Sat.Mar 02, 2019 - Fri.Mar 08, 2019

How to address IoT’s two biggest challenges: data and security

David Linthicum

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right. The reason is pretty simple: We’re collectively trying to capture fine-grained, ongoing, machine-generated data from a fast-growing universe of devices because the more data, the better the analyses are possible from that data. At the same time, it’s clear that security for IoT mostly takes a backseat to everything else.

How To 197

Why Data and Analytics Are Key to Digital Transformation

CEB IT

Information as an asset is still in the “early adoption” phase, which makes it a competitive differentiator for leading organizations as they focus on digital transformation. In turn, data and analytics become strategic priorities. Data and analytics are the key accelerant of an organization’s digitization and transformation efforts. Yet today, fewer than 50% of documented corporate strategies mention data and analytics as fundamental components for delivering enterprise value.

Data 156

Tech Titans Google And Microsoft Are Transforming Cybersecurity

Forrester IT

Last April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cyber security solutions. Security has long been delivered as siloed solutions located on-premise.

Google 189

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining.

More Trending

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019.

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […]. Artificial Intelligence News

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

Quantum computing may allow unstoppable future attacks on corporate networks Image Credit: Brookhaven National Laboratory. One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology.

How CIOs Can Optimize IT Costs

CEB IT

“We need to reduce the IT budget” is a sentence that CIOs despise, but hear too often. When they try to defend the cost in front of the CEO and other non-IT executives, all they see is blank expressions, followed by the request to “just make it happen” and ensure that all services are nevertheless running smoothly. CIOs must showcase that they have evidence of a proactive strategy of continued cost optimization. Many business leaders still view IT as an opaque silo of function and spending. “It

Budget 131

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

What CIOs Can Learn from Fleetwood Mac about Marketing

Forrester IT

Here at Forrester, we love all things music. Each office floor has a different musical theme and all the rooms are named after popular musicians of the time. It’s not uncommon to have a team meeting in Guns N’ Roses or an afternoon phone call in Jackson Browne.

B2B 176

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […]. Artificial Intelligence News

2 reasons a federated database isn’t such a slam-dunk

David Linthicum

It’s often the first problem you solve when moving to the cloud: Your enterprise is using dozens, sometime hundreds, of different heterogenous databases, and now you need to bind them together into hundreds of virtual views of the data in the cloud. What’s good about this is that you don’t need to migrate to new databases, or even move the data from where it’s being currently hosted in the cloud.

Modernize IT Infrastructure in a Hybrid World

CEB IT

A CIO sitting in the office is trying to decide the most appropriate mix of cloud solutions and whether to use edge computing to manage the integration of emerging technologies like artificial intelligence (AI), the Internet of Things (IoT) or blockchain. The CIO knows cloud will be part of the future, but believes hybrid solutions will help to address the challenges of disparate IT environments. “It

WAN 122

The Six Principles of Persuasion

Speaker: Michael Carducci, Tech Leader, VUE Expert, and Full Stack Developer

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Mobile World Congress Offers Food For Thought

Forrester IT

Food Tech figured prominently on the menu at Mobile World Congress 2019. Mobile operators, network equipment providers, device manufacturers and solution providers address challenges from farm, field, fishery or factory to fork, - and beyond. Venture investment has increased significantly.

Mobile 164

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]. Artificial Intelligence CTO Cyber Security

Innovations in Adobe Analytics via AEM Authoring

Perficient - Digital Transformation

In 2015 the Ford Motor Company made the significant investment to purchase and integrate the full Adobe Marketing Cloud solution with the goal to deliver personalized and optimized content through its myriad of digital channels.

Adobe 95

Fuel Digital Business With Product Management

CEB IT

The days of traditional product management are no more. Digital business has updated the responsibilities of product managers to include managing innovation and rallying relevant stakeholders to evolve their organization's product strategy. The scope of digital product management has expanded, so IT and digital business leaders must cater to this change. By 2020, organizations that have embraced the product management model will outperform those that have not.

WAN 119

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018.

Budget 157

Operationalizing AI

CTOvision

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models? What does […].

Active Directory PowerShell Module Configuration Baseline

Mick's IT Blog

With the recent 1809, RSAT is now integrated into Windows, which is a major plus for the admin side. In my environment, I have the active directory PowerShell module enabled on all machines for two reasons. The first is I use it to move the machine in AD during the build process.

Embrace a Passwordless Approach to Improve Security

CEB IT

Despite their weaknesses, passwords are still widely used. Easy-to-guess and reused legacy passwords are vulnerable to a wide range of attacks and, by themselves, do not provide proper security for sensitive systems and confidential information. While eliminating passwords has been a long-standing goal, it is finally seeing real traction in the marketplace.

Data And Analytics Leaders, We Need You!

Forrester IT

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer (CDO).

Survey 156

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […]. Cyber Security News

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Smart contracts are trackable, verifiable transactions.

Local Administrator Baseline Compliance

Mick's IT Blog

One of the issues we have had is some users ending up being in the administrators group. There are circumstances to which we have to sometimes put a user in that group to install an application which is both user and computer-based. It can be easy to forget to take the user back out of that group.

Groups 119

Uncovering 2020 Digital Experience Priorities: It’s That (survey) Time of Year!

Forrester IT

This week we launched our annual panel survey on Digital Experience (DX) priorities, challenges and strategies. If you’re a leader, decision-maker, or influencer of your enterprise DX strategy, we’d love to have your input: [link] take the survey?

Survey 150

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […]. CTO News

Devops 139