Sat.Feb 03, 2018 - Fri.Feb 09, 2018

Big Data Roadmap – A roadmap for success with big data

Eric D. Brown

I’m regularly asked about how to get started with big data. My response is always the same: I give them my big data roadmap for success. Most organizations want to jump in a do something ‘cool’ with big data.

SaaS-ifying your enterprise application? A quick-and-dirty guide

David Linthicum

Lots of people called it SaaS-enablement, some call it SaaS-ification of software. Whatever you call it, more and more enterprises are looking to turn some enterprise application into a SaaS cloud application. There are several reasons to SaaS-enable an internal application. Enterprises need to expose a software system to their partners and/or customers to better automate the business. Or, they are looking to monetize applications they view as having value to other companies.

How A CIO Can Become Very Persuasive

The Accidental Successful CIO

Successful CIOs are also very persuasive Image Credit: Eric Malette. What does it take to be a successful CIO? The answer, of course, is that it takes a lot of different things. Most importantly you need to become good at selling both yourself and the importance of information technology to others.

DataTribe Launches Inaugural Cyber Funding Competition: The DataTribe Cyber Crucible (putting up $Millions in funding)


One of the most virtuous activities in the American economy is the smart deployment of investment money on disruptive technologies. When done right, this can be a win for so many stakeholders, including businesses, governments and the general public. The team at DataTribe has already been taking virtuous, company building action that is creating value […]. Artificial Intelligence Big Data CTO Cyber Security News

More Trending

4 Surprising Industries Capitalizing on the Smart Tech Boom


Smart technologies exist in almost every sector imaginable, and in many cases, they assist industries that haven’t historically embraced innovations. As a result, employees and company leaders are getting acquainted with new ways to work and achieve goals. Accounting Although the professionals within it are undeniably useful — especially near tax time — the […]. CTO News

Run PowerShell as Administrator One-Liner

Mick's IT Blog

As you have probably seen recently in my latest blog entries, I am working on a bunch of PowerShell one-liners to do away with the actual scripts and be able to implement the PowerShell process as a command line task sequence.


Prepping for a Data Science Interview? Ask Yourself These Questions To Stand Out


It seems everyone and their grandmother wants to work in data science these days, and there are plenty of good reasons why that’s the case.

My Favorite Fake Email (Phish) of the Month. I May Be Getting Somebody Thrown In Jail?

Doctor Chaos

Article originally appears on The Security Blogger written by Joseph Muniz. The original article can be found here. I’m sure you have received fake emails and sometimes may wonder if anybody falls for these scams. One of the most popular … or unpopular was the Nigerian Prince scam, which turned out to be some guy from Louisiana. […]. InfoSec email news phishing scam

CTOvision Tech News 6 Feb 2018


News this week reaffirmed the disruptive power of cloud computing, in many ways. One way was in the announcement by Google that their Google Cloud, which includes G Suite and Google Cloud Platform, is now a $1B per quarter business. Huge of course, but that is not nearly as large as the powerhouse at Amazon […]. Artificial Intelligence Big Data Cloud Computing Cryptocurrency CTO Cyber Security News Robots

Google 107

Researchers find malware samples that exploit Meltdown and Spectre

Network World

It was inevitable. Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown. If there is any good news, it’s that the majority of the samples appear to be in the testing phase, according to antivirus testing firm AV-TEST, or are based on proof-of-concept software created by security researchers.

5 lessons that CIOs learned in 2017

mrc's Cup of Joe Blog

Summary: As we start a new year, it helps to reflect on (and learn from) the past year. In this article, we take a look at the past year from an IT leader perspective. What are the most important lessons that IT leaders and CIOs learned (or should have learned) in 2017?

Abusing the Internet of Things (IoT) Fundamentals

Doctor Chaos

Article was written by The Security Blogger Joseph Muniz and can be found here Everything is going on line. Regardless if you want it to or not … it’s happening. If you look back 20 – 25 years ago, people had fax machines and every home had a landline. Today, most offices use e-mail verse […]. IoT hacking wireless

Is P2P the Future of Travel?


