Sat.Feb 03, 2018 - Fri.Feb 09, 2018

Big Data Roadmap – A roadmap for success with big data

Eric D. Brown

I’m regularly asked about how to get started with big data. My response is always the same: I give them my big data roadmap for success. Most organizations want to jump in a do something ‘cool’ with big data.

SaaS-ifying your enterprise application? A quick-and-dirty guide

David Linthicum

Lots of people called it SaaS-enablement, some call it SaaS-ification of software. Whatever you call it, more and more enterprises are looking to turn some enterprise application into a SaaS cloud application. There are several reasons to SaaS-enable an internal application. Enterprises need to expose a software system to their partners and/or customers to better automate the business. Or, they are looking to monetize applications they view as having value to other companies.

How A CIO Can Become Very Persuasive

The Accidental Successful CIO

Successful CIOs are also very persuasive Image Credit: Eric Malette. What does it take to be a successful CIO? The answer, of course, is that it takes a lot of different things. Most importantly you need to become good at selling both yourself and the importance of information technology to others.

DataTribe Launches Inaugural Cyber Funding Competition: The DataTribe Cyber Crucible (putting up $Millions in funding)

CTOvision

One of the most virtuous activities in the American economy is the smart deployment of investment money on disruptive technologies. When done right, this can be a win for so many stakeholders, including businesses, governments and the general public. The team at DataTribe has already been taking virtuous, company building action that is creating value […]. Artificial Intelligence Big Data CTO Cyber Security News

CloudBees acquires Codeship to Form the Leader in CI/CD

The Investing Edge

Today is an exciting day for us as CloudBees announced their acquisition of our portfolio company Codeship. We are thrilled for Mo, Manny, and the rest of the team as they join forces with one of the leading companies in DevOps.

Devops 130

Capacity alone won't assure good cloud performance

David Linthicum

Many people believe that workloads in the cloud always perform better because public clouds have access to an almost unlimited amount of resources. Although you can provision the resources you need—and even use serverless computing so the allocation of resources is done for you—the fact is that having the right amount of resources is only half the battle.

Devops 154

More Trending

4 Surprising Industries Capitalizing on the Smart Tech Boom

CTOvision

Smart technologies exist in almost every sector imaginable, and in many cases, they assist industries that haven’t historically embraced innovations. As a result, employees and company leaders are getting acquainted with new ways to work and achieve goals. Accounting Although the professionals within it are undeniably useful — especially near tax time — the […]. CTO News

10 Reasons to Attend Technology Conferences

Social, Agile and Transformation

Last year I attended and spoke at over twenty (20) conferences that covered a wide range of topics from Artificial Intelligence to Agile & DevOps to Data Science. I spoke on a wide range of digital transformation topics and had the opportunity to meet many interesting IT leaders and event sponsors. There are lots of reasons to attend technology events so let me suggest some and how to.

Prepping for a Data Science Interview? Ask Yourself These Questions To Stand Out

Datacponomy

It seems everyone and their grandmother wants to work in data science these days, and there are plenty of good reasons why that’s the case.

My Favorite Fake Email (Phish) of the Month. I May Be Getting Somebody Thrown In Jail?

Doctor Chaos

Article originally appears on The Security Blogger written by Joseph Muniz. The original article can be found here. I’m sure you have received fake emails and sometimes may wonder if anybody falls for these scams. One of the most popular … or unpopular was the Nigerian Prince scam, which turned out to be some guy from Louisiana. […]. InfoSec news phishing scam

CTOvision Tech News 6 Feb 2018

CTOvision

News this week reaffirmed the disruptive power of cloud computing, in many ways. One way was in the announcement by Google that their Google Cloud, which includes G Suite and Google Cloud Platform, is now a $1B per quarter business. Huge of course, but that is not nearly as large as the powerhouse at Amazon […]. Artificial Intelligence Big Data Cloud Computing Cryptocurrency CTO Cyber Security News Robots

Google 113

Researchers find malware samples that exploit Meltdown and Spectre

Network World

It was inevitable. Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown. If there is any good news, it’s that the majority of the samples appear to be in the testing phase, according to antivirus testing firm AV-TEST, or are based on proof-of-concept software created by security researchers.

System Center Products Moved to Semi-Annual Channel But NOT SCCM

Anoop

Microsoft moved another suite of products also into the Semi-Annual channel of releases. A few months back Windows 10 also moved to Semi-Annual channel releases. So it seems Microsoft is trying to streamline the release management channel for all their products.

My Favorite Fake Email (Phish) of the Month. I May Be Getting Somebody Thrown In Jail?

