Sat.Jan 27, 2018 - Fri.Feb 02, 2018

Don’t worry about selecting the ‘wrong’ public cloud

David Linthicum

When I speak in public about cloud architecture, I’m often asked a question with no right answer: “Which public cloud should we use?” Not knowing much about what “we” is, there is no right answer. While I can list the top two players, they may be wrong for “we’s” problem domain when taking into account special issues such as performance requirements, security, and compliance.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

How to Raise Your Series A

The Investing Edge

Early stage investing has remained exciting and seen healthy, even increasing , capital flows since 2010. While it is defined differently by different venture industry participants, at Ascent, we separate angel and seed into a separate category that comes before the early stage.

B2B 130

CIOs Struggle To Deal With The Challenge Of Doxing

The Accidental Successful CIO

Your emails are safe from prying eyes, aren’t they? Image Credit: AJC1.As CIO, we are aware of the importance of information technology and all of the threats that our firms are facing on an almost daily basis.

Budget 163

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

One cloud accounting dilemma will soon be fixed

David Linthicum

You know cloud computing is here to stay when the accountants take notice. The Financial Accounting Standards Board’s Emerging Issues Task Force plans to propose new rules for how to deal with cloud computing service costs. The updated guidance means that a customer under contract with a cloud computing provider would consider the current processes of leveraging internal-use software to determine how to recognize implementation costs as an asset.

More Trending

Skyhigh Networks: CASB Security


Skyhigh is now part of McAfee. Smart move there McAfee! Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. Cyber compliance framework NIST

Course 100

The CIO as a Cloud Supply Chain Manager


Transforming IT from engineers and builders. to assemblers and integrators Preface About 5 years ago, I wrote a GigaOm article, The CIO as the IT Supply Chain Manager. The focus was how cloud services would transform how CIOs shifted from Technology Builders to become Service Assemblers.

Agile 142

5 Awesome Data Science Subscriptions To Keep You Informed


If you ask a data scientist how to start or advance your data career, one of the first things they might tell you is to read. Not the answer you’d expect? You’d be surprised! The rapidly evolving nature of data science calls for professionals to keep a close eye on.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Netskope: A leading provider of cloud security and CASB


Netskope is a highly regarded provider of Cloud Application Service Broker (CASB) capabilities. Their focus is cloud security. They help organizations understand online activities, protect data, stop threats, and respond to incidents.

IoT and the law of unintended consequences

Network World

You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news.

What to do when the CIO still doesn’t “Get it”?

Social, Agile and Transformation

I was asked this question twice last year as a keynote speaker, one time by Chief Data Officers and the other by millenials working in marketing and other digital roles. Their sentiment was that their CIO was too slow to implement modernized digital platforms, hadn't instrumented collaborative practices, or was just perceived as a "no person" when presented with new ideas and needs. Here's.

Agile 116

Big data basics for tech beginners


Despite big data currently ranking among top business intelligence and data analytics trends, businesses continue to suffer from a lack of data-savvy talent. Research from BARC shows half of respondents reporting a lack of analytical or technical know-how for big data analytics. This is good news for tech beginners, however, The post Big data basics for tech beginners appeared first on Dataconomy. Big Data Resources

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

QuintessenceLabs Introduces Stronger Key Management Appliances


QuintessenceLabs (QLabs), in partnership with PKWARE, launched four virtual and hardware key management appliances as part of the company’s line of Smartcrypt appliances. These Smartcrpyt appliances are integrated with the QLabs' Trusted Security Foundation (TSF) solution, which includes a high speed random number generator, an advanced key and policy manager and an embedded FIPS 140-2 […]. Cyber Security PKWARE QuintessenceLabs

What is microsegmentation? How getting granular improves network security

Network World

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs. Network segmentation isn’t new. Companies have relied on firewalls , virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years.

Overview of Client Online Status in SCCM Console


I provided bit more details about Client online status & Types in SCCM console, related component, SQL tables, and Logs. As we all know, Client online status indicates whether the computer is online of offline.

My Service Design origin story

I'm not lost, I'm wondering

My background is more technical than what is traditionally considered “creative”, having received my B.S. in Electrical Engineering and spent the bulk of my career as an Army communications officer or a systems engineer designing comms and network systems. What you could call “old school high tech.” ” Most of my work was in text or technical system diagrams; the most visual aspect of my work and thought processes were expressed through mind maps.

Film 58

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

CTOvision Tech News 30 Jan 2018


This week we learned that Apple is working on new Macs. And this is exciting for us Mac fans. But story after story this week reminded us that we are living in a mobile world. Reports below cover a range of mobile stories including reports on how fitness tracking was revealing secret military installations, details […]. Artificial Intelligence Big Data Cloud Computing Cryptocurrency CTO Cyber Security News

Apple 87

AMD plans silicon fix for Spectre vulnerability

Network World

Comeback kid AMD announced on its quarterly earnings call that it intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019 with its new Zen 2 core. The company also said it will ramp up GPU card production to meet the insane demand these days thanks to cryptominers, although it said the biggest challenge will be to find enough memory to make the cards.

Reassign DPs Offset Days Phased Deployments with SCCM 1801


Microsoft SCCM product group released SCCM CB preview 1801 with loads of new features. I think they are getting all set for big bang SCCM CB 1802 production release with loads of new features.

Video 74

Digitalization Will Help Telecom, Cable, and Satellite Win Big

Perficient - Digital Transformation

As it stands, the outlook for broadcast, cable, and telecommunications providers looks very bright. In a Q3 2017 earnings call, John J. Stephens, senior executive vice president and chief financial officer of AT&T, said: “We continue to track well against our full-year guidance, and we continue to invest for the growth of our business and remain focused and optimistic about our long-term opportunities.”

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Garrison Technology CTO will Present on Network Isolation at Cross Domain Forum


Cross Domain Solutions (CDSs) enable secure transfer and receipt of data, information, and intelligence products on separate networks with different security levels. These services leverage capabilities, or solutions, that already exist throughout Defense (DoD) and the Intelligence Community (IC). There are many CDSs throughout the DoD and IC safely and securely protecting data as it […].

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default policy that allows access the internet, a solution that leaves open a possible path by which attackers can breach security.

IPv6 63

Download eBook on SCOM Reporting


SCOM comes with a verity of default reports. SCOM default reports will be available for you when you install a management group. These reports help you to review the operational telemetry and configurations.

eBook 67

Collaboration Helps Advance Energy Industry

Perficient - Digital Transformation

Energy companies continue to collaborate with other organizations to further research. For example, Shell recently opened a mobility research center at Tsinghua University in China.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.