Sat.Aug 17, 2019 - Fri.Aug 23, 2019

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Summary: Sovrin is an identity metasystem that provides the Internet's missing identity layer. By creating a general-purpose system for constructing context-specific identity systems, the metasystem represents a universal trust framework. Imagine you are planning to meet a friend for lunch.

Have a Failing Big Data Project? Try a Dose of AI

Information Week

A growing number of AI experts are turning their attention to big data. Will that be enough to save doomed projects

Adulting - CIO Style

CIO Musings

I love the Urban Dictionary. I'm not sure why, I guess it makes me feel hip to read through some of the posts. I have contributed a few along the way like the term "Camel Up", my proudest moment. The Urban Dictionary defines "adulting" like this.

Collective Bargaining: Your Biggest Risk In The Age Of The Customer

Forrester IT

Social media has created customer groups that coalesce around a brand — in effect, a union. They collectively can and will change your corporate policy. With collective bargaining, business as usual is no longer acceptable. Are you ready for the empowered, technically savvy, and motivated customer?

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

How to stop people from causing bad cloud architectures

David Linthicum

I’ve been in some knock-down, drag-out battles over both the configuration and the use of technology. On one side, you have somebody with a very different opinion as to what technology should be used and how. On the other side, you know that you are right.

More Trending

Don’t worry about shadow IT. Shadow IoT is much worse.

Network World

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface. That may be true, but it’s not the whole story.

Agile 109

The Importance Of Defining Event ROI In The B2B Marketing Mix

Forrester IT

“If a tree falls in a forest and no one is around to hear it, does it make a sound?” ” This question, first attributed to philosopher George Berkeley in 1710, raises questions about observation and perception.*

B2B 203

Machine learning operations don’t belong with cloudops

David Linthicum

It’s Monday morning, and after a long weekend of system trouble the cloud operations team is discussing what happened. It seems that several systems that were associated with a very advanced, new inventory management system enabled with machine learning had issues over the weekend.

3 Major Trends Drive the Gartner Hype Cycle for Midsize Enterprises, 2019

CEB IT

Cloud. Machine learning. Edge computing. Internet of Things (IoT). The reality of being a CIO is dealing with the constant influx of new, shiny technologies. .

Trends 162

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Agile Planning Business Roadmaps, Architecture Standards, and DevOps Releases

Social, Agile and Transformation

Agile planning doesn't end when stories are written, accepted by the team, sized, and ready for development. Story writing is one aspect of agile planning, but it's not the only one. At StarCIO, agile planning is done at several levels depending on the complexity of the requirement.

Agile 155

VMware Signals The End Of “Endpoint” Detection And Response

Forrester IT

The acquisition of Carbon Black by VMware was a bit of a surprise to me, but once put into perspective it makes sense. In this blog, I make a few observations from a value perspective.

Vmware 196

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.

6 Ways the Workplace Will Change in the Next 10 Years

CEB IT

Current trends in business and technology show that the way employees work — where, when, why and with whom — will change completely over the next decade and bear little resemblance to work as it stands today. CHROs need to be prepared for what’s coming. De’Onn Griffin , Senior Director Analyst at Gartner, outlines six ideas about the future direction of the workplace and how organizations can prepare for it. . "We We Working" will eliminate middle management.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Micromobility : What does it mean for the future of transportation?

Datacponomy

How will micromobility change the way we travel from point “A” to “B”? How will micromobility co-exist with the traditional models of transportation? What is the importance of network effects in micromobility?

Product Teams For Infrastructure And Operations

Forrester IT

As an analyst at Forrester, I talk to a lot of IT professionals. One of the most common inquiries lately goes something like this: “We’ve piloted DevOps and Agile and like the results. However. ” and then come the “what-abouts.”

The Benefits of Containers for Businesses

Perficient - Digital Transformation

The following is the second blog in a series about software containers and Kubernetes, and their importance in modern application delivery. In our last blog in this series , we looked at what software containers are and their evolution over time.

5 Security Questions Your Board Will Definitely Ask

CEB IT

How secure are we? Why do we need more money for security, when we just approved X last year? What do you mean we’ve had 4 incidents? I thought you had everything under control. Chances are, most security and risk leaders have heard these questions, possibly multiple times, from their boards of directors. But the problem is that these questions are unanswerable. They are driven by exaggerated, incomplete or contradictory public information, and are a distraction from more relevant questions. .

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Cisco: 6 critical security alarms for UCS software, small-biz routers

Network World

Cisco today warned its Unified Computing System (UCS) customers about four critical fixes they need to make to stop nefarious agents from taking over or attacking their systems.The problems all have a severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System ( CVSS ).

Channel Marketers Need To Become Community Marketers – Here’s How

Forrester IT

A lot has changed in the 25+ years I have spent in the technology channel. New technologies, partner business models, shifting demographics, expanding communication vehicles, and most recently, new technology buyers with different psychology, behavior, and journey have created a whirlwind of change for vendors, distributors, and partners alike. The one constant is the […].

8 tips on how to save your iPhone’s battery life 

Galido

Information Technology Blog - - 8 tips on how to save your iPhone’s battery life - Information Technology Blog.

Apple 82

Join Perficient at Pivotal SpringOne Platform 2019

Perficient - Digital Transformation

Fall is right around the corner, which means SpringOne 2019 will be here before you know it. Continue moving forward with your innovation goals this October by meeting Perficient at Pivotal SpringOne Platform!

VMware spends $4.2B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

Network World

All things cloud are certain to be major topics next week at the VMworld user conference, but VMware took things up a notch with plans to spend $4.2 billion to acquire cloud-development firm Pivotal, and security provider Carbon Black.

Dell 73

US Tech Spending Slowdown Amidst Rising Cloud Adoption Will Squeeze Tech Budgets

Forrester IT

Recent stock and bond market turmoil has highlighted the growing risk of a US economic slowdown and even a recession — a prospect that 74% of economists think will happen by 2021, according to a survey of US economists by the National Association of Business Economists.

Budget 172

Extract SCCM WIM from ISO and Configure for WDS via PowerShell

Mick's IT Blog

One issue, more like a time-waster, I have had as we are migrating to SCCM from MDT is getting the boot image on the WDS server. SCCM is not configured to manage WDS because we use it for other things, so we manually upload the WIM.

Three Tips for Laying the Groundwork for Machine Learning

Information Week

While machine learning may seem overwhelming and complicated, creating an infrastructure for ML projects is more achievable than many organizations think

97

Finding Answers In Your Data Should Not Be a Chore

Perficient - Digital Transformation

I hate looking for clothes to wear, especially if I’m in a hurry. Sometimes life gets crazy and my favorite shirt may still be in the dryer, or I can’t find the match to a sock I already have in my hand. Something easy can turn into a chore very quickly when things aren’t organized.

Digitally Evolving Customer Mindset Will Reshape Indian Financial Services Landscape

Forrester IT

Indian financial service customers are changing! Forrester surveyed 3,000 online adults in India on their financial attitude, expectations, and preferences and found that more than half of customers accessing the internet are constantly online.