Sat.Jan 11, 2020 - Fri.Jan 17, 2020

C-Suite Whispers: Considering an event-centric data strategy? Here’s what you need to know

Dataconomy

Digital transformation dominates most CIO priority lists pertaining to questions such as: How will digital transformation affect IT infrastructure? Will technology live on-premise or in the cloud? Depending on where that data lives, an organization requires different skill sets.

How CIOs Waste Their Employee’s Time

The Accidental Successful CIO

It’s what we don’t know that can cause time to be wasted Image Credit: Harry. As is the case with all CIO’s, you’d like to be the best boss that you can possibly be.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to deal with the impact of digital transformation on networks

Network World

Digital transformation has increased the importance of the network, particularly the edge, where customers, employees, cloud applications and IoT devices connect to the enterprise. The legacy static and non-differentiated network edge of years past is no longer sufficient for many reasons, so as companies embark on digital-transformation plans, their networks must evolve.

IT Hiring Hits a Tiny Speed Bump

Information Week

IT hiring in December lost momentum, but it looks like it might just be a momentary blip. Here's why CompTIA remains confident about IT jobs

78

Facebook Causes Continue to Show Little Promise as Fundraising Tools

Understand 'as is' before you migrate to the cloud

David Linthicum

You’ve migrated 200 workloads to the cloud, along with connected data. Unfortunately, only three months after the migrated applications go live you discover that you’re out of compliance with laws and regulations of your industry. To make matters worse, the cloud provider you picked does not offer the services needed to make you compliant.

The Role Of IT In Compliance

Galido

Information Technology Blog - - The Role Of IT In Compliance - Information Technology Blog. Owing to the benefit galore that it promises business, building your corporate culture around adherence to compliance is a necessity.

More Trending

New phishing attack hijacks email conversations: How companies can protect employees

Tech Republic Security

By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks

Scale the Value of Analytics

CEB IT

Manually identifying patterns in data is like looking for a needle in a haystack. Often there is too much data or the data is too complex for a person to sort through. Augmented analytics uses machine learning and artificial intelligence (AI) techniques to automatically identify actionable insights.

Tolerable security risk is a spectrum

David Linthicum

It’s 5:00 a.m. sometime in 2018. The phone rings. It’s the cloudops team reporting a potential breach where gigabytes of customer data may have been compromised. You spend the next year toughening up cloud security, allocating four times what you spent in the previous year. The board of directors is happy to fund the additional tools and people. As we say: “You can’t have too much security.”.

China – The First Artificial Intelligence Superpower

CTOvision

China is on its way to becoming the first global superpower for Artificial Intelligence. The People’s Republic of China has the most ambitious AI strategy of all nations and provides the most resources worldwide for its implementation.

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Deploy Microsoft Edge Patches with SCCM Software Updates|ConfigMgr Part 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s see how you can enable and deploy Microsoft Edge patches with Configuration Manager Software Updates.

It’s Time for Every Function to Hone Strategy and Execution

CEB IT

Today’s disruptive times demand that your organization lean into the uncertainty and master the pain points that stand between you and your success — from a lack of critical skills and capabilities to new emerging risks and the urgent need for data literacy. Here we offer insights from Gartner research on how progressive companies can hone strategy and execution and drive enterprise ambitions: Strategy. Information technology. Finance. Legal, compliance, risk and assurance.

How to Succeed With a Cloud Transformation Strategy

Information Week

A study from Unisys shows a significant segment of organizations have not seen substantial gains from cloud migration

Study 124

Five Highly Anticipated Blockchain Trends You Should Know In 2020

CTOvision

Read Venkatesan Ellappan list five highly anticipated blockchain trends for 2020 on Inc24 : Blockchain, since its inception, has been one of the most demanded and talked about technology among all the new age technologies the industry has been working with.

Trends 261

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

ConfigMgr 1910 Known Issues Bugs Fixes|SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. ConfigMgr 1910 is in slow ring now (GA’d) and 1910 update will be available for all SCCM infrastructure with online Service Connection Point.

Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks

Tech Republic Security

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats

WSL 2: Where is it, and where is it going?

Tech Republic Data Center

With Windows 2004 in the final run-up to launch, what's happening to Microsoft's Linux tools

Linux 150

Trusona Is Poised To Improve How We Securely Authenticate With Systems

CTOvision

Editor’s note: I first met Trusona via the Security Innovation Network (SINET) and later thanks to Evan Weisel of W2Comm I was treated to an in person demo and discussion with CEO Ori Eisen while at Blackhat.

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

How IT Can Get Predictive Analytics Right

Information Week

A key to enterprise success with predictive analytics is to get the IT group involved, and do it early in the process

3 Expert Questions to Focus on Winning Digital Transformations

Social, Agile and Transformation

About a year ago, around this time a year, I spoke to a CIO about how to best kickoff digital transformation initiatives. His question, "How do I start? How do I find opportunities that will make a business impact and have the potential to drive transformation?"

How To 141

These subject lines are the most clicked for phishing

Tech Republic Security

The most successful email lures don't promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals

Report 138

AMD vs. Intel: Which CPU is likely to be faster this year?

CTOvision

Read Gordon Mah Ung compare AMD and Intel on PC Mag : This year we’ll see an historic fight for laptops, as AMD’s first truly competitive mobile CPU seeks to dethrone Intel’s decades-long dominance.

Intel 227

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Get Your Enterprise Ready for 5G

Information Week

While you might think of 5G wireless as a cool consumer tech concept, don't lose sight of the fact that it will have a significant impact on enterprise IT

Saving on Server Costs with Managed Migration and Deployment

Galido

Information Technology Blog - - Saving on Server Costs with Managed Migration and Deployment - Information Technology Blog. Outgrowing a server can be an exciting moment for a business. It means you’ve grown enough to require more space and capability — and that’s worth celebrating!

How a researcher exploited the Windows 10 bug patched by Microsoft

Tech Republic Security

Security researcher Saleem Rashid "rickrolled" himself to show that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft's patch

11 Industries Seeing Fundamental AI-Driven Changes In The Near Future

CTOvision

Artificial intelligence (AI) has become a part of life so quickly and seamlessly that many of us are still unaware of how deeply it has impacted society. AI analytics has increased the productivity and efficiency of a range of industries ranging from manufacturing to retail.

The Complete Guide to Distributed Tracing

Distributed tracing is a diagnostic technique that reveals how a set of services coordinate to handle individual user requests. Distributed tracing helps enable loosely coupled work across teams for fast, independent problem-solving.

Cloud Migration: 12 Risks and How to Avoid Them

Information Week

Despite some imperfections, cloud adoption is the future. Of course, it's important to be mindful of the risks involved with the practice

Tips on How to Understand Programming in Matlab

Galido

Information Technology Blog - - Tips on How to Understand Programming in Matlab - Information Technology Blog.

How to better protect your organization's most valuable data

Tech Republic Security

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire

Why big data may help you sleep better at night

CTOvision

There are two technologies that Sleep Number’s launching at CES this year. Two years ago, we launched our 360 platform, which is a fully integrated heating and cooling temperature bed that allows us to really optimize the comfort of each individual. This is our Climate 360 smart bed–it has the ability to warm the feet, […].

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.