Sat.Mar 02, 2019 - Fri.Mar 08, 2019

How to address IoT’s two biggest challenges: data and security

David Linthicum

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right. The reason is pretty simple: We’re collectively trying to capture fine-grained, ongoing, machine-generated data from a fast-growing universe of devices because the more data, the better the analyses are possible from that data. At the same time, it’s clear that security for IoT mostly takes a backseat to everything else.

How To 304

Why Data and Analytics Are Key to Digital Transformation

CEB IT

Information as an asset is still in the “early adoption” phase, which makes it a competitive differentiator for leading organizations as they focus on digital transformation. In turn, data and analytics become strategic priorities. Data and analytics are the key accelerant of an organization’s digitization and transformation efforts. Yet today, fewer than 50% of documented corporate strategies mention data and analytics as fundamental components for delivering enterprise value.

Data 239

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tech Titans Google And Microsoft Are Transforming Cybersecurity

Forrester IT

Last April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cyber security solutions. Security has long been delivered as siloed solutions located on-premise.

Google 396

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web.

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

2 reasons a federated database isn’t such a slam-dunk

David Linthicum

It’s often the first problem you solve when moving to the cloud: Your enterprise is using dozens, sometime hundreds, of different heterogenous databases, and now you need to bind them together into hundreds of virtual views of the data in the cloud. What’s good about this is that you don’t need to migrate to new databases, or even move the data from where it’s being currently hosted in the cloud.

Is Your Organization Customer Centric?

CEB IT

Gartner predicts that, by 2020, poor customer experiences will destroy 30% of digital business projects. Will yours be one of them? What does it mean to be customer centric?

More Trending

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […]. Artificial Intelligence News

List of Microsoft 365 Certification Exams and Cost Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, you will learn about the Microsoft 365 Certification exam in details. I have created a table to keep track of Microsoft certifications, exams, and training classes.

How CIOs Can Optimize IT Costs

CEB IT

“We need to reduce the IT budget” is a sentence that CIOs despise, but hear too often. When they try to defend the cost in front of the CEO and other non-IT executives, all they see is blank expressions, followed by the request to “just make it happen” and ensure that all services are nevertheless running smoothly. CIOs must showcase that they have evidence of a proactive strategy of continued cost optimization. Many business leaders still view IT as an opaque silo of function and spending. “It

Budget 237

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […]. Artificial Intelligence News

How Low-Code and No-Code Fit into a DevOps Strategy

Information Week

There are ways organizations can simplify app creation if they do not have the resources to build them from scratch

Devops 158

Fuel Digital Business With Product Management

CEB IT

The days of traditional product management are no more. Digital business has updated the responsibilities of product managers to include managing innovation and rallying relevant stakeholders to evolve their organization's product strategy. The scope of digital product management has expanded, so IT and digital business leaders must cater to this change. By 2020, organizations that have embraced the product management model will outperform those that have not.

WAN 233

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018.

Budget 358

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]. Artificial Intelligence CTO Cyber Security

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining.

Modernize IT Infrastructure in a Hybrid World

CEB IT

A CIO sitting in the office is trying to decide the most appropriate mix of cloud solutions and whether to use edge computing to manage the integration of emerging technologies like artificial intelligence (AI), the Internet of Things (IoT) or blockchain. The CIO knows cloud will be part of the future, but believes hybrid solutions will help to address the challenges of disparate IT environments. “It

WAN 220

Mobile World Congress Offers Food For Thought

Forrester IT

Food Tech figured prominently on the menu at Mobile World Congress 2019. Mobile operators, network equipment providers, device manufacturers and solution providers address challenges from farm, field, fishery or factory to fork, - and beyond. Venture investment has increased significantly.

Mobile 354

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Operationalizing AI

CTOvision

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models? What does […].

Innovations in Adobe Analytics via AEM Authoring

Perficient - Digital Transformation

In 2015 the Ford Motor Company made the significant investment to purchase and integrate the full Adobe Marketing Cloud solution with the goal to deliver personalized and optimized content through its myriad of digital channels.

Adobe 136

Embrace a Passwordless Approach to Improve Security

CEB IT

Despite their weaknesses, passwords are still widely used. Easy-to-guess and reused legacy passwords are vulnerable to a wide range of attacks and, by themselves, do not provide proper security for sensitive systems and confidential information. While eliminating passwords has been a long-standing goal, it is finally seeing real traction in the marketplace.

Data And Analytics Leaders, We Need You!

Forrester IT

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer (CDO).

Data 352

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […]. Cyber Security News

VMware firewall takes aim at defending apps in data center, cloud

Network World

VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into its NSX network management software, vSphere hypervisors and AppDefense threat-detection system.

AI as a Human Right

Information Week

As some thought leaders advocate for the recognition of access to AI as a human right, the question comes up: How could we achieve that

123
123

Attendee Journey Highs And Lows At MWC19 Barcelona

Forrester IT

I just returned from MWC19 Barcelona, for which I was a judge of the GLOMO Awards. As a Forrester analyst whose research includes service design, I paid extra attention to the attendee journey.

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […]. CTO News

Devops 208

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions.

IT Talent Shortages: What Businesses are Doing to Cope

Information Week

For organizations that are having trouble recruiting IT professionals with in-demand skills, some options have become available in the cloud and gig economy

Cloud 123

We Should Chat About WeChat And Why Facebook Wants In

Forrester IT

For years, I’ve maintained that Mark Zuckerberg, CEO of Facebook Inc., has had his eye on a singular goal: becoming the global version of China’s WeChat. WeChat is China’s most popular messaging app with 1 billion monthly users. China’s population is 1.4

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

When it comes to the modern tech stack, one of the fastest changing areas is around containers, serverless, and choosing the ideal path to cloud native computing. How do you as a technology leader point your team in the right direction, especially given how quickly this is evolving?