Sat.Mar 02, 2019 - Fri.Mar 08, 2019

How to address IoT’s two biggest challenges: data and security

David Linthicum

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right. The reason is pretty simple: We’re collectively trying to capture fine-grained, ongoing, machine-generated data from a fast-growing universe of devices because the more data, the better the analyses are possible from that data. At the same time, it’s clear that security for IoT mostly takes a backseat to everything else.

How To 198

Why Data and Analytics Are Key to Digital Transformation

CEB IT

Information as an asset is still in the “early adoption” phase, which makes it a competitive differentiator for leading organizations as they focus on digital transformation. In turn, data and analytics become strategic priorities. Data and analytics are the key accelerant of an organization’s digitization and transformation efforts. Yet today, fewer than 50% of documented corporate strategies mention data and analytics as fundamental components for delivering enterprise value.

Data 157

Tech Titans Google And Microsoft Are Transforming Cybersecurity

Forrester IT

Last April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cyber security solutions. Security has long been delivered as siloed solutions located on-premise.

Google 193

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

2 reasons a federated database isn’t such a slam-dunk

David Linthicum

It’s often the first problem you solve when moving to the cloud: Your enterprise is using dozens, sometime hundreds, of different heterogenous databases, and now you need to bind them together into hundreds of virtual views of the data in the cloud. What’s good about this is that you don’t need to migrate to new databases, or even move the data from where it’s being currently hosted in the cloud.

More Trending

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019.

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […]. Artificial Intelligence News

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

Quantum computing may allow unstoppable future attacks on corporate networks Image Credit: Brookhaven National Laboratory. One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology.

How CIOs Can Optimize IT Costs

CEB IT

“We need to reduce the IT budget” is a sentence that CIOs despise, but hear too often. When they try to defend the cost in front of the CEO and other non-IT executives, all they see is blank expressions, followed by the request to “just make it happen” and ensure that all services are nevertheless running smoothly. CIOs must showcase that they have evidence of a proactive strategy of continued cost optimization. Many business leaders still view IT as an opaque silo of function and spending. “It

Budget 135

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

What CIOs Can Learn from Fleetwood Mac about Marketing

Forrester IT

Here at Forrester, we love all things music. Each office floor has a different musical theme and all the rooms are named after popular musicians of the time. It’s not uncommon to have a team meeting in Guns N’ Roses or an afternoon phone call in Jackson Browne.

B2B 174

Operationalizing AI

CTOvision

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models? What does […].

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining.

Modernize IT Infrastructure in a Hybrid World

CEB IT

A CIO sitting in the office is trying to decide the most appropriate mix of cloud solutions and whether to use edge computing to manage the integration of emerging technologies like artificial intelligence (AI), the Internet of Things (IoT) or blockchain. The CIO knows cloud will be part of the future, but believes hybrid solutions will help to address the challenges of disparate IT environments. “It

WAN 121

Mobile World Congress Offers Food For Thought

Forrester IT

Food Tech figured prominently on the menu at Mobile World Congress 2019. Mobile operators, network equipment providers, device manufacturers and solution providers address challenges from farm, field, fishery or factory to fork, - and beyond. Venture investment has increased significantly.

Mobile 167

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […]. Artificial Intelligence News

Bitlocker Active Directory Recovery Password Backup Compliance

Mick's IT Blog

Recently, we had an issue of some machines not backing up the Bitlocker recovery password to active directory, even with the GPO in place. They ended up being offline while the bitlocker process took place. Plus, some of the systems in AD had multiple entries, which can be cumbersome.

Backup 125

Fuel Digital Business With Product Management

CEB IT

The days of traditional product management are no more. Digital business has updated the responsibilities of product managers to include managing innovation and rallying relevant stakeholders to evolve their organization's product strategy. The scope of digital product management has expanded, so IT and digital business leaders must cater to this change. By 2020, organizations that have embraced the product management model will outperform those that have not.

WAN 114

Data And Analytics Leaders, We Need You!

Forrester IT

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer (CDO).

Survey 162

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]. Artificial Intelligence CTO Cyber Security

Local Administrator Baseline Compliance

Mick's IT Blog

One of the issues we have had is some users ending up being in the administrators group. There are circumstances to which we have to sometimes put a user in that group to install an application which is both user and computer-based. It can be easy to forget to take the user back out of that group.

Groups 128

Embrace a Passwordless Approach to Improve Security

CEB IT

Despite their weaknesses, passwords are still widely used. Easy-to-guess and reused legacy passwords are vulnerable to a wide range of attacks and, by themselves, do not provide proper security for sensitive systems and confidential information. While eliminating passwords has been a long-standing goal, it is finally seeing real traction in the marketplace.

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018.

Budget 162

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […]. Cyber Security News

Innovations in Adobe Analytics via AEM Authoring

Perficient - Digital Transformation

In 2015 the Ford Motor Company made the significant investment to purchase and integrate the full Adobe Marketing Cloud solution with the goal to deliver personalized and optimized content through its myriad of digital channels.

Adobe 85

Active Directory PowerShell Module Configuration Baseline

Mick's IT Blog

With the recent 1809, RSAT is now integrated into Windows, which is a major plus for the admin side. In my environment, I have the active directory PowerShell module enabled on all machines for two reasons. The first is I use it to move the machine in AD during the build process.

Uncovering 2020 Digital Experience Priorities: It’s That (survey) Time of Year!

Forrester IT

This week we launched our annual panel survey on Digital Experience (DX) priorities, challenges and strategies. If you’re a leader, decision-maker, or influencer of your enterprise DX strategy, we’d love to have your input: [link] take the survey?

Survey 157

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […]. CTO News

Devops 134

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions.

List of Microsoft 365 Certification Exams and Cost Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will learn about the Microsoft 365 Certification exam in details. I have created a table to keep track of Microsoft certifications, exams, and training classes.