Sat.May 19, 2018 - Fri.May 25, 2018

When being cloud-native is a bad idea

David Linthicum

It’s good to be cloud-native, or at least that’s what everyone is telling you. The idea is that you refactor (meaning partially recode) your applications to take advantage of the native features of the host cloud, such as its native APIs, storage systems, database systems, or security systems, depending on what that host cloud services offers.

Netflix or Blockbuster – Justifying the Spend

Perficient - Digital Transformation

Come along with me on a journey back in time: a time when the internet was shiny and new. It’s 1998 and you just fired up your brand new tangerine iMac when your friend sends you a message on AIM asking if you’ve heard about this new DVD service called Netflix. You have not.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Everyday Threats That Can Fool Even The Savviest Of Techies


If you consider yourself an expert in cybersecurity - or even if you’re somewhat knowledgeable about how to protect yourself online, you probably won’t fall for the standard Nigerian prince email scam. Enter your bank account information below, and we’ll send you a whole bunch of money. Those kinds of tricks are old news, and [.]. CTO Cyber Security News Tech Advice Training and Education

The Data Digest: The Dangerous Contradictions Of Consumer Reviews

Forrester IT

The American showman P.T. Barnum understood the value of online consumer reviews well before the arrival of the internet when he said, “Nothing draws a crowd quite like a crowd.”

Data 247

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

How to get women into cloud computing

David Linthicum

The push to get more women in computing is decades old. I remember back in my college professor days they did studies on why there are fewer woman in computer science and information systems studies. We have made little progress since. With the inflection point of new compute trends, such as cloud computing, the need for entry-level talent has also inflected. Everyone is hiring. There’s a shortage.

How To 190

Beginners Guide Setup Windows AutoPilot Deployment


I’m not expert in SCCM OSD and tried to spend time on OSD. So I never invested time to test Windows Autopilot deployment. Windows Autopilot is the buzzword, and most of the device management folks are talking about Windows AutoPilot. I don’t know whether AutoPilot is going to replace OSD or not. But, I can […]. The post Beginners Guide Setup Windows AutoPilot Deployment appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

More Trending

Platform Economy Myth #1: Every Platform Business Is A Marketplace

Forrester IT

Over the next few weeks, we’ll analyze the sacred myths of the platform economy and reveal the real practices that platform businesses have mastered. This is work from our report, Earn Your Place In The Platform Economy: Adopter, Participant, Or Leader?

Report 239

An Outage In An Exchange Causes CIO Problems

The Accidental Successful CIO

A NYSE outage is staring to raise concerns about the IT infrastructure Image Credit: Christine Puccio.

22 essential security commands for Linux

Network World

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. Running privileged commands with sudo – instead of switching user to root – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes.

Linux 104

Intelligent Process Automation: The 4 Levels of AI-Enablement


Today’s knowledge workers are like the office workers of yesterday. They spend their time in email, on the phone, in various desktop and online apps and websites dealing with customers, suppliers, employees, partners, and internal stakeholders. Much of the time is spent dealing with various systems to shuffle information from one place to another, or [.]. Artificial Intelligence CTO News Intelligent Process Automation IPA process Robotic Process Automation RPA

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

The Forrester Summer Book Club

Forrester IT

Forrester’s Board of Clients was in Cambridge last week for an amazingly productive two days of co-creation. Ideas that have come out of the Board in previous years include: the weekly Forrester Podcast, the Forrester iPhone app, and Industry Waves.

Fix for FAILURE (9705): Unable to find USMT file, cannot capture/restore user state

Mick's IT Blog

Recently, I upgraded to the new MDT 6.3.8450.1000. It was a fresh install of the new MDT product in which I created an entirely new MDT share for our Windows 10 build.

Windows 10 OSD Best Practices with SCCM


Windows 10 OSD and migration are today’s hot topic. I think, all the organizations are started Windows 10 projects. If not, they might already be completed their migration projects. You should be very careful about Windows 10 OSD deployments. I read about another probable “Human Error” and which made the whole bank down. Content:- How […]. The post Windows 10 OSD Best Practices with SCCM appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Seems Like We Should All Thank Cloudera, Tamr, Zoomdata, Trifacta, Kinetica For Helping GSK Help Humanity


Jessica Davis just published a piece at Information Week reviewing an architecture Glaxo Smith Kline (GSK) put in place to help make drug development and fielding faster. Creating new drugs always takes years, and after they are created it takes years more to get them fielded. Mark Ramsey is the chief data officer at GSK. [.]. Artificial Intelligence CTO News The Boardroom

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.


Forrester IT

From Thursday to Saturday, more than 70.000 visitors will attend the third edition of VIVA TECH in Paris, one of the largest digital and tech conferences in Europe. The aim is to celebrate innovation and to help start-ups and businesses to grow.

SAP 219

Leading Digital Transformation: Finding the right velocity in driving organizational change

Social, Agile and Transformation

I was recently asked, "Isaac, what keeps you up at night?" My answer is simple. In transformation programs, going too slow can lead to your business being disrupted. If your competitors are putting out great experiences, are more competitive winning business by leveraging data, or are demonstrating strategic business impacts with AI, blockchain, or IoT then your business is at risk. Here's a.

