Sat.Jan 05, 2019 - Fri.Jan 11, 2019

Autonomous Testing Is Like Autonomous Driving: The AI Needs Human Assistance

Forrester IT

The US Society of Automotive Engineers (SAE) has defined a scale to describe the autonomous capabilities that self-driving cars have — i.e., their levels of automation. link] Level 5 is full automation, which allows self-driving cars to operate with no human assistance.

10 CIO Resolutions for 2019

CEB IT

It’s the beginning of a new year — the time for CIOs to take stock of their personal development goals for 2019.

Budget 207

This one skill will make you a data science rockstar

Eric D. Brown

Want to be a data science rockstar? of course you do! Sorry for the clickbait headline, but I wanted to reach as many people as I can with this important piece of information. Want to know what the ‘one skill’ is?

Data 200

Moving to the cloud? 3 critical data efforts you must make

David Linthicum

I’m often taken back by the number of enterprises moving the cloud that have not considered data modernization as part of their cloud migration strategy. I know why: the money. However, not doing data modernization as part of moving to the cloud will cost you much more than you think you are saving. Data should be a first-class citizen when it comes to your cloud effort. While the number of things to think for cloud migration about gets longer, don’t let data fall of your radar.

Report 183

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Channel Data Is A Competitive Differentiator

Forrester IT

Leverage Channel Data To Give Partners A Better Experience: Winning In The Channel Requires Data-Driven Program Innovation Brands that provide an enhanced partner experience grow faster than their peers, are more profitable, and drive higher customer satisfaction and retention downstream.

Data 221

More Trending

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […]. Blockchain and Cryptocurrency CTO News

Cloud migration checklist: The 3 key areas to focus on

David Linthicum

2019 is the year that enterprises are hitting the accelerator on their cloud migrations. Last year, the typical company wanted 100 or so workloads in the cloud at the end of 2018. This year, the goal is to move well over a 1,000 by the end of 2019. To read this article in full, please click here (Insider Story

Blockchain And GDPR: Not Mutually Exclusive But Can Be A Toxic Blend

Forrester IT

Depending on who you listen to, the combination of GDPR and distributed ledger technology (DLT, AKA blockchain) is either a poisonous cocktail or a magic potion.

How "Big Iron" Does "Big Regulation"

Cloud Musings

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those identified as confirm data breaches. A Ponemon Institute study also showed that companies experiencing a data breach took an average of 147 days to detect that breach.

HP 160

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Announcing OODA: A Company Addressing Next Generation Security Challenges

CTOvision

Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC. I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […]. Artificial Intelligence CTO Cyber War News

The Evolution of Enterprise Architecture

CEB IT

The most consistent pattern of digital business is making IT less about individual technologies, and more about technology-enabled business models and solutions. For today's enterprise architectur e (EA), this same pattern is inspiring architects and technology innovation leaders to design and deliver new operating models, with business outcomes now at center stage.

16 Retail Trailblazers To Learn From In 2019

Forrester IT

On our morning news feeds, we see headlines chock-full of emerging tech that is supposedly changing the game for next generation retail experiences.

Retail 197

How Should CIOs Give Negative Feedback?

The Accidental Successful CIO

It’s critical the CIOs give negative feedback, but they need to do it correctly Image Credit: Daniel Friedman. We’ve all been there.

Course 130

New tool automates phishing attacks that bypass 2FA

CTOvision

A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […]. Cyber Security News

Tools 150

Foto Friday – On the way to Zion National Park

Eric D. Brown

I call this one “On the way to Zion” Captured with Canon 5D and Canon 17-40 handheld on the way into Zion National Park. See more photos in my 500px portfolio.

148
148

China Takes the Moonshot Advantage

Forrester IT

The origin of the term used to describe the most advanced, disruptive innovations has returned again as an innovation focus of its own. Last week, the China National Space Administration disrupted its competitors, like NASA, by landing its Chang’e-4 spacecraft on the dark side of the moon.

