Sat.May 19, 2018 - Fri.May 25, 2018

When being cloud-native is a bad idea

David Linthicum

It’s good to be cloud-native, or at least that’s what everyone is telling you. The idea is that you refactor (meaning partially recode) your applications to take advantage of the native features of the host cloud, such as its native APIs, storage systems, database systems, or security systems, depending on what that host cloud services offers.

Google 158

Netflix or Blockbuster – Justifying the Spend

Perficient - Digital Transformation

Come along with me on a journey back in time: a time when the internet was shiny and new. It’s 1998 and you just fired up your brand new tangerine iMac when your friend sends you a message on AIM asking if you’ve heard about this new DVD service called Netflix. You have not.

Platform Economy Myth #1: Every Platform Business Is A Marketplace

Forrester IT

Over the next few weeks, we’ll analyze the sacred myths of the platform economy and reveal the real practices that platform businesses have mastered. This is work from our report, Earn Your Place In The Platform Economy: Adopter, Participant, Or Leader?

Report 138

Everyday Threats That Can Fool Even The Savviest Of Techies


If you consider yourself an expert in cybersecurity - or even if you’re somewhat knowledgeable about how to protect yourself online, you probably won’t fall for the standard Nigerian prince email scam. Enter your bank account information below, and we’ll send you a whole bunch of money. Those kinds of tricks are old news, and [.]. CTO Cyber Security News Tech Advice Training and Education

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How to get women into cloud computing

David Linthicum

The push to get more women in computing is decades old. I remember back in my college professor days they did studies on why there are fewer woman in computer science and information systems studies. We have made little progress since. With the inflection point of new compute trends, such as cloud computing, the need for entry-level talent has also inflected. Everyone is hiring. There’s a shortage.

How To 159

More Trending

The Data Digest: The Dangerous Contradictions Of Consumer Reviews

Forrester IT

The American showman P.T. Barnum understood the value of online consumer reviews well before the arrival of the internet when he said, “Nothing draws a crowd quite like a crowd.”

Automation is Not Intelligence


You know you’re in the middle of a hype cycle when every industry has products that use some buzzword, regardless of whether or not they have the technical merit or legitimacy to actually use that buzzword. This is where we currently are with regards to the market for Artificial Intelligence (AI) products and services. Cognilytica [.]. Artificial Intelligence CTO News AI automation intelligence ML pe vendors

Artificial Intelligence and the Project Manager

Cloud Musings

Organizations use teams to create wealth, market share, customer service, competitive advantage, and organizational success. Effective teams accomplish their assigned end goals by engaging in collaboration as a joint learning activity.

Beginners Guide Setup Windows AutoPilot Deployment


I’m not expert in SCCM OSD and tried to spend time on OSD. So I never invested time to test Windows Autopilot deployment. Windows Autopilot is the buzzword, and most of the device management folks are talking about Windows AutoPilot. I don’t know whether AutoPilot is going to replace OSD or not. But, I can […]. The post Beginners Guide Setup Windows AutoPilot Deployment appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Forrester Summer Book Club

Forrester IT

Forrester’s Board of Clients was in Cambridge last week for an amazingly productive two days of co-creation. Ideas that have come out of the Board in previous years include: the weekly Forrester Podcast, the Forrester iPhone app, and Industry Waves.

Intelligent Process Automation: The 4 Levels of AI-Enablement


Today’s knowledge workers are like the office workers of yesterday. They spend their time in email, on the phone, in various desktop and online apps and websites dealing with customers, suppliers, employees, partners, and internal stakeholders. Much of the time is spent dealing with various systems to shuffle information from one place to another, or [.]. Artificial Intelligence CTO News Intelligent Process Automation IPA process Robotic Process Automation RPA

Leading Digital Transformation: Finding the right velocity in driving organizational change

Social, Agile and Transformation

I was recently asked, "Isaac, what keeps you up at night?" My answer is simple. In transformation programs, going too slow can lead to your business being disrupted. If your competitors are putting out great experiences, are more competitive winning business by leveraging data, or are demonstrating strategic business impacts with AI, blockchain, or IoT then your business is at risk. Here's a.

22 essential security commands for Linux

Network World

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. Running privileged commands with sudo – instead of switching user to root – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes.

