Sat.Feb 16, 2019 - Fri.Feb 22, 2019

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

CIOs know that training employees is the key to keeping their network secure Image Credit: Merrill College of Journalism Press Releases.

Study 141

AI is Not Magic - It's Time to Demystify and Apply

Information Week

It's time for enterprises to define their artificial intelligence strategies, and they have to consider embarking on mass experimentation to achieve success

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Shopping For AI Talent? Beware Of Unicorns

Forrester IT

At the dawn of big data, data scientists were the unicorn of the hour. Talk to any one of these rarities, and they would say there were only about 100 of them in the world. When executives woke up to the potential of big data, it was also at the same time we were dealing […].

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. They are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […]. CTO Cyber Security News china cyberattack

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Containers: The pros and cons you may not know about

David Linthicum

“We are using containers” is the battle cry of enterprises looking to get to the ultimate in performance, scalability, and portability. Well, some of that can happen. But there are limitations as well. Here’s my guidance around what value containers actually bring to the enterprise—and what they don’t bring. Compare container operating systems: Alpine Linux , CoreOS Container Linux , RancherOS , Red Hat Project Atomic , and VMware Photon OS. | Learn how to get started with Kubernetes.

Linux 245

Develop a Convincing Business Case for IAM

CEB IT

Security and identity and access management (IAM) leaders often struggle with developing compelling business cases to secure funding to support their organization's IAM programs , which requires resources for projects as well as head count for ongoing operations.

More Trending

OpenAI’s new multitalented AI writes, translates, and slanders

CTOvision

OpenAI’s researchers knew they were on to something when their language modeling program wrote a convincing essay on a topic they disagreed with. They’d been testing the new AI system by feeding it text prompts, getting it to complete made-up sentences and paragraphs. Then, says David Luan, VP of engineering at the Californian lab, they […]. Artificial Intelligence News

Containers: The pros and cons you may not know about

David Linthicum

“We are using containers” is the battle cry of enterprises looking to get to the ultimate in performance, scalability, and portability. Well, some of that can happen. But there are limitations as well. Here’s my guidance around what value containers actually bring to the enterprise—and what they don’t bring. Compare container operating systems: Alpine Linux , CoreOS Container Linux , RancherOS , Red Hat Project Atomic , and VMware Photon OS. | Learn how to get started with Kubernetes.

Linux 218

Searching For a Cloud-Native App Strategy Amid the Chaos

Information Week

As it gets easier and easier to deploy cloud-native apps, maintaining order increasingly becomes a challenge

Modern (B2B) Love: Deepen Customer Relationships With Post-Sale Engagement Marketing

Forrester IT

Ah yes, anyone suffering from a chocolate hangover? Or an excess of corny romanticism? Let’s face it, we all love “love” — but with Valentine’s Day a week behind us, the last thing you probably want right now is more advice on relationships.

B2B 389

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Facebook’s chief AI scientist: Deep learning may need a new programming language

CTOvision

Deep learning may need a new programming language that’s more flexible and easier to work with than Python, Facebook AI Research director Yann LeCun said today. It’s not yet clear if such a language is necessary, but the possibility runs against very entrenched desires from researchers and engineers, he said. LeCun has worked with neural networks […]. Artificial Intelligence News

Beware the siren song of no-ops

David Linthicum

No-ops is the concept that an IT environment, such as cloud computing, can become so automated and abstracted from the underlying platforms that there is no need for a team to manage the thing. The no-ops concept has largely arisen from the introduction of serverless cloud computing , and the automation that has occurred on the devops side of cloud computing.

Devops 204

MDM Diagnostics Tool – Tips & Tricks – Windows Autopilot Troubleshooting

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In my previous post, Windows Autopilot Troubleshooting basics, we discussed different troubleshooting areas like Network Activity, Registry, and Event Viewer. In this post, let’s discuss on Windows MDM Diagnostics Tool benefits, usage, and examples. Related Posts – Windows Autopilot Step by Step Guides, Windows 10 Deployment Process Flow and Logs] What is Windows MDM Diagnostics […].

Tools 129

Small Business Banking Has Been Disrupted (And There’s No Going Back)

Forrester IT

Bankers around the world are rightly worried about the threats posed by digital disruptors getting in between them and their retail banking customers.

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

How Internet of Things will power business processes in 2019

CTOvision

Read why Virendra Chaudhari says centralized IoT systems will become a vital force to drive businesses on Financial Express : As advancing technologies integrate deeper into the everyday functions of businesses, companies are finding themselves faced with a paradigm shift towards a more intelligent and connected world. Amidst the maturing technologies leading this revolution is […]. CTO News

Beware the siren song of no-ops

David Linthicum

No-ops is the concept that an IT environment, such as cloud computing, can become so automated and abstracted from the underlying platforms that there is no need for a team to manage the thing. The no-ops concept has largely arisen from the introduction of serverless cloud computing , and the automation that has occurred on the devops side of cloud computing.

