Sat.Apr 13, 2019 - Fri.Apr 19, 2019

Stop Trying To Replace Your Agents With Chatbots — No, Seriously!

Forrester IT

Customer service organizations have been looking for ways to cut costs for decades. Now that chatbot mania has taken over, many are jumping on the bandwagon and attempting to replace their human agents with chatbots.

219
219

3 things about cloud and IoT you need to consider

David Linthicum

The internet of things (IoT) and cloud-based providers are bound at the hip. That said, most people don’t understand how, why, or what to expect. I’ve been asked some good questions that drove me to do some research and testing. Perhaps the answers are of interest to you as well. Do you store the data in the cloud or the IoT device? This depends on a lot of things, but I have two rules of thumb: [ InfoWorld explains: What is multicloud? The next step in cloud computing. |

The CIO’s Guide to Quantum Computing

CEB IT

It makes sense that sci-fi-level myths might surround a technology that must be stored in a container colder than interstellar space and has the potential to solve some of the world's most challenging problems. CIOs have been inundated with quantum computing hype: “Quantum computers will operate faster than the speed of light,” or “Quantum computers will replace conventional systems” or “Quantum computing will render all security encryption algorithms obsolete.”.

“George Jetson” Returns

Cloud Musings

Add description He grew up in Silicon Valley, landed his first job at Apple Computers, was introduced to Nobel Prize winners by his dad and today, he takes a self-driving car to work so that he can squeeze in a few morning conference calls with the US east coast Team. Is this George Jetson!?

Apple 178

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Want To Launch An Extended Reality (XR) Experience? Start With Employee Use Cases

Forrester IT

After returning from Mobile World Congress in Barcelona last year, where I walked miles to test every virtual reality (VR) and augmented reality (AR) experience, one thing was clear: They aren’t ready for mainstream consumer use. But what about for employees?

Mobile 216

More Trending

Increase Retention With a Customer Success Mindset

CEB IT

When the sales team lands a new account, product marketer Monika knows her job has just begun.

Infographic: AI powered Chatbots

CTOvision

Chatbots are rapidly becoming part of our every day lives and proving to be a very valuable tool for companies across a wide range of industries. As such, AI-enabled chatbots are increasingly being used on the front line of customer engagement. They can be integrated into customer support service teams to answer common or basic […]. Artificial Intelligence Big Data and Analytics News ai artificial intelligence chatbot chatbots infographic machine learning use case use cases

Future of Retail: How Brands Should Handle Automation In 2019

Forrester IT

To help retailers and brands plan for 2019, Claudia Tajima and I are interviewing our Forrester peers to discover how their 2019 predictions will affect retail for our series: “Applying 2019 Predictions to Retail.” Recently, Claudia interviewed J.P.

Retail 210

SCCM Third-Party Software Updates Setup Step by Step Guide Post 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. SCUP helped many of us to deploy third-party software updates for many years. Now, SCCM doesn’t require SCUP to deploy Third-party updates. Let’s dive into the SCCM third-party software updates setup.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

CIO Power Politics: What Role Should IT Leaders Take in a Conflict? [Video]

CEB IT

It’s not uncommon for CIOs to be caught in a conflict they would rather avoid. But navigating these experiences is often part of the job. The question becomes not “Do I get involved?” but rather, “What’s the best role for me in a conflict?”. Discover Your Leadership Style: Take the Wolf CIO Quiz.

Video 176

Warning: Internet Explorer Just Became A Silent But Serious Threat To Every Windows User

CTOvision

Security researcher John Page warns that Microsoft’s Internet Explorer has a critical security flaw that allows hackers to spy on you and steal personal data from your PC. That warning may seem irrelevant to you since Internet Explorer was officially discontinued in 2015. It’s now an archaic web browser, only in use by about 7% […]. Cyber Security News

It’s Time For Shift-Left Performance Testing

Forrester IT

Developers: Performance Testing Deserves Your Attention! Developers, you have to stop treating performance testing as an afterthought.

