Sat.Sep 29, 2018 - Fri.Oct 05, 2018

Unstructured Data: Vulnerable, Uncontrolled, and Getting Bigger Every Day


Unstructured data–data in documents, spreadsheets, images, and other files–accounts for the vast majority of the sensitive information created and stored by a typical organization. These files represent some of an organization’s most valuable assets, as well as some of its greatest security risks. To keep pace with the exponential growth of unstructured data and the […].

Machine learning APIs for Google Cloud Platform

Cloud Musings

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP is widely used cloud solutions supporting AI capabilities to design and develop smart models to turn your data into insights at a cheap, affordable cost.

Google 176

CIOs Are Asking: Why The Cloud and Why Now?

The Accidental Successful CIO

How should CIOs be thinking about cloud computing? Image Credit: JD Hancock. It goes without saying that every CIO is thinking about cloud computing.

Cloud 171

Digital Transaction Guide: Steps to Being Completely Anonymous Online

Doctor Chaos

We currently live in the world that we are being careful of our personal information from being leaked outside our comfort box. However, there are some people who are not careful enough that they are not aware of the possibilities that their information is now in another’s hands.


Cloud misconfiguration: The security threat too often overlooked

David Linthicum

A survey of 300 IT professionals by Fugue, a cloud infrastructure security provider, reveals that most enterprises are vulnerable to security events caused by cloud misconfiguration, including data breaches and system downtime events. From the report: Nine in ten have real concerns about security risks due to misconfiguration, and less than a third continuously monitor for them.

Report 171

Is Cognitive Technology a Better Term than Artificial Intelligence?


One of the challenges for those tracking the artificial intelligence industry is that, surprisingly, there’s no accepted, standard definition of what artificial intelligence really is. As Rodney Brooks puts it starkly in the recently released “This is AI” video, “artificial intelligence doesn’t mean one thing… it’s a collection of practices and pieces that people put […]. Artificial Intelligence CTO News ai artificial intelligence cognitive technology machine learning terminology

More Trending

Digital Transaction Guide: Steps to Being Completely Anonymous Online

Doctor Chaos

We currently live in the world that we are being careful of our personal information from being leaked outside our comfort box. However, there are some people who are not careful enough that they are not aware of the possibilities that their information is now in another’s hands.


Part 2 of the Twelve Things I Learned from One Year After Publishing Driving Digital

Social, Agile and Transformation

About two months ago I shared my twelve things I learned from one year after publishing Driving Digital. But I only shared six of them and shared the remaining six with readers of the StarCIO Driving Digital Newsletter. The first six included several important findings including: (1) more companies are developing proprietary software, (5) attend the right conferences to grow and learn and (6.

How Google’s DeepMind will train its AI inside Unity’s video game worlds


Alphabet’s DeepMind is partnering with Unity to accelerate machine learning by building virtual environments to develop and test AI algorithms. The collaboration between Unity Technologies (which powers games like Monument Valley and Pokémon Go) and DeepMind will run the software at a giant scale to train algorithms in physics-realistic environments–part of a growing trend in […]. Artificial Intelligence News Google

Ask A Flowchart: What Should I Name My Marketing AI?

Forrester IT

Artificial Intelligence is a big deal in marketing technology. Forrester sees strong potential in AI as an enabling technology for marketing, and it’s great to see many vendors embracing AI to enhance existing offerings and as the basis for new solutions.

Advantages of Using Cloud Attached SCCM and Intune


This post is based on what is new in SCCM (BRK3035) ignite session by Rob York and Dune Desormeaux (also Jeffrey, Karim, and Avi ). If you have not seen the recording, I would highly recommend watching the session recording. I will cover my notes about Cloud Attached SCCM advantages.

Cloud 103

How to monetize your data in the right way


Media 91

Amazon rolls out High Memory Instances for in-memory databases


AWS is looking to push up its leadership position in business cloud computing a notch with the new EC2 high memory instances for in-memory databases like SAP HANA. The new EC2 high memory instances offer a choice of a whopping 6, 9, and 12 terabytes of memory. AWS has said that it is now planning […]. CTO News Amazon SAP

SAP 157

The Day Of The Machine Is Here: Are We Human Enough To Seize It?

Forrester IT

You’re an executive, an employer, or maybe an up-and-comer in your organization, but either way, you have surveyed the moment and you know that big things are poised to happen. Unlike the big things of the past — the Internet or mobile — the change won’t be the result of consumers embracing a shiny new object or buying into a […]. automation digital disruption robotics promoted

Survey 137

Download SCCM Client Cache Clean Up Script


Do you have problems with SCCM Client cache? In this post, you can learn and download an SCCM Cache Clean Up Script. I will explain how to delete the specific package from SCCM Cache by providing the PackageID /Content ID and also Delete folder which exceeds particular size.

