Sat.Feb 02, 2019 - Fri.Feb 08, 2019

The CIO’s Guide to Artificial Intelligence

CEB IT

A chatbot that answers consumers’ questions and directs them to the appropriate place or person is a common example of artificial intelligence (AI), and one most people have experienced personally. But it’s just one way to apply AI technologies.

New Tech Spotlight: Let’s Get Real About Extended Reality

Forrester IT

This morning I came across a story about Warby Parker’s new “virtual try-on” capability. It seems the 8-year old eCommerce company is dipping it’s toes back into augmented reality (AR).

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. The time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […]. Cyber Security Disruptive IT information technology National security

Why cloud computing suddenly seems so hard and expensive

David Linthicum

A survey of 100 IT decision-makers in companies with 500 or more employees conducted by NetEnrich found that 85 percent claimed either moderate or extensive production use of cloud infrastructure. What’s not surprising, and what I’ve been saying here, 80 percent stated that they have moved at least a quarter of all workloads to the public cloud. But there is trouble in paradise.

Survey 191

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

The Recipe for a Digital Workplace

CEB IT

A digital workplace enables new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies.

Agile 195

More Trending

Booz Allen’s Cyber threat analysis provides actionable recommendations for business and governments

CTOvision

Booz Allen has just released a report we would like to endorse and most highly recommend you review. Their 2019 Cyber Threat outlook is particularly relevant because it is informed by real practitoners. This is our favorite kind of asesssment since practitoners have skin in the game. Booz Allen is also in a good position […]. CTO Cyber Security News

The cloud’s weakest security links aren’t where you're looking

David Linthicum

You pride yourself on your cloud computing security strategy and tool stack. Indeed, your system made up of many security solutions is both proactive, and self-updating. So, you’ll never have to worry about new security attacks that you’re not prepped to defend—well, almost.

A Data and Analytics Leader’s Guide to Data Literacy

CEB IT

Imagine an organization where the marketing department speaks French, the product designers speak German, the analytics team speaks Spanish and no one speaks a second language. Even if the organization was designed with digital in mind, communicating business value and why specific technologies matter would be impossible. That’s essentially how a data-driven business functions when there is no data literacy.

Data 159

Join our 2019 Search Marketing Survey

Forrester IT

I am pleased to announce that Forrester and SEMPO (Search Engine Marketing Professional Organization) are partnering for the second year in a row to field a Search Marketing Survey.

Survey 202

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Sophisticated new phishing campaign targets the C-suite

CTOvision

A new phishing campaign to steal login credentials is being launched on businesses – specifically the C-suite. Researchers at GreatHorn first discovered the campaign which targets senior executives by claiming to be from the company’s CEO. The fake email regards the rescheduling of a board meeting. By following the link from this email and users are greeted […]. CTO Cyber Security News

Why cloud computing suddenly seems so hard and expensive

David Linthicum

A survey of 100 IT decision-makers in companies with 500 or more employees conducted by NetEnrich found that 85 percent claimed either moderate or extensive production use of cloud infrastructure. What’s not surprising, and what I’ve been saying here, 80 percent stated that they have moved at least a quarter of all workloads to the public cloud. But there is trouble in paradise.

Survey 154

CIOs Want To Know: Is Tape Making A Comeback?

The Accidental Successful CIO

Is it time for magnetic tape to come back as a storage option? Image Credit: Scott Beale. Securing the company’s data is one of the primary jobs of the person with the CIO job.

Backup 130

Stop Trying To Be Uber Or Upgrade How You Collect Customer Feedback

Forrester IT

This is part 2 of my blog series on the future of CX measurement (part 1, part 3, and part 4). If you think of the app of ride-sharing giant Uber as an example of how to collect customer feedback, think again. For those who haven’t used it recently, here is how it works. After a […

Ransomware in 2019 and beyond: Don’t get complacent

CTOvision

Read why Nathan Eddy says that infosec and IT teams should expect more sophisticated ransomware attacks on Healthcare IT News : Although much of the buzz about ransomware has quieted down in the days since the NotPetya and WannaCry attacks, the threat persists and hospital IT and security teams should remain vigilant. Just like phishing attacks […]. CTO Cyber Security News

The cloud’s weakest security links aren’t where you're looking

David Linthicum

You pride yourself on your cloud computing security strategy and tool stack. Indeed, your system made up of many security solutions is both proactive, and self-updating. So, you’ll never have to worry about new security attacks that you’re not prepped to defend—well, almost.

The Accidental Successful CIO Podcast Now Available!

