Sat.Feb 03, 2018 - Fri.Feb 09, 2018

Big Data Roadmap – A roadmap for success with big data

Eric D. Brown

I’m regularly asked about how to get started with big data. My response is always the same: I give them my big data roadmap for success. Most organizations want to jump in a do something ‘cool’ with big data.

SaaS-ifying your enterprise application? A quick-and-dirty guide

David Linthicum

Lots of people called it SaaS-enablement, some call it SaaS-ification of software. Whatever you call it, more and more enterprises are looking to turn some enterprise application into a SaaS cloud application. There are several reasons to SaaS-enable an internal application. Enterprises need to expose a software system to their partners and/or customers to better automate the business. Or, they are looking to monetize applications they view as having value to other companies.

CloudBees acquires Codeship to Form the Leader in CI/CD

The Investing Edge

Today is an exciting day for us as CloudBees announced their acquisition of our portfolio company Codeship. We are thrilled for Mo, Manny, and the rest of the team as they join forces with one of the leading companies in DevOps.

Devops 130

What is Open-source Intelligence (OSINT) and its its advantages for Ethical-Hackers?

Doctor Chaos

written by Amine Amhoume is a freelance writer and Ethical-Hacker What is Open-source Intelligence? Open-source Intelligence or OSINT is a part of the reconnaissance process that consists of using any online public intelligence that can provide information about a company, organization, or individuals. As an ethical hacker, you can use the data when performing target […]. Tools Open-source Intelligence OSINT

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How A CIO Can Become Very Persuasive

The Accidental Successful CIO

Successful CIOs are also very persuasive Image Credit: Eric Malette. What does it take to be a successful CIO? The answer, of course, is that it takes a lot of different things. Most importantly you need to become good at selling both yourself and the importance of information technology to others.

More Trending

DataTribe Launches Inaugural Cyber Funding Competition: The DataTribe Cyber Crucible (putting up $Millions in funding)

CTOvision

One of the most virtuous activities in the American economy is the smart deployment of investment money on disruptive technologies. When done right, this can be a win for so many stakeholders, including businesses, governments and the general public. The team at DataTribe has already been taking virtuous, company building action that is creating value […]. Artificial Intelligence Big Data CTO Cyber Security News

My Favorite Fake Email (Phish) of the Month. I May Be Getting Somebody Thrown In Jail?

Doctor Chaos

Article originally appears on The Security Blogger written by Joseph Muniz. The original article can be found here. I’m sure you have received fake emails and sometimes may wonder if anybody falls for these scams. One of the most popular … or unpopular was the Nigerian Prince scam, which turned out to be some guy from Louisiana. […]. InfoSec news phishing scam

Prepping for a Data Science Interview? Ask Yourself These Questions To Stand Out

Datacponomy

It seems everyone and their grandmother wants to work in data science these days, and there are plenty of good reasons why that’s the case.

System Center Products Moved to Semi-Annual Channel But NOT SCCM

Anoop

Microsoft moved another suite of products also into the Semi-Annual channel of releases. A few months back Windows 10 also moved to Semi-Annual channel releases. So it seems Microsoft is trying to streamline the release management channel for all their products.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

10 Reasons to Attend Technology Conferences

Social, Agile and Transformation

Last year I attended and spoke at over twenty (20) conferences that covered a wide range of topics from Artificial Intelligence to Agile & DevOps to Data Science. I spoke on a wide range of digital transformation topics and had the opportunity to meet many interesting IT leaders and event sponsors. There are lots of reasons to attend technology events so let me suggest some and how to.

My Favorite Fake Email (Phish) of the Month. I May Be Getting Somebody Thrown In Jail?

Doctor Chaos

Article originally appears on The Security Blogger written by Joseph Muniz. The original article can be found here. I’m sure you have received fake emails and sometimes may wonder if anybody falls for these scams. One of the most popular … or unpopular was the Nigerian Prince scam, which turned out to be some guy from Louisiana. […]. InfoSec email news phishing scam

Researchers find malware samples that exploit Meltdown and Spectre

Network World

It was inevitable. Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown. If there is any good news, it’s that the majority of the samples appear to be in the testing phase, according to antivirus testing firm AV-TEST, or are based on proof-of-concept software created by security researchers.

