Sat.Jan 05, 2019 - Fri.Jan 11, 2019

Autonomous Testing Is Like Autonomous Driving: The AI Needs Human Assistance

Forrester IT

The US Society of Automotive Engineers (SAE) has defined a scale to describe the autonomous capabilities that self-driving cars have — i.e., their levels of automation. link] Level 5 is full automation, which allows self-driving cars to operate with no human assistance.

10 CIO Resolutions for 2019

CEB IT

It’s the beginning of a new year — the time for CIOs to take stock of their personal development goals for 2019.

Budget 190

This one skill will make you a data science rockstar

Eric D. Brown

Want to be a data science rockstar? of course you do! Sorry for the clickbait headline, but I wanted to reach as many people as I can with this important piece of information. Want to know what the ‘one skill’ is?

Data 200

Moving to the cloud? 3 critical data efforts you must make

David Linthicum

I’m often taken back by the number of enterprises moving the cloud that have not considered data modernization as part of their cloud migration strategy. I know why: the money. However, not doing data modernization as part of moving to the cloud will cost you much more than you think you are saving. Data should be a first-class citizen when it comes to your cloud effort. While the number of things to think for cloud migration about gets longer, don’t let data fall of your radar.

Report 175

Channel Data Is A Competitive Differentiator

Forrester IT

Leverage Channel Data To Give Partners A Better Experience: Winning In The Channel Requires Data-Driven Program Innovation Brands that provide an enhanced partner experience grow faster than their peers, are more profitable, and drive higher customer satisfaction and retention downstream.

Data 216

Announcing OODA: A Company Addressing Next Generation Security Challenges

CTOvision

Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC. I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […]. Artificial Intelligence CTO Cyber War News

More Trending

Cloud migration checklist: The 3 key areas to focus on

David Linthicum

2019 is the year that enterprises are hitting the accelerator on their cloud migrations. Last year, the typical company wanted 100 or so workloads in the cloud at the end of 2018. This year, the goal is to move well over a 1,000 by the end of 2019. To read this article in full, please click here (Insider Story

Blockchain And GDPR: Not Mutually Exclusive But Can Be A Toxic Blend

Forrester IT

Depending on who you listen to, the combination of GDPR and distributed ledger technology (DLT, AKA blockchain) is either a poisonous cocktail or a magic potion.

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […]. Blockchain and Cryptocurrency CTO News

The 5 Digital Transformation Identities of Financial Services Organizations

CEB IT

One-third of financial services CIOs identified digital as their top business priority for 2019, up by more than 8% from last year, according to Gartner. Digital business usually means different things for financial services CIOs,” says Juergen Weiss , Practice Vice President at Gartner. “We

Foto Friday – On the way to Zion National Park

Eric D. Brown

I call this one “On the way to Zion” Captured with Canon 5D and Canon 17-40 handheld on the way into Zion National Park. See more photos in my 500px portfolio.

148
148

16 Retail Trailblazers To Learn From In 2019

Forrester IT

On our morning news feeds, we see headlines chock-full of emerging tech that is supposedly changing the game for next generation retail experiences.

Retail 167

New tool automates phishing attacks that bypass 2FA

CTOvision

A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […]. Cyber Security News

Tools 150

The Evolution of Enterprise Architecture

CEB IT

The most consistent pattern of digital business is making IT less about individual technologies, and more about technology-enabled business models and solutions. For today's enterprise architectur e (EA), this same pattern is inspiring architects and technology innovation leaders to design and deliver new operating models, with business outcomes now at center stage.

How Should CIOs Give Negative Feedback?

The Accidental Successful CIO

It’s critical the CIOs give negative feedback, but they need to do it correctly Image Credit: Daniel Friedman. We’ve all been there.

Course 130

China Takes the Moonshot Advantage

Forrester IT

The origin of the term used to describe the most advanced, disruptive innovations has returned again as an innovation focus of its own. Last week, the China National Space Administration disrupted its competitors, like NASA, by landing its Chang’e-4 spacecraft on the dark side of the moon.

