Sat.Sep 21, 2019 - Fri.Sep 27, 2019

The CIO’s Guide to Blockchain

CEB IT

More than $4 trillion in goods are shipped globally each year. The 80% of those goods carried via ocean shipping creates a lot of paperwork. Required trade documentation to process and administer all the goods is approximately one-fifth of the actual physical transportation costs.

Why employees still fall for phishing emails

Tech Republic Security

Nearly half of office workers said they had their data compromised. Here's why they keep falling for phishing scams

Data 114

How CIOs Can Help Their Workforce Thrive

Information Week

IT leaders must remember that in our ever-changing world, keeping employee skills sharp and ensuring they have the resources they need to stay current is key

4 Ways to Help IT Teams Think Strategically

CEB IT

In 1950, 30% of the world’s population lived in cities; today, that number is 55% and is expected to rise to 68% by 2050, according to the United Nations. Although the growth of megacities will have far-reaching effects on all aspects of business, it requires IT infrastructure and operations (I&O) teams to adopt an “ infrastructure everywhere ” mindset and remain agile to cope with a huge array of future demands.

Survey 148

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Financial impact of ransomware attacks increasing despite overall decrease in attacks

Tech Republic Security

Vulnerabilities originally discovered by US government security services have been used by cybercriminals against municipalities, costing taxpayers an estimated $11.5 billion in 2019

More Trending

How to Stay Connected When Your Phone Has No Service

Galido

Information Technology Blog - - How to Stay Connected When Your Phone Has No Service - Information Technology Blog. On some occasions, your mobile network is weak and communication is hindered.

Why Healthcare is Moving to Cloud: Enhanced Consumer Experiences

Perficient - Digital Transformation

The following is the fourth blog in a series about why healthcare organizations are moving to the cloud. In this series so far, we have looked at how the cloud brings robust data security , the time and cost savings the cloud brings , and the ways cloud connects data for healthcare organizations.

Cisco: 13 IOS, IOS XE security flaws you should patch now

Network World

Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible. All of the vulnerabilities – revealed in the company’s semiannual IOS and IOS XE Software Security Advisory Bundle – have a security impact rating (SIR) of "high".

Financial Service Firms Need To Stop Thinking Like Retailers On Personalization

Forrester IT

Many financial services firms say that they are already delivering on personalization and view improving their personalization capabilities and technology further as a top priority.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Why a cloud computing degree makes sense

David Linthicum

I used to teach computer science as an adjunct at Northern Virginia Community College back in my 20s. I learned more teaching others than I ever did being taught. My focus was on the pragmatic—what students could sell in the labor marketplace. Recently the governor of Virginia, my home state, announced a cloud computing associate degree that will be offered at NVCC. This is in conjunction with AWS and expected to be offered at other state-run colleges as well. What is cloud computing?

Cloud 181

Determine Which Tech Trends Matter

CEB IT

Everyone can think of at least one well-known brand that went bankrupt recently because it severely underestimated the impact of digital on its business. Given the speed with which technology trends emerge and grow, it can be hard to differentiate between those that present real opportunities and those that could pose risks. Each technology trend can have different kinds of potential impact: broad and global, or narrow and niche. Trends don’t act in isolation.

Trends 151

Fix Zero Day Patch Missing from SCCM? How to Import into WSUS?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Whenever you have a Zero Day patch and you don’t have the patches in WSUS? What are the options you have as an SCCM admin to patch your Windows 10 devices?

Three Critical Metrics You Should Expect From A Vulnerability Risk Management Solution

Forrester IT

Many vulnerability risk management (VRM) solutions are limited and fail to provide meaningful metrics about the health of your VRM program. One example is the use of counting metrics such as the number of vulnerabilities identified in your organization.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Data centers can learn sustainability from the cloud

David Linthicum

Everyone wants a green data center, also known as a sustainable data center. There are both policy and technology pushes in this emerging space, such as countries that are encouraging voluntary reduction of a data center’s carbon footprint. For instance, Finland will be announcing a lower energy tax for data centers that show a certain degree of greenness. The big advantage of having data centers in colder climates is that not as much power is needed for cooling.

Analysts Answer: What Leadership Challenges Will CIOs Face in 2020?

CEB IT

The role of the CIO is evolving from technology expert to business strategist, and IT executives are facing some serious leadership challenges. Ahead of Gartner IT Symposium/Xpo 2019, Smarter With Gartner reached out to Gartner experts presenting at the conference to ask what leadership challenges IT leaders are facing and how to tackle them. A changing leadership mindset. Christie Struckman, VP Analyst.

Episode 2 @DrivingDig Tip of the Day: Agile Planning, Development, and Culture

Social, Agile and Transformation

As I am celebrating the launch of StarCIO Agile Planning, this month's @DrivingDig tweets are a mix of some of my early and best posts on agile development and planning. You'll see some themes in these posts.

Agile 138

The [Amazon] Doctor is in: Amazon Launches “Amazon Care” For Employees

Forrester IT

Amazon has gone live with Amazon Care, its new pilot healthcare service offering for employees.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Three Trends in E-commerce Payments to be Concerned About

Datacponomy

With ecommerce sales skyrocketing, the options for online transactions are manifold. But what are the problems that come with these many choices to pay? Find out.

Why smart home devices may be an open invitation to hackers

Tech Republic Data Center

Recent breaches in Americans smart home systems have raised the level of concern with IoT devices

System 114

Hybrid cloud setup offers relief to some companies while others are still fearful

Tech Republic Security

TechRepublic's Karen Roby discusses the findings of a recent FileCloud study concerning enterprise cloud and data issues

Study 114

What does CX look like in India?

Forrester IT

It’s that time of the year again, when we publish results from our annual CX IndexTM survey – to benchmark the customer experience provided by major brands in India.

Survey 166

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

The Rise Of “Menstrual Surveillance” and the Fight for Data Privacy in Women’s Health

Datacponomy

Before you start using the next amazing new femtech innovation, you may want to weigh the benefits against your right to privacy. You might want to think twice before accepting that sweet employer incentive for participating in health monitoring.

Beginning Fuzz Cycle Automation: Improving Testing and Fuzz Development with Coverage Analysis

ForAllSecure

In my previous post , we covered using bncov to do open-ended coverage analysis tasks to inform our testing.

How to defend your organization against browser-hijacking malware and ransomware

Tech Republic Security

Network attacks more than doubled this past quarter versus the prior quarter, according to a new report from security provider WatchGuard

Run Your Business At The Speed Of Thought

Forrester IT

Whether you model your data and analytics practice around an insights-driven strategy or are transitioning your business to run on algorithms, these visions have greater implications than our technology heritage has prepared us for.

Tackle Security Concerns for Application Modernization

Perficient - Digital Transformation

In our previous post, Create Your Transformation Roadmap for Application Modernization , we offered guidance to prepare your organization for successful cloud adoption. Part 2 of this series addresses some of the security concerns you may stumble upon in your cloud journey.