Survey 183

BLOCKCHAIN-POWERED LOGISTICS ?: A NEW ERA FOR SHIPPING AWAITS?

Datacponomy

Much like other industries struggling to stay afloat in the stormy waters of the global economy, the shipping industry is seeking its own transformation after years of overcapacity and tumbling freight rates.

IBM 114

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

How to Change Office 365 Update Channel with SCCM Run Script

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. My name is Sharad Singh, and I have more 15 years of experience in IT and SCCM technologies, MS Intune. This post is my first one here in this blog!

How To 114

How Business Transformation is Fundamentally Different from Innovation

Social, Agile and Transformation

An interesting debate transpired during the last #CIOChat on Thursday at 2pm around Myles Suer's question, "How is #innovation fundamentally different from business transformation?" I had significant feedback to my tweets and decided to dedicate this week's blog post to detail my perspective. I provided a two-tweet answer require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl". about me digital transformation innovation

Innovate Your Business Model To Drive An Experience Advantage

Forrester IT

Leading companies recognize that complacency is the enemy of success. They also recognize that, to maintain a differentiated advantage over their competitors, they must do more than incrementally fix and improve existing experiences.

IoT security market to reach $35.2 bn by 2023: Report

CTOvision

According to a new market research report published by MarketsandMarkets, the global Internet of Things (IoT) Security Market size is expected to grow from USD 8.2 billion in 2018 to USD 35.2 billion by 2023, at CAGR of 33.7 percent during the forecast period. Major factors driving the growth of the market are the increasing number […]. Cyber Security News

Report 110

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Survive and Thrive With Digital Transformation

Cloud Musings

First cloud computing then multi-cloud. How can we get ahead of this digital transformation nightmare? These are the laments heard in conference rooms and board meeting around the world.

Dell 148

Distributed Data Caching Using Big Data

Datacponomy

The advent of the emerging sector of Big Data has brought with it the promise of highly scalable databases to handle terabytes of data at a time.

Assessing Your Digital Maturity — What Does Excellence Look Like?

Forrester IT

Wall Street loves a digital business. These technology-driven innovators, which put customer acquisition, retention, and experience at the center, have a different way of looking at the world. They are rewarded with growth and investment. And it’s not just digital natives.

Microsoft admits Outlook.com hackers were able to access emails

CTOvision

Microsoft has admitted that its Outlook.com security breach was worse than the company initially revealed. The software maker started notifying some Outlook.com users late on Friday night that a hacker was able to access accounts for months earlier this year. Microsoft’s notification revealed that hackers could have viewed account email addresses, folder names, and subject […]. Cyber Security News

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Cisco Talos details exceptionally dangerous DNS hijacking attack

Network World

Security experts at Cisco Talos have released a report detailing what it calls the “first known case of a domain name registry organization that was compromised for cyber espionage operations.” Talos calls ongoing cyber threat campaign “Sea Turtle” and said that state-sponsored attackers are abusing DNS to harvest credentials to gain access to sensitive networks and systems in a way that victims are unable to detect, which displays unique knowledge on how to manipulate DNS, Talos stated.

3 Change Management Strategies to Drive Digital Transformation Success

Perficient - Digital Transformation

Digital transformation causes disruption because it holistically changes an organization. It changes the way people work, a company’s essence, and how it operates. Consequently, it sometimes even changes the culture. Change management ’s role is to help along the entire journey.

Justifying your investment in the people and awareness side of security

Forrester IT

Investment into changing security culture and behavior via security awareness and training (SA&T) , if done correctly, has the ability to transform your security team’s function and reach. We need to invest in these people related initiatives to harden ever important human firewall.

OODA Produces A Traveling Executive’s Guide to Cybersecurity

CTOvision

We have written before about the importance of all of us recognizing that we are in a cyber conflict. The fact is that we are all targets. We all have to keep our wits about us. This includes tracking the cyber threat and best practices to mitigate the threat. A period of significantly enhanced vulnerability […]. CTO Cyber Security Cyber War News

Travel 102

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.