Doctor Chaos

Article originally appears on The Security Blogger written by Joseph Muniz. The original article can be found here. I’m sure you have received fake emails and sometimes may wonder if anybody falls for these scams. One of the most popular … or unpopular was the Nigerian Prince scam, which turned out to be some guy from Louisiana. […]. InfoSec email news phishing scam

5 lessons that CIOs learned in 2017

mrc's Cup of Joe Blog

Summary: As we start a new year, it helps to reflect on (and learn from) the past year. In this article, we take a look at the past year from an IT leader perspective. What are the most important lessons that IT leaders and CIOs learned (or should have learned) in 2017?

Tips for securing IoT on your network

Network World

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, puts the number of Internet connected “things” at just 8.4 billion in 2017 – counting both consumer and business applications.

A Whole New World for Data Teams

Datacponomy

Among the many things I loved about the latest Star Wars movie was our introduction to the unexpected rise of Rose Tico – a humble mechanic who gets thrust into the heart of the action following a chance encounter with Finn. By the end of the movie, she’s flying ski-speeders.

Data 71

Abusing the Internet of Things (IoT) Fundamentals

Doctor Chaos

Article was written by The Security Blogger Joseph Muniz and can be found here Everything is going on line. Regardless if you want it to or not … it’s happening. If you look back 20 – 25 years ago, people had fax machines and every home had a landline. Today, most offices use e-mail verse […]. Cyber

Decentralized Governance

Phil Windley

Summary: Decentralized systems require governance to function well. Ideally this governance should be clear, open, and effective without impacting the decentralized nature of the system. This post describes the governance of the Sovrin network.

Run PowerShell as Administrator One-Liner

Mick's IT Blog

As you have probably seen recently in my latest blog entries, I am working on a bunch of PowerShell one-liners to do away with the actual scripts and be able to implement the PowerShell process as a command line task sequence.

83

Is P2P the Future of Travel?

Datacponomy

When planning a trip, today’s travelers are brought into contact with a multitude of services designed to meet their transportation, accommodation and entertainment needs.

Abusing the Internet of Things (IoT) Fundamentals

Doctor Chaos

Article was written by The Security Blogger Joseph Muniz and can be found here Everything is going on line. Regardless if you want it to or not … it’s happening. If you look back 20 – 25 years ago, people had fax machines and every home had a landline. Today, most offices use e-mail verse […]. IoT hacking wireless

Configure SCCM Task sequence Pre-Cache Content – Part 1

Anoop

For Bulk application change or Operating system upgrade we use task sequence. User start the Task sequence from SCCM Software center and waits for content download. This delay always impacts end user self-service experience with SCCM software center. Microsoft solution to this is “SCCM Task sequence Pre-Cache Content”. This feature is available starting with SCCM […].

Webinar Replay: Create a Customer Portal in 10 Minutes

mrc's Cup of Joe Blog

Summary: Would you like to add a customer portal to your current systems? Would you like to learn how to create customer portals that integrate with your existing ERP system, and work across any device (PC/tablet/smartphone)?

Decentralized Governance in Sovrin

Phil Windley

Summary: Decentralized systems require governance to function well. Ideally this governance should be clear, open, and effective without impacting the decentralized nature of the system. This post describes the governance of the Sovrin network.

Cryptocurrency Speculation – the Good, Bad, and Questionable

Doctor Chaos

Currently we see cryptocurrencies (CC, for the purposes of this article) and the interest in them expanding at a dizzying rate, with daily news articles creating high turmoil in their value and the user trust factors supporting them. Recent CC activities have been truly astounding to analyze from economic importance, social impact, and crowd behavior […]. Crypto Currency bitcoin crypto currency

Social 100

Intune App Assignment Include Exclude Azure AD Groups

Anoop

Microsoft Intune team depreciated application assignment type “Not Applicable” for good reasons. So no need to get worried when you don’t see “Not Applicable” assignment type for your Intune tenant.

The “FOCUS” of Digitization

Future of CIO

Digitalization is the long journey with many bumps and curves on the way, to reach the next stage of business maturity and will improve how the enterprise works and interacts with its digital ecosystem.

Registration liability in Switzerland for ebiz providers

CIO Dashboard

The Swiss VAT law was recently changed. From 1 January 2018 onwards, any person or business with global turnover of CHF 100’000 or more may be liable to VAT starting from the first Swiss franc of turnover in Switzerland.

52

What is Open-source Intelligence (OSINT) and its its advantages for Ethical-Hackers?

Doctor Chaos

written by Amine Amhoume is a freelance writer and Ethical-Hacker What is Open-source Intelligence? Open-source Intelligence or OSINT is a part of the reconnaissance process that consists of using any online public intelligence that can provide information about a company, organization, or individuals. As an ethical hacker, you can use the data when performing target […]. Tools Open-source Intelligence OSINT