Sat.Sep 29, 2018 - Fri.Oct 05, 2018

Unstructured Data: Vulnerable, Uncontrolled, and Getting Bigger Every Day

CTOvision

Unstructured data–data in documents, spreadsheets, images, and other files–accounts for the vast majority of the sensitive information created and stored by a typical organization. These files represent some of an organization’s most valuable assets, as well as some of its greatest security risks. To keep pace with the exponential growth of unstructured data and the […].

Machine learning APIs for Google Cloud Platform

Cloud Musings

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP is widely used cloud solutions supporting AI capabilities to design and develop smart models to turn your data into insights at a cheap, affordable cost.

Google 173

CIOs Are Asking: Why The Cloud and Why Now?

The Accidental Successful CIO

How should CIOs be thinking about cloud computing? Image Credit: JD Hancock. It goes without saying that every CIO is thinking about cloud computing.

Cloud 170

Cloud misconfiguration: The security threat too often overlooked

David Linthicum

A survey of 300 IT professionals by Fugue, a cloud infrastructure security provider, reveals that most enterprises are vulnerable to security events caused by cloud misconfiguration, including data breaches and system downtime events. From the report: Nine in ten have real concerns about security risks due to misconfiguration, and less than a third continuously monitor for them.

Report 218

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Ask A Flowchart: What Should I Name My Marketing AI?

Forrester IT

Artificial Intelligence is a big deal in marketing technology. Forrester sees strong potential in AI as an enabling technology for marketing, and it’s great to see many vendors embracing AI to enhance existing offerings and as the basis for new solutions.

More Trending

Is Cognitive Technology a Better Term than Artificial Intelligence?

CTOvision

One of the challenges for those tracking the artificial intelligence industry is that, surprisingly, there’s no accepted, standard definition of what artificial intelligence really is. As Rodney Brooks puts it starkly in the recently released “This is AI” video, “artificial intelligence doesn’t mean one thing… it’s a collection of practices and pieces that people put […]. Artificial Intelligence CTO News ai artificial intelligence cognitive technology machine learning terminology

What is the future of Internet of Things (IOT) – Blockchain?

Datacponomy

Kevin Ashton, the man who coined the term “Internet of Things” (IoT), wrote in 1999: “If we had computers that knew everything there was to know about things – using data they gathered without any help from us – we would be able to track and count everything, and greatly.

New Tech Spotlight: Health Tech Puts Wellness In The Hands Of The Customer

Forrester IT

Picture the following: You wake up from a fitful night of sleep feeling under the weather. From your sickbed, a voice assistant gathers your symptoms, accesses your patient history and orders a prescription for you.

Video 176

Digital Transaction Guide: Steps to Being Completely Anonymous Online

Doctor Chaos

We currently live in the world that we are being careful of our personal information from being leaked outside our comfort box. However, there are some people who are not careful enough that they are not aware of the possibilities that their information is now in another’s hands.

130
130

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Advantages of Using Cloud Attached SCCM and Intune

Anoop

This post is based on what is new in SCCM (BRK3035) ignite session by Rob York and Dune Desormeaux (also Jeffrey, Karim, and Avi ). If you have not seen the recording, I would highly recommend watching the session recording. I will cover my notes about Cloud Attached SCCM advantages.

Cloud 112

How Google’s DeepMind will train its AI inside Unity’s video game worlds

CTOvision

Alphabet’s DeepMind is partnering with Unity to accelerate machine learning by building virtual environments to develop and test AI algorithms. The collaboration between Unity Technologies (which powers games like Monument Valley and Pokémon Go) and DeepMind will run the software at a giant scale to train algorithms in physics-realistic environments–part of a growing trend in […]. Artificial Intelligence News Google

Do You Need Help With Your Innovation Approach?

