in the Cisco UCS Director and UCS Director Express for Big Data packages. To read this article in full, please click here

Addressing Risk: Data Security Questions for CIOs

Information Week

Position your organization not just for legal and regulatory compliance, but also for safer and more effective use of information assets. Here are five questions to ask

How to Empower Your Users So You Can Create a Great Product

Speaker: Johanna Rothman, Management Consultant, Rothman Consulting Group

Join Johanna Rothman, Author and Consultant, for her session that will discuss why instead of designing for the users, CTOs and their teams should collaborate with empowered users to create a great product together.

SCCM Task Automation Application Deployment Updates – Patch My PC Review 2

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. This post is the continuation of “SCCM Application Creation Automation – Patch My PC Review 1.” ” In this post, Review #2, you are going to see more details from the SCCM side. Let’s see how Patch My PC can help with SCCM automation activities like third-party software updates and application creation. Introduction SCCM third-party software […].

3 Major Trends Drive the Gartner Hype Cycle for Midsize Enterprises, 2019

CEB IT

Cloud. Machine learning. Edge computing. Internet of Things (IoT). The reality of being a CIO is dealing with the constant influx of new, shiny technologies. . About 68% of midsize CIOs expect to increase investment in information technology in 2019 over 2018, according to the 2019 Gartner and Senior Business Executive Survey. Obviously CIOs can’t — and shouldn't — invest in every opportunity, but some technologies could have wide-ranging impact and amplify business capabilities.

Trends 231

VMware spends $4.2B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are certain to be major topics next week at the VMworld user conference, but VMware took things up a notch with plans to spend $4.2 billion to acquire cloud-development firm Pivotal, and security provider Carbon Black. During its quarterly financial call VMware said it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology and another $2.1

Netflix, Google Talk Continuous Delivery at DevOps World

Information Week

Members of the Continuous Delivery Foundation discuss the formation of the open source organization and the future of continuous integration and delivery

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

Extract SCCM WIM from ISO and Configure for WDS via PowerShell

Mick's IT Blog

One issue, more like a time-waster, I have had as we are migrating to SCCM from MDT is getting the boot image on the WDS server. SCCM is not configured to manage WDS because we use it for other things, so we manually upload the WIM. SCCM creates an ISO that needs to be mounted to extract the WIM for WDS. Thanks to this blog post , it is explained. I wanted the steps automated, so I wrote the following PowerShell script that will perform all of the steps needed to extract and configure the WIM.

Recommendations for Oracle OpenWorld 2019

Flexagon

Oracle OpenWorld 2019 in San Francisco is coming up quickly. It’s the biggest Oracle event of the year with a lot of great presentations and amazing influencers. Flexagon’s President, Dan Goerdt, is a conference veteran, attending and speaking at over 10 events in 2019. I sat down to ask Dan about what he is most. The post Recommendations for Oracle OpenWorld 2019 appeared first on Flexagon.

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Network World

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the pattern of ransomware attacks on local governments, how municipalities have responded and how to prevent a ransomware attack in the first place

Outlook is Good for Health Care, Thanks to Big Data

Information Week

Technology improvements in recent years are making it possible to overcome the decades of siloed, inaccessible, consumer data

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

Batch file wait for process using PowerShell integration

Mick's IT Blog

Recently, I wanted a simple batch file to run the ccmsetup.exe file. I could have used PowerShell, but for debugging the parameters, I wanted it quick and easy to modify. One of the issues I had was getting the batch script to wait for the ccmexec.exe to install before proceeding. I saw some batch solutions that seemed to be kind of cumbersome. I decided to write a PowerShell one-liner that would continuously loop until the desired process ended.

86

How to Incentivize Recycling

Galido

Information Technology Blog - - How to Incentivize Recycling - Information Technology Blog. Recycling App Combines Incentives to Win money into your google or apple pay account instantly. We have heard it all. Lets cut to the chase. Recycling is boring and sweepstakes have such a bad reputation, they can nearly all be considered a scam. Society is moving towards a more open and transparent network utilizing blockchain technology.

How to avoid using RDP in Windows

Network World

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how

Beat the Odds: How to Conquer Common AI Challenges

Information Week

Some of the keys to success with an AI implementation may seem basic, but they really can make a difference

The Beauty and Brains of Actionable Data: How to Go From Concept to Reality

Speaker: Dr. Joe Perez, Senior Systems Analyst at NC Dept. of Health & Human Services, and Chief Technology Officer at SolonTek

Join Dr. Joe Perez, Senior Systems Analyst at NC DHHS, and Chief Technology Officer, SolonTek, to learn how you can capitalize on your ideas by blending internal with external while leveraging them into a cohesive strategy for both the short term and the long term.

5 steps to creating a recruiting dashboard (template included)

Hacker Earth

Recruitment is at the core of any organization. It is a well-known fact that today’s recruitment strategies are highly data-driven. Recruitment metrics such as the number of applications, screening calls, interviews, and more are often tracked in an Excel sheet. However, making sense of all the recruitment data your organization collects can be a daunting task, even for the most tech-savvy recruiters. This is where a recruitment dashboard comes in handy.

The Best “Scorecard” Quotes of “Digital Master” Aug. 2019

Future of CIO

" D igital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Agile 52

Finding Answers In Your Data Should Not Be a Chore

Perficient Data & Analytics

I hate looking for clothes to wear, especially if I’m in a hurry. Sometimes life gets crazy and my favorite shirt may still be in the dryer, or I can’t find the match to a sock I already have in my hand. Something easy can turn into a chore very quickly when things aren’t organized. That is how I feel a lot of the time when it comes to data. How many times have you asked a data-related question that there is no answer to?

10 RPA Vendors to Watch

Information Week

Robotic process automation offers enterprises a way to leapfrog to the benefits of digital transformation. Here are 10 vendors that can help in your efforts

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.