Cloud migration checklist: The 3 key areas to focus on

David Linthicum

2019 is the year that enterprises are hitting the accelerator on their cloud migrations. Last year, the typical company wanted 100 or so workloads in the cloud at the end of 2018. This year, the goal is to move well over a 1,000 by the end of 2019. To read this article in full, please click here (Insider Story

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based based hotel chain revealed in an online […]. Cyber Security News

Hotels 143

4 Ways to Measure Marketing Campaigns You (Probably) Haven’t Considered

Datacponomy

When we need to measure marketing campaigns, most of us have cracked online campaign tracking – we have a cookie or a user ID that we can use to clearly track user behaviour through to conversions, and develop robust datasets. But out in the offline world, there are powerful channels.

Akamai Purchases Janrain

Forrester IT

Today, Akamai announced that it has acquired Portland, Oregon-based Janrain. Although the financial terms were not disclosed, Forrester estimates the purchase price to be in the $250M–$275M range, based on typical M&A SaaS revenue multiples of 4X to 6X and Forrester’s estimation of Janrain’s annual revenue. Founded in 2003, Janrain was one of the first […

Moving to the cloud? 3 critical data efforts you must make

David Linthicum

I’m often taken back by the number of enterprises moving the cloud that have not considered data modernization as part of their cloud migration strategy. I know why: the money. However, not doing data modernization as part of moving to the cloud will cost you much more than you think you are saving. Data should be a first-class citizen when it comes to your cloud effort. While the number of things to think for cloud migration about gets longer, don’t let data fall of your radar.

Report 102

Malvertising Campaign Delivers Info-Stealer Plus Ransomware

CTOvision

Security researchers have warned users of P2P sites of a new malvertising campaign featuring a twin threat: info-stealing malware and ransomware. By registering rogue advertising domains, the attackers are able to direct torrent site visitors to two different exploit kits: Fallout EK and GrandSoft EK, according to Malwarebytes. Those unlucky enough to be pushed according to geolocation […]. Cyber Security News

PowerShell One-Liner to Enable Features in Microsoft Windows 1809

Mick's IT Blog

In Windows 10 1809, I needed to enable some RSAT features that are now included in the OS. I figured this would be a good time to go from using a script to using one-liners for the build process. Mike Robbins's blog was a good start to developing this one-liner.

The Laws of Identity

Phil Windley

Summary: In this post, I make a case that Sovrin not only conforms to Kim Cameron's Seven Laws of Identity, but constitutes the identity metasystem he envisioned in 2004. In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF).

Agile Mindsets: Don't try to get a perfect architecture; Plan to get it wrong

Social, Agile and Transformation

I still find teams that have adopted scrum and other agile practices, but still strive for perfection when trying to conceive architectures and implementation plans. Some will also try to think through every edge case to ensure that designs are fully future-proofed. This is an unrealistic proposition for most teams and people. There's too many unknowns, too much complexity, and businesses do.

SCRUM 126

German cyber-attack: man admits massive data breach, say police

CTOvision

A 20-year-old man has admitted to police that he was behind one of the country’s biggest data breaches, in which the private details of almost 1,000 public figures were leaked. The man, who lives with his parents in the central German state of Hesse and is still in the education system, told police he had acted […]. Cyber Security News

In the Digital Evolution of Entertainment, Data Gets a Starring Role

Datacponomy

The digital revolution has completely changed the way we buy and rent movies. Netflix, Amazon, Apple, Google and other on-demand entertainment service providers have made the brick-and-mortar video stores irrelevant.

Apple 88

Most CEOs Don't Know Where to Deploy AI Within their Business

Information Week

Think through your customer and supplier relationships, as well as your operational efficiency to identify the best areas for artificial intelligence

How edge computing can help secure the IoT

Network World

Data created by Internet of Things (IoT) sensors must be secured better, say some. A simple password-on-device solution is no longer sufficient thanks to increasing data protection regulations, a new public awareness of tracking, and hugely proliferating devices.