Forrester IT

Businesses turn to innovation consulting services vendors to strengthen their own innovation capabilities. These businesses want to strengthen their own competencies to drive sustainable innovation over the longer term

172
172

Part 2 of the Twelve Things I Learned from One Year After Publishing Driving Digital

Social, Agile and Transformation

About two months ago I shared my twelve things I learned from one year after publishing Driving Digital. But I only shared six of them and shared the remaining six with readers of the StarCIO Driving Digital Newsletter. The first six included several important findings including: (1) more companies are developing proprietary software, (5) attend the right conferences to grow and learn and (6.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Download SCCM Client Cache Clean Up Script

Anoop

Do you have problems with SCCM Client cache? In this post, you can learn and download an SCCM Cache Clean Up Script. I will explain how to delete the specific package from SCCM Cache by providing the PackageID /Content ID and also Delete folder which exceeds particular size.

How To 112

Amazon rolls out High Memory Instances for in-memory databases

CTOvision

AWS is looking to push up its leadership position in business cloud computing a notch with the new EC2 high memory instances for in-memory databases like SAP HANA. The new EC2 high memory instances offer a choice of a whopping 6, 9, and 12 terabytes of memory. AWS has said that it is now planning […]. CTO News Amazon SAP

SAP 110

How I Almost Got Phished And Why Training Isn’t Enough

Forrester IT

I received a text message the other day that looked a lot like what I might get from my bank if I triggered some anti fraud check. The timing was impeccable, I had just used the card to pay for takeout and had walked out to my motorcycle to head home. When I initially got […]. mobile security passwords payments personal identity & data management security & risk zero trust Phishing security and risk security training

How to monetize your data in the right way

Datacponomy

Media 102

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Windows Autopilot Deployment Scenarios – On-Prem Hybrid Domain Join

Anoop

Windows Autopilot deployment Scenarios and upcoming features are announced in the Ignite 2018. This post is based on the two sessions BRK3014 and BRK3015 by Tanvir Ahmed and Michael Niehaus. New Windows Autopilot capabilities and expanded partner support simplify modern device deployment. Most catching phrase related to Windows Autopilot for me is “White Glove” Read this post to […].

FireEye unmasks a new North Korean threat group

CTOvision

FireEye researchers have identified a distinct North Korean hacking group called APT38, which focuses almost exclusively on financial crimes. The researchers claimed that the group has already tried to steal $1.1 billion so far. The researcher said that APT38, is distinct from other Pyongyang-linked hackers because of its overriding financial motivation — as opposed to […]. CTO Cyber Security News

Groups 106

What makes a superstar security leader?

Forrester IT

I’m so excited about my latest contribution to our research on “How To Become A Superstar Security Leader” (led by my fabulous colleagues Claire O’Malley and Chris McClean). I often get asked by clients and colleagues I speak to: “what does a modern day CISO look like?

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Network World

Cisco said today it had closed the $2.35 billion deal it made for network identity, authentication security company Duo. According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Application List Report

Mick's IT Blog

We have started the Windows 10 upgrades and part of this process is installing applications for users that are not included in the standard build. One option is to use the SCCM Resource Explorer for a list of apps installed. The problem with that is it is a blanket report. It shows everything and all we were wanting is a report of the additional apps installed after a build.

Defending Against Insider Threats, Innovative Organizations Increasingly Rely on Deception

CTOvision

We live in a world where breaches are now inevitable. Few would argue with this statement, yet many enterprises have not adapted their broader cyber security strategy to reflect our new shared reality—the need for cyber resilience. Last year, the Ponemon Institute found 56 percent of organizations have suffered a data breach of some sort that was caused […].

Flipkart To Cross $1 Billion In Sales During This Year’s Big Billion Days

Forrester IT

On October 6, 2014, Flipkart launched “Big Billion Day,” which falls during the festive season in India that accounts for 40% of key Indian brands’ total annual sales.

163
163

IDG Contributor Network: Identity awareness: it’s more than just a packet

Network World

It was about 20 years ago when I plugged my first Ethernet cable into a switch. It was for our new chief executive officer. Little did she know that she was about to share her traffic with most others on the first floor. At that time being a network engineer, I had five floors to be looked after. Having a few virtual LANs (VLANs) per floor was a common design practice in those traditional days. Essentially, a couple of broadcast domains per floor were deemed OK.

LAN 83

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.