The Accidental Successful CIO

Good news! The Accidental Successful CIO blog is now being supported by a brand new podcast called (what else) “The Accidental Successful CIO” This new podcast is available on the Anchor podcasting service (just purchased by Spotify!). If you don’t have time to read the latest The Accidental Successful CIO updates, then listen to them! Click here to visit the podcast’s home page. Happy listening! The post The Accidental Successful CIO Podcast Now Available!

100
100

We Passed “Peak Survey Effectiveness” In CX Measurement — What Now?

Forrester IT

This is part 1 of my blog series on the future of CX measurement (read part 2, part 3, and part 4). CX pros can learn a lot from the inverted U theory. It describes that more is better. until it isn’t. This theory is also called the Yerkes-Dodson law, and Malcolm Gladwell […

Survey 191

IoT Revolution: 5 Ways the Internet of Things Will Change Transportation

CTOvision

Read Taylor Donovan Barnett explain how the Internet of Things will change transportation on Interesting Engineering : Data influences every aspect of your life. If not completely already, the technological landscape will be completely data-centric in the near future. The device you are reading this article on probably collects your data to optimize your user experience. Or, […]. CTO News

Can Big Data Help Provide Affordable Healthcare?

Datacponomy

Big Data and AI can help with the growing care provider shortage. Here is how and why. One percent of the global population possesses 40-percent of all the world’s wealth, a persistent issue for which economists and politicians have debated about for some time.

SD-WAN creates new security challenges

Network World

SD-WAN products have been available for the better part of five years. Early adopters of the technology focused primarily on transport-related issues such as replacing or augmenting MPLS with broadband. As any technology matures and moves out of the early adopter phase, the buying criteria changes — and SD-WAN is no different. In 2018, a ZK Research survey asked respondents to rank SD-WAN buying criteria, and security came out as the top response, well ahead of technology innovation and price.

WAN 73

How Digital And CX Teams Collaborate To Deliver On Brand Promise

Forrester IT

Take Practical Steps To Apply CX Disciplines To Digital Initiatives Odds are your firm is regularly seeking ways to improve customer experience (CX). You’re also likely embracing digital technologies to enable a more customer-driven, agile operating model.

The hidden truth about cyber crime: insider threats

CTOvision

Barely a day goes by without reports of another major cyber-attack. Whether the target is an illicit dating site, a leading business, charity or even the National Health Service (NHS), hackers have demonstrated a level of indiscriminate ruthlessness towards wreaking havoc and stealing confidential information. The ramifications of these attacks are profound. In September last year, […]. CTO Cyber Security News

Report 134

Critical questions to help define winning AI experiments

Social, Agile and Transformation

Remember the days when big data was the super buzzword and IT invested a ton of money and effort building up Hadoop clusters? Many of them learned the hard way that if you build it, the business may not come. In addition, when you have the infrastructure, you might not have the talent, cleansed data, or practices to demonstrate results. require(["mojo/signup-forms/Loader"], function(L) {. agile data AI big data data management innovation organizational change

Agile 100

Three-Step Scenario to Break Down Silos

Future of CIO

There are different definitions about silos, The segmenting or sectioning of work by skill/knowledge/type/etc is a necessary component of business operations. However, silo mentality often means keeping people’s mind static, keeping people separate rather than keeping work separate.

DiscoverOrg Shakes Up B2B Data Provider Market With Acquisition Of ZoomInfo

Forrester IT

B2B marketing data provider DiscoverOrg announced on February 4th that the company is buying ZoomInfo. Our snap analysis is this is a smart move that shakes up the market and bolsters DiscoverOrg’s position in it.

B2B 185

How to Unleash Blockchain into Your Supply Chain

CTOvision

Today’s supply chains are poised for a major disruption because of the evolving potential of blockchain technology in increasing efficiency, reducing liabilities, fighting counterfeiting, improving compliance and providing the ability to do precise targeted recalls. Thanks to a variety of use-cases in every stage of the supply chain, the industry is looking to unleash a […]. CTO News

How To 134

Handling Site Metadata with SXA Modules: Part 1

Perficient - Digital Transformation

Background. If you’re using Sitecore 9.0+, chances are high that you’ve heard of or are currently utilizing Sitecore Experience Accelerator to accessorize your instance.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? Great question! I’ve been working in information security for many years and have had the opportunity to fill a variety of roles.

The New Digital Model For Brand Experience

Forrester IT

The Journey From Energy To Experience In the summer of 2017, I, along with my Forrester colleagues, wrote up the results of our year-long endeavor to build an analytically sophisticated, data-driven framework for emotion-led branding.

Energy 184