Blockchain Alone Can’t Solve the Facebook Data Privacy Problem


Tech giants are in the dock, politicians are calling for Mark Zuckerberg’s head, and many Facebook users are so incensed about the misuse of their data that they’re thinking about deleting their accounts – perhaps, some time in the future, for at least a day or two. Meanwhile, blockchain is.

Data 115

Finally a GDPR email that was a pleasure to read (thanks Wickr)


We are all getting sick and tired of hearing about the GDPR. Everyone seems to be writing on this. Every consultancy has lists of steps they recommend, and every vendor articulates why their tech is the one to buy to help you get compliant. Even CTOvision has done our share of writing on this very […]. CTO Cyber Security News

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Too Fast To Fail

Forrester IT

There’s an old mantra which no-one really believes any more: Too big to fail. Tell that to the dinosaurs. In the last 20 years business has undergone a critical pivot. We’ve moved from the age of scale, where the winners were vertically integrated monoliths with vast purchasing power, through the age of information, to a […]. digital business digital transformation


How To: Oracle Hyperion FDMEE Import Scripts (Jython)

Perficient - Digital Transformation

Oracle Hyperion Financial Data Quality Management, Enterprise Edition (FDMEE) allows the use of scripting in several locations: Import. Event. Custom. Mapping. Scripting allows you to work with the incoming data fields and strings to modify them as needed before the data is processed.

Dynamically Deploy Security Policies Apps to Windows AutoPilot Devices


I explained about Windows AutoPilot deployment in the previous post. In this post, we will see another useful tip for enterprise implementation of AutoPilot. We have an option to create Azure AD (AAD) dynamic device groups based on Windows AutoPilot profiles. Windows AutoPilot Profile AAD Dynamic Device Groups are helpful to deploy application and security […].

Nearly 500,000 routers infected by Russian malware, Apple’s privacy portal, New LocationSmart scandal


Cyber firms, Ukraine warn of planned Russian attack Cisco's Talos cyber intelligence unit says 500K+ routers in dozens of countries have been infected by Russia-linked malware and could be used to attack Ukraine. Cisco Systems Inc warned on Wednesday that hackers have infected at least 500,000 routers and storage devices in dozens of countries with [.]. CTO Cyber Security Cyber War News

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Magento Acquisition Finally Moves Adobe “Beyond Marketing”, But It’s Just The First Step

Forrester IT

Monday, Adobe announced their $ 1.68B acquisition of Magento. By adding eCommerce capabilities, Adobe is better able to compete with SAP Hybris, Salesforce and Oracle. Why Magento? A number of commerce-centric offerings exist on the market… but none of them are like Magento. Magento has not only shown demonstrable growth, but they also boast a vibrant community of developers and customers and […].

Adobe 200

5 Takeaways from the Unleashing Innovation Panel at #G2I2018

Perficient - Digital Transformation

Last week, experts from the National Geospatial-Intelligence Agency (NGA), TD Ameritrade, and the First National Bank of Omaha (FNBO) came together in St.

Artificial Intelligence and the Project Manager

Cloud Musings

Organizations use teams to create wealth, market share, customer service, competitive advantage, and organizational success. Effective teams accomplish their assigned end goals by engaging in collaboration as a joint learning activity.

Event: Cybersecurity: Internet of Things The Cost of Convenience in the Digital Age


On Tuesday June 5th from 6:30-8:30pm an event focused on cybersecurity of the Internet of Things will feature an interesting discussion by three panelists who know the many nuances of this critically important topic. The discussion topic is "The Cost of Convenience in the Digital Age" Speakers include Camille Stewart, a cyber and technology attorney, [.]. CTO Events Internet of Things News

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

SAP Leonardo Is Growing Up

Forrester IT

Here are a few thoughts from the SAP Leonardo Center launch in Singapore in early May. The good news: since we last reported on Leonardo, SAP is clearer about what Leonardo actually is, and has more mature messaging and interesting customer examples to share. Leonardo itself, though, continues to be a work in progress. So, […].

SAP 194

No Shortage of Innovative Projects with My Perficient Digital Adobe Team

Perficient - Digital Transformation

Our Perficient colleagues share how they live and breathe our core values. Here, Ryan McCullough, a solutions architect, writes about his experiences working on innovative Adobe solutions with his Perficient Digital colleagues. Innovation drives me.

Adobe 78

22 essential Linux security commands

Network World

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. Running privileged commands with sudo – instead of switching user to root – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes.

Linux 68

How the Enlightenment Ends, Realeyes’ AI powered camera, AI Risks, Microsoft’s AI foray, Google’s secret AI boot camp and Bank of America’s AI powered Erica assistant


How the Enlightenment Ends It seemed strange seeing an article on a technology topic from Henry Kissinger. But his piece is a very good read. He argues that "Philosophically, intellectually—in every way—human society is unprepared for the rise of artificial intelligence." The 5000 word article provides context from a historian and a strategist, and is [.]. Artificial Intelligence CTO News

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

When it comes to the modern tech stack, one of the fastest changing areas is around containers, serverless, and choosing the ideal path to cloud native computing. How do you as a technology leader point your team in the right direction, especially given how quickly this is evolving?