Devops 159

Directing Innovation: Course for company directors to keep ahead of disruption

Trends in the Living Networks

For many years I have been working with company directors on framing and driving innovation in their organizations. From this March I will be applying this experience as Course Director for a new program run by the Australian Institute of Company Directors (AICD), titled Directing Innovation.

Course 111

If mCommerce Isn’t Mini eCommerce, What Is It?

Forrester IT

mCommerce today is often characterized as online purchases made on a smartphone or mobile payments (e.g., Apple Pay or Google Pay). As our colleague James McQuivey would say, that is simply doing old things in new ways — not doing new things. We define mobile as any device with a cellular connection.

Apple 348

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

The Average Ransomware Payment Is Rising

CTOvision

The average ransomware payment is growing as criminals become more sophisticated in their attacks, according to a report released by ransomware incident response company Coveware. According to Coveware’s Q4 2018 Global Ransomware Marketplace Report, the average ransom increased by 13% to $6733 in Q4 2018 compared to Q3’s $5973. It’s difficult to judge the statistical margin of […]. Cyber Security News

Report 217

2019: The Year IT Makes a Comeback

Information Week

It's time for IT leaders to recognize that the IT group is crucial to their companies' future growth and success, and to let the business know that IT is there to help

Groups 108

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking. How edge networking and IoT will reshape data centers. Edge computing best practices.

Embrace Specialist Tools To Drive Sustainable Innovation

Forrester IT

Successful tools and tech support broad and fluctuating levels of participation in innovation, both inside and outside the organization. Innovation innovation management technology

Tools 336

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

How Blockchain Can Drive Finance And Audit Performance

CTOvision

In 2017, bitcoin, a cryptocurrency based on the blockchain, skyrocketed in value and caught the eye of executives around the globe. While most of us have focused on the currency aspect, it’s no secret that blockchain, a distributed ledger technology, could see its most effective and widespread application in the corporate world, specifically in finance. Blockchain […]. CTO News

Celebrating 400 Practical Articles on Driving Digital Transformation

Social, Agile and Transformation

Today I celebrate my 400th post on Social, Agile, and Transformation. It’s been an incredible journey starting from my days of being a hands-on CTO at a social media travel startup, through three careers of being a transformational CIO in data businesses, and now as President of StarCIO, author of the Amazon best seller Driving Digital, speaker, and contributing editor at CIO and InfoWorld.

Travel 145

Cisco warns on HyperFlex security vulnerabilities

Network World

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system. HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking. How edge networking and IoT will reshape data centers. Edge computing best practices. How edge computing can help secure the IoT. The more critical of the two warnings – an 8.8

DTC Startups Signal An Age Of Experimentation

Forrester IT

As we gear up for Forrester’s Consumer Marketing 2019 Forum, I’m chipping away at a rather large research undertaking that quantifies why direct-to-consumer (DTC) startups deliver value to consumers and how this threatens big brands.

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Defending Against IoT “Accidental” Insider Threats

CTOvision

Read Jason Soroko article about how to protect yourself against accidental Internet of Things insider threats on IoT for All : When considering insider threats faced by the Internet of Things (IoT) systems, few will be surprised to learn that protecting a network with a growing number of connected devices from a maliciously motivated insider […]. Cyber Security News

How AR Is Revolutionizing Advertisements

Galido

Information Technology Blog - - How AR Is Revolutionizing Advertisements - Information Technology Blog. If you are familiar with, or happen to have used McDonald’s GOL app during the 2014 FIFA World Cup or after, then you’ve interacted with augmented reality.

Is Kubernetes Serverless?

Linux Academy

The Kubernetes Trend. If you take a look at where the IT industry is going, you will start to see a trend: a layer of complexity added to the relationship between applications and infrastructure. No longer can you draw a straight line from the application to the machine it runs on. Developers have been trying to get away from having to manage infrastructure for years. It’s no fun having to provision, manage, and patch a multitude of disparate servers, new and old.

Prepare For Blockchain’s Impact On The Telecommunications Sector

Forrester IT

Blockchain offers telcos opportunities for new business, improved compliance, and efficient operations. big data blockchain digital transformation telecommunications services

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

When it comes to the modern tech stack, one of the fastest changing areas is around containers, serverless, and choosing the ideal path to cloud native computing. How do you as a technology leader point your team in the right direction, especially given how quickly this is evolving?