Linux 78

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.


Forrester IT

From Thursday to Saturday, more than 70.000 visitors will attend the third edition of VIVA TECH in Paris, one of the largest digital and tech conferences in Europe. The aim is to celebrate innovation and to help start-ups and businesses to grow.

Seems Like We Should All Thank Cloudera, Tamr, Zoomdata, Trifacta, Kinetica For Helping GSK Help Humanity


Jessica Davis just published a piece at Information Week reviewing an architecture Glaxo Smith Kline (GSK) put in place to help make drug development and fielding faster. Creating new drugs always takes years, and after they are created it takes years more to get them fielded. Mark Ramsey is the chief data officer at GSK. [.]. Artificial Intelligence CTO News The Boardroom

Blockchain Alone Can’t Solve the Facebook Data Privacy Problem


Tech giants are in the dock, politicians are calling for Mark Zuckerberg’s head, and many Facebook users are so incensed about the misuse of their data that they’re thinking about deleting their accounts – perhaps, some time in the future, for at least a day or two. Meanwhile, blockchain is.

Data 78

Fix for FAILURE (9705): Unable to find USMT file, cannot capture/restore user state

Mick's IT Blog

Recently, I upgraded to the new MDT 6.3.8450.1000. It was a fresh install of the new MDT product in which I created an entirely new MDT share for our Windows 10 build.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Too Fast To Fail

Forrester IT

There’s an old mantra which no-one really believes any more: Too big to fail. Tell that to the dinosaurs. In the last 20 years business has undergone a critical pivot. We’ve moved from the age of scale, where the winners were vertically integrated monoliths with vast purchasing power, through the age of information, to a […]. digital business digital transformation


Finally a GDPR email that was a pleasure to read (thanks Wickr)


We are all getting sick and tired of hearing about the GDPR. Everyone seems to be writing on this. Every consultancy has lists of steps they recommend, and every vendor articulates why their tech is the one to buy to help you get compliant. Even CTOvision has done our share of writing on this very […]. CTO Cyber Security News

5 (more) IT trends to watch in 2018 and beyond

mrc's Cup of Joe Blog

Summary: As technology evolves at an ever-increasing pace, it brings major changes to the IT department. In this era, the IT department moves from a back-office function to a true business partner. What trends are driving this change, and how must your IT department adapt?

Windows 10 OSD Best Practices with SCCM


Windows 10 OSD and migration are today’s hot topic. I think, all the organizations are started Windows 10 projects. If not, they might already be completed their migration projects. You should be very careful about Windows 10 OSD deployments. I read about another probable “Human Error” and which made the whole bank down. Content:- How […]. The post Windows 10 OSD Best Practices with SCCM appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

SAP Leonardo Is Growing Up

Forrester IT

Here are a few thoughts from the SAP Leonardo Center launch in Singapore in early May. The good news: since we last reported on Leonardo, SAP is clearer about what Leonardo actually is, and has more mature messaging and interesting customer examples to share. Leonardo itself, though, continues to be a work in progress. So, […].

SAP 108

Nearly 500,000 routers infected by Russian malware, Apple’s privacy portal, New LocationSmart scandal


Cyber firms, Ukraine warn of planned Russian attack Cisco's Talos cyber intelligence unit says 500K+ routers in dozens of countries have been infected by Russia-linked malware and could be used to attack Ukraine. Cisco Systems Inc warned on Wednesday that hackers have infected at least 500,000 routers and storage devices in dozens of countries with [.]. CTO Cyber Security Cyber War News

How Germany’s BDSG-neu Will Impact Mobile Data Collection


Mobile adoption in Germany is rising — with smartphone user volumes tipping 59 million and set to reach 65 million in just four years. For companies, this swelling popularity is a gift – providing insight into customers’ online interactions and habits.

Dynamically Deploy Security Policies Apps to Windows AutoPilot Devices


I explained about Windows AutoPilot deployment in the previous post. In this post, we will see another useful tip for enterprise implementation of AutoPilot. We have an option to create Azure AD (AAD) dynamic device groups based on Windows AutoPilot profiles. Windows AutoPilot Profile AAD Dynamic Device Groups are helpful to deploy application and security […].

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.