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based based hotel chain revealed in an online […]. Cyber Security News

Hotels 143

PowerShell One-Liner to Enable Features in Microsoft Windows 1809

Mick's IT Blog

In Windows 10 1809, I needed to enable some RSAT features that are now included in the OS. I figured this would be a good time to go from using a script to using one-liners for the build process. Mike Robbins's blog was a good start to developing this one-liner.

4 Ways to Measure Marketing Campaigns You (Probably) Haven’t Considered

Datacponomy

When we need to measure marketing campaigns, most of us have cracked online campaign tracking – we have a cookie or a user ID that we can use to clearly track user behaviour through to conversions, and develop robust datasets. But out in the offline world, there are powerful channels.

Akamai Purchases Janrain

Forrester IT

Today, Akamai announced that it has acquired Portland, Oregon-based Janrain. Although the financial terms were not disclosed, Forrester estimates the purchase price to be in the $250M–$275M range, based on typical M&A SaaS revenue multiples of 4X to 6X and Forrester’s estimation of Janrain’s annual revenue. Founded in 2003, Janrain was one of the first […

Malvertising Campaign Delivers Info-Stealer Plus Ransomware

CTOvision

Security researchers have warned users of P2P sites of a new malvertising campaign featuring a twin threat: info-stealing malware and ransomware. By registering rogue advertising domains, the attackers are able to direct torrent site visitors to two different exploit kits: Fallout EK and GrandSoft EK, according to Malwarebytes. Those unlucky enough to be pushed according to geolocation […]. Cyber Security News

Agile Mindsets: Don't try to get a perfect architecture; Plan to get it wrong

Social, Agile and Transformation

I still find teams that have adopted scrum and other agile practices, but still strive for perfection when trying to conceive architectures and implementation plans. Some will also try to think through every edge case to ensure that designs are fully future-proofed. This is an unrealistic proposition for most teams and people. There's too many unknowns, too much complexity, and businesses do.

SCRUM 125

In the Digital Evolution of Entertainment, Data Gets a Starring Role

Datacponomy

The digital revolution has completely changed the way we buy and rent movies. Netflix, Amazon, Apple, Google and other on-demand entertainment service providers have made the brick-and-mortar video stores irrelevant.

Apple 84

The Laws of Identity

Phil Windley

Summary: In this post, I make a case that Sovrin not only conforms to Kim Cameron's Seven Laws of Identity, but constitutes the identity metasystem he envisioned in 2004. In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF).

German cyber-attack: man admits massive data breach, say police

CTOvision

A 20-year-old man has admitted to police that he was behind one of the country’s biggest data breaches, in which the private details of almost 1,000 public figures were leaked. The man, who lives with his parents in the central German state of Hesse and is still in the education system, told police he had acted […]. Cyber Security News

How to Handle SCCM Bandwidth Issues with Branch Cache Vs Peer Cache

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In the current world of IT, organizations look for lower operating expenses are investigating technology solutions that can directly lower costs and improve productivity and value add to the business.

How To 110

A Primer to GDPR, Blockchain, and the Seven Foundational Principles of Privacy by Design

Datacponomy

Throughout my ongoing meetings and conferences about the GDPR and how it relates to cutting-edge technologies, I encounter many ‘add-on’ privacy solutions such as ‘secure your Office 365’, ‘breach detection’ and ‘fix your network.’

Focus on creating ‘Sufficient Positive Momentum’ on your journey

Trends in the Living Networks

In the week before Christmas I was invited onto the Entrepreneurs TV show, in a wrap-up program looking back at the world of entrepreneurship in 2018 and forward to what to expect in 2019.

IoT Applications in Consumer Healthcare

CTOvision

Read Carrie Cosgrove’s article about the Internet of Things applications in consumer healthcare on IoT for All : Have you been to a doctor at any point in your life? Congratulations, if you answered “yes,” you’re a healthcare consumer! Nearly 85 percent of US adults see a healthcare provider at least once a year and US children […]. CTO Internet of Things News

How edge computing can help secure the IoT

Network World

Data created by Internet of Things (IoT) sensors must be secured better, say some. A simple password-on-device solution is no longer sufficient thanks to increasing data protection regulations, a new public awareness of tracking, and hugely proliferating devices.