Sat.Apr 25, 2020 - Fri.May 01, 2020

Using Analytics to Improve IT Operations and Services

Information Week

Analytics has already enhanced an array of business functions. Now it's IT's turn to benefit from analytics-driven insights


All CISOs Must Be Transformational CISOs Now

Forrester's Customer Insights

In January of 2020, we launched our inaugural “Future of the CISO” report, which identified the “Six Types of CISOs” we discovered through our research. At its release, we received copious amounts of feedback – some we had considered, and some we hadn’t. However, while we were conducing our research, the omnipresent event we know […]. Age of the Customer security risk management CISO future of ciso

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

CIOs Need To Know What Robotic Process Automation (RPA) Is

The Accidental Successful CIO

Robotic Process Automation is coming, will CIOs be ready? Image Credit: Photo by Rock’n Roll Monkey on Unsplash. As the person with the CIO job at your company, you are constantly under pressure to understand the importance of information technology and to find ways to allow the company to do more things quicker.

Mitigate the Challenges of Remote Work for an MSE


Remote work practices can help shore up business continuity during a crisis such as the COVID-19 pandemic. Midsize enterprises (MSEs) tend to be skittish about remote work , viewing it as a threat to productivity and the cohesiveness of their close-knit organizations. It is now time for MSE leaders to take another look at a practice that will yield benefits long after a crisis ends.

Facebook Causes Continue to Show Little Promise as Fundraising Tools

Don't Forget the Human Side of Remote Working

Information Week

One of the biggest mistakes a leader can make is blindly following a prescriptive list of one-size-fits-all tips and solutions for remote work


Challenges and Obstacles to Application of GDPR to Big Data


Read Shinie Bentotahewa and Chaminda Hewage take a look at the challenges and obstacles faced by Big Data applications due to the GDPR on Infosec Magazine : The primary focus of the General Data Protection Regulation (GDPR) framework is on protecting the rights of individuals to privacy, without compromising their personal data stored by state […].

More Trending

3 Actions for Ethical Data Collection During Pandemics


Israel passed an emergency law mandating that its domestic intelligence services track people. The Rhode Island police are making residential door-to-door visits, inquiring whether anyone has been to New York State, to restrict the movements of out-of-state visitors to slow the spread of coronavirus. COVID-19 elevated and expanded the demand for data collection, use and sharing. The coronavirus response calls for urgent and unusual measures in an effort to stem the spread.

Data 202

Top 10 Programming Languages in Demand Right Now

Information Week

These are the programming languages most likely to be used in enterprise IT and most likely to help you get a job

How the Pandemic Is Pushing Blockchain Forward


Read why Remko van Hoek and Mary Lacity say that CoronaVirus pandemic is actually helping in adapting blockchain technology on Harvard Business Review : Because blockchain technologies are uniquely suited to verifying, securing and sharing data, they’re ideal for managing multi-party, inter-organizational, and cross-border transactions. Over the past five years, enterprises across the globe have […].

How to Build Sync between SCCM Intune Portal | Tenant Attach


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Well, the single pane of glass is back again for Configuration Manager and Intune customers. With SCCM 2002 or later version, you can sync ConfigMgr Devices to Intune. Let’s learn how to build sync between SCCM Intune Portal. This is also referred to as Tenant attach. Related post by Vimal Das – How to Build […].

How To 111

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

How ACG and LA Built the Future of Cloud Training

Linux Academy

On July 11th, 2019 I found myself in New York City with about 10,000 other cloud enthusiasts. This was my first big cloud conference with Linux Academy and it was overwhelming, to say the least. As a newcomer, I was armed with the knowledge of my company and our awesome platform, but I didn’t know much about the other vendors throughout the venue—except one. A Cloud Guru was our fiercest competitor and if there was anything I was well aware of, it was their team and offerings.

Next Steps for Cloud Infrastructure Beyond the Pandemic

Information Week

Organizations have long-term decisions, shaped by their responses to COVID-19, to make on cloud and digital transformation

Cloud 121

Artificial intelligence will be used to power cyberattacks, warn security experts


Read why Danny Palmer says that artificial intelligence can be used for cyberattacks on ZDNet : Intelligence and espionage services need to embrace artificial intelligence (AI) in order to protect national security as cyber criminals and hostile nation states increasingly look to use the technology to launch attacks. The UK’s intelligence and security agency GCHQ commissioned […].

Learn The Basic Concepts of PKI – Intune PKI Made Easy With Joy Part-1


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. New Post Alert!] Learn the Basic Concepts of PKI - Intune PKI Made Easy with Joy (Part 1). The post Learn The Basic Concepts of PKI – Intune PKI Made Easy With Joy Part-1 appeared first on How to Manage Devices by Joymalya Basu Roy. Intune Digital Certificate Digital Signature PKI Chain Building PKI Fundamentals PKI Trust Types of Encryption

How To 108

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Shadow IT goes home: How to reduce the risk

ComputerWorld Consumerization IT

Look back 20 years, when IT was responsible for sourcing, licensing configuring and managing all workplace technology. PCs were kept secure by locking them down so that only approved apps and features were available and Active Directory’s group policies allowed fine-grained control over PCs. The only software allowed was what IT provided and managed.