How To 103

What is the future of Internet of Things (IOT) – Blockchain?


Kevin Ashton, the man who coined the term “Internet of Things” (IoT), wrote in 1999: “If we had computers that knew everything there was to know about things – using data they gathered without any help from us – we would be able to track and count everything, and greatly.

FireEye unmasks a new North Korean threat group


FireEye researchers have identified a distinct North Korean hacking group called APT38, which focuses almost exclusively on financial crimes. The researchers claimed that the group has already tried to steal $1.1 billion so far. The researcher said that APT38, is distinct from other Pyongyang-linked hackers because of its overriding financial motivation — as opposed to […]. CTO Cyber Security News

Groups 150

New Tech Spotlight: Health Tech Puts Wellness In The Hands Of The Customer

Forrester IT

Picture the following: You wake up from a fitful night of sleep feeling under the weather. From your sickbed, a voice assistant gathers your symptoms, accesses your patient history and orders a prescription for you.

Video 133

Windows Autopilot Deployment Scenarios – On-Prem Hybrid Domain Join


Windows Autopilot deployment Scenarios and upcoming features are announced in the Ignite 2018. This post is based on the two sessions BRK3014 and BRK3015 by Tanvir Ahmed and Michael Niehaus. New Windows Autopilot capabilities and expanded partner support simplify modern device deployment. Most catching phrase related to Windows Autopilot for me is “White Glove” Read this post to […].

Application List Report

Mick's IT Blog

We have started the Windows 10 upgrades and part of this process is installing applications for users that are not included in the standard build. One option is to use the SCCM Resource Explorer for a list of apps installed. The problem with that is it is a blanket report. It shows everything and all we were wanting is a report of the additional apps installed after a build.

Defending Against Insider Threats, Innovative Organizations Increasingly Rely on Deception


We live in a world where breaches are now inevitable. Few would argue with this statement, yet many enterprises have not adapted their broader cyber security strategy to reflect our new shared reality—the need for cyber resilience. Last year, the Ponemon Institute found 56 percent of organizations have suffered a data breach of some sort that was caused […].

Do You Need Help With Your Innovation Approach?

Forrester IT

Businesses turn to innovation consulting services vendors to strengthen their own innovation capabilities. These businesses want to strengthen their own competencies to drive sustainable innovation over the longer term


Why CIOs Will Lead Digital Transformation

Information Week

IT executives, with their view into technology's potential, are leading key innovation efforts, and it looks like more of their peers will do the same


Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Network World

Cisco said today it had closed the $2.35 billion deal it made for network identity, authentication security company Duo. According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.

Facebook data breach: 4 simple steps to stay safer right now


You must have read about the latest massive Facebook data breach which could have leaked personal identifiable information including phone numbers of more than 50 million users last week. Luckily for those whose data has been stolen, there have been no signs that the hackers leaked any user data online or published content. However, as […]. CTO Cyber Security News

Data 136

Flipkart To Cross $1 Billion In Sales During This Year’s Big Billion Days

Forrester IT

On October 6, 2014, Flipkart launched “Big Billion Day,” which falls during the festive season in India that accounts for 40% of key Indian brands’ total annual sales.


What Does a Degree in Data Science Really Mean?

Information Week

Whether you need to pursue higher education for a job in data science really boils down to your existing skill set and specific goals

IDG Contributor Network: Identity awareness: it’s more than just a packet

Network World

It was about 20 years ago when I plugged my first Ethernet cable into a switch. It was for our new chief executive officer. Little did she know that she was about to share her traffic with most others on the first floor. At that time being a network engineer, I had five floors to be looked after. Having a few virtual LANs (VLANs) per floor was a common design practice in those traditional days. Essentially, a couple of broadcast domains per floor were deemed OK.

LAN 72

You have always known there is a threat of hardware attacks: Get ugly details here


It is important to remember the threat of hardware based attacks. They have always been a threat vector, but hardly ever in the news. Now that part has changed. Bloomberg Businessweek has just run a well researched story into a hardware attack that is incredible in scope. The overall theme of the attack will not […]. CTO Cyber Security Cyber War News

What makes a superstar security leader?

Forrester IT

I’m so excited about my latest contribution to our research on “How To Become A Superstar Security Leader” (led by my fabulous colleagues Claire O’Malley and Chris McClean). I often get asked by clients and colleagues I speak to: “what does a modern day CISO look like?