4 Surprising Industries Capitalizing on the Smart Tech Boom

CTOvision

Smart technologies exist in almost every sector imaginable, and in many cases, they assist industries that haven’t historically embraced innovations. As a result, employees and company leaders are getting acquainted with new ways to work and achieve goals. Accounting Although the professionals within it are undeniably useful — especially near tax time — the […]. CTO News

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

A Whole New World for Data Teams

Datacponomy

Among the many things I loved about the latest Star Wars movie was our introduction to the unexpected rise of Rose Tico – a humble mechanic who gets thrust into the heart of the action following a chance encounter with Finn. By the end of the movie, she’s flying ski-speeders.

Data 82

Abusing the Internet of Things (IoT) Fundamentals

Doctor Chaos

Article was written by The Security Blogger Joseph Muniz and can be found here Everything is going on line. Regardless if you want it to or not … it’s happening. If you look back 20 – 25 years ago, people had fax machines and every home had a landline. Today, most offices use e-mail verse […]. Cyber

Tips for securing IoT on your network

Network World

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, puts the number of Internet connected “things” at just 8.4 billion in 2017 – counting both consumer and business applications.

CTOvision Tech News 6 Feb 2018

CTOvision

News this week reaffirmed the disruptive power of cloud computing, in many ways. One way was in the announcement by Google that their Google Cloud, which includes G Suite and Google Cloud Platform, is now a $1B per quarter business. Huge of course, but that is not nearly as large as the powerhouse at Amazon […]. Artificial Intelligence Big Data Cloud Computing Cryptocurrency CTO Cyber Security News Robots

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Is P2P the Future of Travel?

Datacponomy

When planning a trip, today’s travelers are brought into contact with a multitude of services designed to meet their transportation, accommodation and entertainment needs.

Abusing the Internet of Things (IoT) Fundamentals

Doctor Chaos

Article was written by The Security Blogger Joseph Muniz and can be found here Everything is going on line. Regardless if you want it to or not … it’s happening. If you look back 20 – 25 years ago, people had fax machines and every home had a landline. Today, most offices use e-mail verse […]. IoT hacking wireless

Configure SCCM Task sequence Pre-Cache Content – Part 1

Anoop

For Bulk application change or Operating system upgrade we use task sequence. User start the Task sequence from SCCM Software center and waits for content download. This delay always impacts end user self-service experience with SCCM software center. Microsoft solution to this is “SCCM Task sequence Pre-Cache Content”. This feature is available starting with SCCM […].

5 lessons that CIOs learned in 2017

mrc's Cup of Joe Blog

Summary: As we start a new year, it helps to reflect on (and learn from) the past year. In this article, we take a look at the past year from an IT leader perspective. What are the most important lessons that IT leaders and CIOs learned (or should have learned) in 2017?

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Run PowerShell as Administrator One-Liner

Mick's IT Blog

As you have probably seen recently in my latest blog entries, I am working on a bunch of PowerShell one-liners to do away with the actual scripts and be able to implement the PowerShell process as a command line task sequence.

79

Cryptocurrency Speculation – the Good, Bad, and Questionable

Doctor Chaos

Currently we see cryptocurrencies (CC, for the purposes of this article) and the interest in them expanding at a dizzying rate, with daily news articles creating high turmoil in their value and the user trust factors supporting them. Recent CC activities have been truly astounding to analyze from economic importance, social impact, and crowd behavior […]. Crypto Currency bitcoin crypto currency

Social 100

Intune App Assignment Include Exclude Azure AD Groups

Anoop

Microsoft Intune team depreciated application assignment type “Not Applicable” for good reasons. So no need to get worried when you don’t see “Not Applicable” assignment type for your Intune tenant.

Webinar Replay: Create a Customer Portal in 10 Minutes

mrc's Cup of Joe Blog

Summary: Would you like to add a customer portal to your current systems? Would you like to learn how to create customer portals that integrate with your existing ERP system, and work across any device (PC/tablet/smartphone)?

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.