Sat.Feb 16, 2019 - Fri.Feb 22, 2019

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

CIOs know that training employees is the key to keeping their network secure Image Credit: Merrill College of Journalism Press Releases.

Study 141

AI is Not Magic - It's Time to Demystify and Apply

Information Week

It's time for enterprises to define their artificial intelligence strategies, and they have to consider embarking on mass experimentation to achieve success

Shopping For AI Talent? Beware Of Unicorns

Forrester IT

At the dawn of big data, data scientists were the unicorn of the hour. Talk to any one of these rarities, and they would say there were only about 100 of them in the world. When executives woke up to the potential of big data, it was also at the same time we were dealing […].

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […]. CTO Cyber Security News china cyberattack

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Maria Lensing: The Network Platform for Healthcare’s Future

Cloud Musings

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s life, ignited a passion for healthcare.

More Trending

Modern (B2B) Love: Deepen Customer Relationships With Post-Sale Engagement Marketing

Forrester IT

Ah yes, anyone suffering from a chocolate hangover? Or an excess of corny romanticism? Let’s face it, we all love “love” — but with Valentine’s Day a week behind us, the last thing you probably want right now is more advice on relationships.

B2B 178

OpenAI’s new multitalented AI writes, translates, and slanders

CTOvision

OpenAI’s researchers knew they were on to something when their language modeling program wrote a convincing essay on a topic they disagreed with. They’d been testing the new AI system by feeding it text prompts, getting it to complete made-up sentences and paragraphs. Then, says David Luan, VP of engineering at the Californian lab, they […]. Artificial Intelligence News

Develop a Convincing Business Case for IAM

CEB IT

Security and identity and access management (IAM) leaders often struggle with developing compelling business cases to secure funding to support their organization's IAM programs , which requires resources for projects as well as head count for ongoing operations.

Beware the siren song of no-ops

David Linthicum

No-ops is the concept that an IT environment, such as cloud computing, can become so automated and abstracted from the underlying platforms that there is no need for a team to manage the thing. The no-ops concept has largely arisen from the introduction of serverless cloud computing , and the automation that has occurred on the devops side of cloud computing.

Devops 136

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

The Use of Behavioral Science Has Moved Beyond Marketing

Forrester IT

Marketers have been using behavioral economics to understand and exploit the irrationality of consumers long before the Golden Age of Advertising.

Facebook’s chief AI scientist: Deep learning may need a new programming language

CTOvision

Deep learning may need a new programming language that’s more flexible and easier to work with than Python, Facebook AI Research director Yann LeCun said today. It’s not yet clear if such a language is necessary, but the possibility runs against very entrenched desires from researchers and engineers, he said. LeCun has worked with neural networks […]. Artificial Intelligence News

5G Wireless Technology Connecting Healthcare

Cloud Musings

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industry’s pursuit of the many promises offered by connected patients, connected caregivers, and connected hospitals.

Containers: The pros and cons you may not know about

David Linthicum

“We are using containers” is the battle cry of enterprises looking to get to the ultimate in performance, scalability, and portability. Well, some of that can happen. But there are limitations as well. Here’s my guidance around what value containers actually bring to the enterprise—and what they don’t bring. Compare container operating systems: Alpine Linux , CoreOS Container Linux , RancherOS , Red Hat Project Atomic , and VMware Photon OS. | Learn how to get started with Kubernetes.

Linux 134

The Six Principles of Persuasion

Speaker: Michael Carducci, Tech Leader, VUE Expert, and Full Stack Developer

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Small Business Banking Has Been Disrupted (And There’s No Going Back)

Forrester IT

Bankers around the world are rightly worried about the threats posed by digital disruptors getting in between them and their retail banking customers.

How Internet of Things will power business processes in 2019

CTOvision

Read why Virendra Chaudhari says centralized IoT systems will become a vital force to drive businesses on Financial Express : As advancing technologies integrate deeper into the everyday functions of businesses, companies are finding themselves faced with a paradigm shift towards a more intelligent and connected world. Amidst the maturing technologies leading this revolution is […]. CTO News

Tulane University SoPA Selects "Architechting Cloud Computing Solutions"

Cloud Musings

Last week, Packt Publishing announced that " Architecting Cloud Computing Solutions " by Kevin L.

Beware the siren song of no-ops

David Linthicum

No-ops is the concept that an IT environment, such as cloud computing, can become so automated and abstracted from the underlying platforms that there is no need for a team to manage the thing. The no-ops concept has largely arisen from the introduction of serverless cloud computing , and the automation that has occurred on the devops side of cloud computing.

Devops 109

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Embrace Specialist Tools To Drive Sustainable Innovation

Forrester IT

Successful tools and tech support broad and fluctuating levels of participation in innovation, both inside and outside the organization. Innovation innovation management technology

Tools 146

The Average Ransomware Payment Is Rising

CTOvision

The average ransomware payment is growing as criminals become more sophisticated in their attacks, according to a report released by ransomware incident response company Coveware. According to Coveware’s Q4 2018 Global Ransomware Marketplace Report, the average ransom increased by 13% to $6733 in Q4 2018 compared to Q3’s $5973. It’s difficult to judge the statistical margin of […]. Cyber Security News

Report 146

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Travel 138

Directing Innovation: Course for company directors to keep ahead of disruption

Trends in the Living Networks

For many years I have been working with company directors on framing and driving innovation in their organizations. From this March I will be applying this experience as Course Director for a new program run by the Australian Institute of Company Directors (AICD), titled Directing Innovation.

If mCommerce Isn’t Mini eCommerce, What Is It?

Forrester IT

mCommerce today is often characterized as online purchases made on a smartphone or mobile payments (e.g., Apple Pay or Google Pay). As our colleague James McQuivey would say, that is simply doing old things in new ways — not doing new things. We define mobile as any device with a cellular connection.

Apple 145

How Blockchain Can Drive Finance And Audit Performance

CTOvision

In 2017, bitcoin, a cryptocurrency based on the blockchain, skyrocketed in value and caught the eye of executives around the globe. While most of us have focused on the currency aspect, it’s no secret that blockchain, a distributed ledger technology, could see its most effective and widespread application in the corporate world, specifically in finance. Blockchain […]. CTO News

Is Kubernetes Serverless?

Linux Academy

The Kubernetes Trend. If you take a look at where the IT industry is going, you will start to see a trend: a layer of complexity added to the relationship between applications and infrastructure. No longer can you draw a straight line from the application to the machine it runs on. Developers have been trying to get away from having to manage infrastructure for years. It’s no fun having to provision, manage, and patch a multitude of disparate servers, new and old.

WHAT’S THE ROLE OF INFORMATION TECHNOLOGY IN THE XaaS ERA?

Datacponomy

The era of everything-as-a-service (XaaS) has provided both an opportunity and a challenge for companies across industries.

DTC Startups Signal An Age Of Experimentation

Forrester IT

As we gear up for Forrester’s Consumer Marketing 2019 Forum, I’m chipping away at a rather large research undertaking that quantifies why direct-to-consumer (DTC) startups deliver value to consumers and how this threatens big brands.

Defending Against IoT “Accidental” Insider Threats

CTOvision

Read Jason Soroko article about how to protect yourself against accidental Internet of Things insider threats on IoT for All : When considering insider threats faced by the Internet of Things (IoT) systems, few will be surprised to learn that protecting a network with a growing number of connected devices from a maliciously motivated insider […]. Cyber Security News