Sat.Sep 28, 2019 - Fri.Oct 04, 2019

How To Transform An IT Architecture

The Accidental Successful CIO

When you are going to migrate to a new system, key questions have to be asked Image Credit: Jamie. The reason that an IT department exists within a company is to provide the company with a way to use the importance of information technology to provide the company with a competitive advantage.

It's time to change your cloud operating model

David Linthicum

Enterprises need to change workflows and internal processes around the use of public cloud computing. There, I said it. Organizations understand that the cloud has a huge impact on how they work. This includes the ability to improve agility and efficiency. Cloud computing can be adopted in ways that are most productive for the business. The process of defining the future state of workflows and organizational behavior around the use of cloud computing is called a “cloud operating model.”

Agile 164

How to Measure Digital Transformation Progress

CEB IT

In a European car maker’s manufacturing plant, a car rolls off the production line every 90 seconds. One hour of line stoppage due to IT issues means 40 “lost” cars. This is how the IT department puts digital risk in a business context, by reporting on inventory, revenue and other direct business impacts instead of downtime.

How To 159

Changing Mindsets on IT Automation

Information Week

Enterprises are not fully on board yet and in some cases stuck in manual mode. Here are four key areas to consider to get on the road to automation

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Data breaches now cost companies an average of $1.41 million

Tech Republic Security

IT security budgets now average $18.9 million, up from $8.9 million, with savings credited to internal cybersecurity, according to new Kaspersky report

Budget 114

More Trending

How To Stay Safe When Gaming Online

Galido

Information Technology Blog - - How To Stay Safe When Gaming Online - Information Technology Blog. Any action we take online requires being alert and taking security seriously. Whether browsing, downloading any file, sending an e-mail. Also when we play online we must exercise caution.

Nearly 60% of businesses suffered a data breach in the past 3 years

Tech Republic Security

Some 36% of companies who haven't suffered a breach said it is likely they are unknowingly experiencing one now

5 Ways CIOs Can Better Compete to Recruit Top Tech Talent

Information Week

A CIO shares lessons he's learned about finding and securing the best job candidates for IT teams

Fend off the increasing container attacks in the cloud

David Linthicum

The computer security company Skybox Security released an update to its 2019 Vulnerability and Threat Trends report. As the name implies, this report analyzes the computer vulnerabilities in play during the first half of 2019. Some of the key findings included the rapid growth of vulnerabilities in cloud containers.

Linux 177

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Analysts Answer: How Security Leaders Can Secure Against an Evolved Threat Landscape

CEB IT

Days before this year’s Prime Day, one of Amazon’s highest-performing global shopping sales, customers in the U.S. and Japan experienced a malicious phishing attack. They received a pdf file that redirected them to a phishing site, tricking users into sharing personal data — including payment and contact details. The incident stirred new conversations around cybersecurity and how chief information security officers (CISOs) can combat cyberattacks. .

Banks Have Neglected SMEs. They Will Come To Regret It

Forrester IT

Forrester just published new research outlining the future of small and midsize business banking (also called SME banking to refer to SMEs, or small- and medium-sized enterprises). If you’re an executive at a traditional bank, it contains some grim and gloomy predictions.

CI/CD is not Enough! 5 Pre-Deployment Priorities for Agile DevOps Teams

Social, Agile and Transformation

Having CI/CD pipelines doesn't mean that continuous delivery is a business need or a good idea. I wrote about this a couple of years ago when I asked, "Is Continuous Delivery Right for Your Business?" I know this is a debated topic.

Agile 155

SCCM Orchestration Group Setup Step by Step Guide for Server Patching

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Microsoft recently released SCCM 1909 version of technical preview. Let’s check what SCCM Orchestration Group (controlled patching) setup guide is.

Groups 108

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Top 10 Trends in Digital Commerce

CEB IT

Much has changed since the first products were sold online in the 1990s. Early instances of e-commerce focused on the transaction, with little emphasis on improving fulfillment, customer service or loyalty. Then, organizations began to hone commerce operations in response to customer desires, offering features like inventory visibility, product reviews and package tracking.

Trends 159

Machine Learning Takes To The Cloud

Forrester IT

Machine learning continues to disrupt and democratize itself. Announcing two new Forrester reports that describe the popularity of running machine learning pipelines and workloads in the public cloud, in North America and in Asia Pacific.

Cloud 175

Five Critical Ingredients For Enterprise Blockchain Success

CTOvision

Read Alison McCauley list five critical ingredients for enterprise blockchain adoption on Forbes : Blockchain benefits are driven by network effects: the more participants on a shared platform, the greater its potential value. Yet executives have found it’s a struggle to align the support of their ecosystems. At stake is the potential to unlock trillions […].

Understanding Device Health Attestation Intune Device Compliance Check

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post I will be talking about Device Health Attestation (DHA) and its role in Intune device compliance check. Let’s dive into Intune Device Compliance Check and DHA.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How Infrastructure and Operations Can Enable Digital Change

CEB IT

Infrastructure and operations (I&O) organizations in the digital era are on the cusp of dramatic change. From the death of the data center to the artificial intelligence (AI) revolution , every new wave of digital has a profound impact on the way I&O operates. And as I&O rapidly evolves from a support function to a strategic one, IT teams are no longer seen as service providers, but instead as enablers of business transformation. .

InsureTech Connect 2019 Conference Reflections

Forrester IT

This was my first year at the three-day InsurTech Connect (ITC) conference in Las Vegas, an exuberant experience – it was the immersion of ITC; Las Vegas had nothing to do with it (wink, wink, nudge, nudge). There are three things that I took away from the conference.

AWS billing is broken and Kubernetes won't last, says irreverent economist Corey Quinn

Tech Republic Cloud

The Duckbill Group's outspoken co-founder Corey Quinn shares his thoughts on the cloud industry, Walmart's paranoia about AWS, why Docker is nearly out of money, and why Larry Ellison "is not people

Groups 114

How to protect your organization against insider threats

Tech Republic Security

Whether intentionally or unintentionally, employees can pose a significant security risk to company data, according to a new report from data protection firm Code42

Report 114

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Three vital ethical issues highlighted by the vast potential of neural interfaces

Trends in the Living Networks

Last week I participated in a TV panel discussion on the implications and ethics of neural interfaces , together with the fascinating cyborg artist Neil Harbisson and Oxford University neuroethicist Stephen Rainey. A video of the full program is below.

The Global Information Worker Population Swells To 1.25 Billion In 2018

Forrester IT

Yes, you read that right. There were 1.25 billion global information workers in 2018 — people that use a smartphone, PC, or tablet for work an hour more per day in a typical week. This number may seem astronomical. but in reality, the growth of information workers has just begun.

164
164

OverGrive is the Linux Google Drive client you've been waiting for

Tech Republic Cloud

Install one of the best Google Drive sync tools made specifically for the Linux desktop

Tools 111

How to quickly deploy a honeypot with Kali Linux

Tech Republic Security

Lure possible attackers into a trap with a Kali Linux honeypot

Linux 114

Key Considerations When Adopting Containers

Perficient - Digital Transformation

The following is the fifth blog in a series about software containers and Kubernetes, and their importance in modern application delivery.