One Size Doesn't Fit All for AI Regulation

Information Week

The sheer scope of AI's impact on society does require some regulation. It will be essential to ensure that AI regulation is fair and ethical while not impeding innovation


A Conversation With National Security and Technology Expert Lewis Shepherd (Part Two)


In this second of a two part OODAcast, OODA CTO Bob Gourley, was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are […]. Artificial Intelligence CTO Lewis Shepherd OODA OODAcast vmware

Client Installation Health Validation PowerShell Script ConfigMgr | SCCM


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. A quick draft about “SCCM Client Agent Installation and Health validation PowerShell Script” there is a lot of ways to install the ConfigMgr client agent automatically, Client push via SCCM console, GPO’s, and many more options. NOTE! – GPO needs to be created as a logon script. Rajesh Nadikoppu is my colleague, he has very good […].

How To 103

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Tech company offers free online cybersecurity training courses

Tech Republic Security

Conscious of the state of employment during the pandemic, as well as after, Fortinet offers an opportunity to build skill sets from home

Course 131

Managing FOMO While Working Remotely

Information Week

Remote work and communication styles that arise with it will not disappear after the current pandemic concerns ease. Here's how IT teams can play a vital role in managing this


A Conversation With Technology Executive and National Security Expert Lewis Shepherd (Part One)


In this two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are shaping the future […]. CTO News Due Diligence Lewis Shepherd OODA OODAcast vmware

This crisis will spawn a vast spectrum of increasingly distinctive and unique organizations

Trends in the Living Networks

I have long believed that organizations are becoming more different from each other and increasingly unique. Social technologies made organizations more different. In the first instance this divergence has been fueled over the last dozen years by organizations implementing social technologies to add a differentiated layer of ad-hoc networks to the existing commoditized layer of standardized processes. Social technologies can be used by the people they connect in an unlimited number of ways.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Install Root CA Sub-Ordinate CA Non-trusted domains |ConfigMgr | SCCM


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. This is a step by step guide to install Root CA and Sub-Ordinate CA installation. Install Certificate Server – ROOT CA and Sub-Ordinate CA. This Installation is an Offline method for non-trusted domains. This helps to install CA Servers for SCCM PKI/Internet clients, creating Certificate templates and How to Configure GPO for Certificate auto-enrollment. Related […].

Welcome to the Era of Extreme Agile

Information Week

Extreme circumstances necessitate extreme agility. Here's how to weather the storm amid widespread, systemic change

Agile 96

Are Chatbots Useful?


Check out Kathleen Walch’s article in Forbes about chatbots: Language and conversation is part of what it is to be human. A large part of human brain function is devoted to processing, creating and understanding communication in both verbal and nonverbal forms. It’s no surprise then that we find it easier to communicate through natural […].


Nintendo data breach reportedly caused by credential stuffing

Tech Republic Security

Attackers used an account checker tool to identify Nintendo accounts with compromised and vulnerable login credentials, says SpyCloud

Tools 129

The Complete Guide to Distributed Tracing

Distributed tracing is a diagnostic technique that reveals how a set of services coordinate to handle individual user requests. Distributed tracing helps enable loosely coupled work across teams for fast, independent problem-solving.

Reaffirming our commitment to Italy: Introducing the AWS Europe (Milan) Region

All Things Distributed

The global healthcare pandemic has been like nothing many of us in Europe have ever known. During this time, many organizations have been contemplating their role in the COVID-19 crisis, and how they can best serve their communities. I can tell you it has been no different for us at Amazon Web Services (AWS). We are focused on where we can make the biggest difference, to help the global communities in which we all live and work.

Putting Cloud Resources to Work On COVID-19 Research

Information Week

A fund to support projects studying the virus offers to make cloud technology more accessible to the research teams that aim to turn the tide on the pandemic

Commander of US Northern Command Cites Good Work of Four Great American Tech Companies


US Northern Command overseas DoD actions in the anti-Covid19 fight inside the US. There are many moving parts in an operation this size, making command and control and decision-making a critical component of success. Technology is critical to success in this operation. Decades of experience in tech support to military operations leaves me with both […]. CTO News Apple Esri JADC2 monktoninc Palantir PalantirTech

Microsoft Office 365: This new feature will keep you safe from malware-filled documents

Tech Republic Security

Application Guard for Office and Safe Documents will make phishing attacks harder and the Office experience better for users, starting with Office 365 Pro Plus and E5 licences

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.