When planning a trip, today’s travelers are brought into contact with a multitude of services designed to meet their transportation, accommodation and entertainment needs.

Tips for securing IoT on your network

Network World

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, puts the number of Internet connected “things” at just 8.4 billion in 2017 – counting both consumer and business applications.

Decentralized Governance

Phil Windley

Summary: Decentralized systems require governance to function well. Ideally this governance should be clear, open, and effective without impacting the decentralized nature of the system. This post describes the governance of the Sovrin network.

System Center Products Moved to Semi-Annual Channel But NOT SCCM


Microsoft moved another suite of products also into the Semi-Annual channel of releases. A few months back Windows 10 also moved to Semi-Annual channel releases. So it seems Microsoft is trying to streamline the release management channel for all their products.

A Whole New World for Data Teams


Among the many things I loved about the latest Star Wars movie was our introduction to the unexpected rise of Rose Tico – a humble mechanic who gets thrust into the heart of the action following a chance encounter with Finn. By the end of the movie, she’s flying ski-speeders.

Data 64

Webinar Replay: Create a Customer Portal in 10 Minutes

mrc's Cup of Joe Blog

Summary: Would you like to add a customer portal to your current systems? Would you like to learn how to create customer portals that integrate with your existing ERP system, and work across any device (PC/tablet/smartphone)?

Decentralized Governance in Sovrin

Phil Windley

Summary: Decentralized systems require governance to function well. Ideally this governance should be clear, open, and effective without impacting the decentralized nature of the system. This post describes the governance of the Sovrin network.

Cryptocurrency Speculation – the Good, Bad, and Questionable

Doctor Chaos

Currently we see cryptocurrencies (CC, for the purposes of this article) and the interest in them expanding at a dizzying rate, with daily news articles creating high turmoil in their value and the user trust factors supporting them. Recent CC activities have been truly astounding to analyze from economic importance, social impact, and crowd behavior […]. Crypto Currency bitcoin crypto currency

The “FOCUS” of Digitization

Future of CIO

Digitalization is the long journey with many bumps and curves on the way, to reach the next stage of business maturity and will improve how the enterprise works and interacts with its digital ecosystem.

Google Apps possibly downloading malware onto your device

IT Manager Daily

Google Apps may be allowing bad actors to install malware on your device via a security flaw. Threat: The Google Apps Script, used for apps like Google Drive, has a security vulnerability that could allow hackers to deliver malware to a user’s computer using Google Drive URLs.

Driving Operational Efficiency in Telecom and Cable

Perficient - Digital Transformation

At the end of the day, a streamlined business can witness tremendous cost and time savings, not to mention deliver better experiences for customers and employees. Most, if not all, leaders in the communications space have ongoing initiatives for optimizing their business, whether it’s the implementation of sophisticated software and technology, or process reengineering to become more productive and profitable. “We’re

.Net 43

Spectre and Meltdown | Salted Hash Ep 17

Network World

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws

The Monthly “Unpuzzling Innovation” Book Tuning: Digital Innovation Principles & Practices Feb. 2018

Future of CIO

Digital is the age of innovation. And innovation is what leads to differentiation. There are many ways to differentiate and, therefore, there are many ways to pursue innovation. Talking about innovation is not new nowadays, everybody, every organization now is talking about innovation.

Intune App Assignment Include Exclude Azure AD Groups


Microsoft Intune team depreciated application assignment type “Not Applicable” for good reasons. So no need to get worried when you don’t see “Not Applicable” assignment type for your Intune tenant.

7 IT salary and hiring trends for 2018

ComputerWorld IT Management

Demand for tech talent will continue to outpace supply in the year ahead, while the mix of skills necessary to remain relevant in IT will undergo a significant shift

Put Data Protection Where You Need It

IT Manager Daily

A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment. Download this guide to learn more. Learn more! . The post Put Data Protection Where You Need It appeared first on IT Manager Daily. E-news sponsored content