Sat.Jan 12, 2019 - Fri.Jan 18, 2019

How do you talk to your boards about cybersecurity? An old problem in a new world

Forrester IT

Talking to our firms’ Board of Directors about security isn’t a new responsibility for most security leaders, it’s been on our collective agenda’s for many years. And yet, many security leaders still second guess the content and messages they share with their Board.

The Data Mining Trap

Eric D. Brown

In a post titled Data Mining – A Cautionary Tale , I share the idea that data mining can be dangerous by sharing the story of Cornell’s Brian Wansink, who has had multiple papers retracted due to various data mining methods that aren’t quite ethical (or even correct).

Data 161

Speed Up Your Digital Business Transformation

CEB IT

Eighty-seven percent of senior business leaders say digitalization is a company priority and 79% of corporate strategists say it is reinventing their business — creating new revenue streams in new ways. But so far, digital change has been slow and disappointing.

Thinking about blockchain? Do it in the cloud

David Linthicum

According to figures provided to CoinDesk from jobs site Indeed.com, searches for roles involving bitcoin, blockchain , and cryptocurrency dropped by 3.06 percent from October 2017 to October 2018. My experience is that enterprises are dealing something that turned out to be much more complex than the hype led them to believe. So, many enterprises have shelved blockchain efforts, opting instead to spend the money on cloud migration. InfoWorld explains: What is multicloud?

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

It’s Time To Mainstream ABM

Forrester IT

When account-based marketing (ABM) burst onto the scene in 2015, it was positioned by a number of vendors as the death of traditional marketing.

B2B 212

More Trending

How Product Managers Can Identify and Plan for Technology Disruption

CEB IT

Product managers can improve product life cycle management by scanning the horizon to spot truly disruptive technologies. However, there is a big difference between scanning the horizon using a mystical crystal ball and using a radar system. One portends to show you a specific future with no evidence base behind it, while the other uses a scientific approach to provide a rougher, yet more useful, picture of what objects exist in your sphere of visibility so you can plan, decide and act.

What you must know about moving ERP to the cloud

David Linthicum

Nearly 70 percent of enterprise organizations are currently migrating data for enterprise resource planning (ERP) applications to the cloud, according to a report from the Cloud Security Alliance. Almost 90 percent of those surveyed said these business-critical ERP apps (SAP, Oracle, and Microsoft Dynamics) lead to many migration challenges and concerns.

Survey 146

What I See Coming For The Channel In 2019

Forrester IT

We have seen more disruption in the channel in the past 18 months than we saw in the past 37 years combined. As a review, here were my 2018 predictions. Private equity will continue its sweep of the channel software space, creating some unicorns along the way. Verdict: As mentioned in the […].

2018 Ascent Recap

The Investing Edge

Welcome to Ascent’s 2018 recap blog post. We couldn’t be more thankful for the opportunity to work with the smartest, most passionate and kind entrepreneurs and investors on a daily basis. 2018 was filled with lunchtime laughter, personal and professional growth, and plenty of new projects.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Artificial Intelligence Systems Can be Fooled

CTOvision

Read why Nidhi Singh says that artificial intelligence systems have their own severe limitations on Entrepreneur : Despite all its benefits and the ease that technology has brought in, the fear that new-age technologies like artificial intelligence (AI), machine learning and robotics would displace human jobs still looms. However, some researchers don’t agree with the idea that […]. Artificial Intelligence News

Gartner Predicts 2019 for the Future of Privacy

CEB IT

Privacy is a business-critical discipline for many organizations, enforced by multiple regulations. Most recently, the European Union’s General Data Protection Regulation (GDPR) has driven a global movement of maturing privacy and data protection laws with stricter requirements. Privacy requirements dramatically impact an organization’s strategy, purpose and methods for processing personal data.

Backup 119

CES 2019 Delivers Dazzling Tech But Disappointing Experiences

Forrester IT

I spent this week in Las Vegas at CES to check out the latest and greatest technology wonders, ranging from 3D printing, AI, and cryptocurrency to drones, autonomous vehicles, dancing robots, and wearables. A lot of what I saw has broad CX implications for accessibility, healthcare, and more.

3D 200

A blockchain-powered DNA data marketplace will revolutionize? precision medicine

Datacponomy

Blockchain technology can power an open DNA data marketplace that drives a new wave of genomics research to transform precision medicine and the treatment of rare diseases. Humanity is at the very beginning of a tremendously exciting era of precision medicine.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Weaponization Of Artificial Intelligence

CTOvision

Technological development has become a rat race. In the competition to lead the emerging technology race and the futuristic warfare battleground, artificial intelligence (AI) is rapidly becoming the center of the global power play. As seen across many nations, the development in autonomous weapons system (AWS) is progressing rapidly, and this increase in the weaponization […]. Artificial Intelligence News

What you must know about moving ERP to the cloud

David Linthicum

Nearly 70 percent of enterprise organizations are currently migrating data for enterprise resource planning (ERP) applications to the cloud, according to a report from the Cloud Security Alliance. Almost 90 percent of those surveyed said these business-critical ERP apps (SAP, Oracle, and Microsoft Dynamics) lead to many migration challenges and concerns.

Survey 101

Gillette’s Close Shave: Its Latest Ad Is A Masterful Emotional Play Let Down By Its Execution

Forrester IT

Gillette’s Close Shave: Its Latest Ad Is A Masterful Emotional Play Let Down By Its Execution Brands are jumping into the messy arena of polarizing issues with greater fervor – and Gillette just raised the stakes.

SCCM MSIX App Deployment Guide to Deploy 7Zip.MSIX

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I have shared my experience with MSI to MSIX conversion process in the previous blog post. In this post, you will learn how to create SCCM MSIX app deployment.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Phishing scams keep getting smarter, making them difficult to spot

CTOvision

It’s a sad reality that phishing scams are becoming increasingly sophisticated, often making it hard for even savvy users to differentiate between legitimate messages and ones designed to abscond with sensitive personal and financial information. Just a few days ago, for example, we covered an iPhone phishing scam that manages to trick users into thinking […]. Cyber Security News

Thinking about blockchain? Do it in the cloud

David Linthicum

According to figures provided to CoinDesk from jobs site Indeed.com, searches for roles involving bitcoin, blockchain , and cryptocurrency dropped by 3.06 percent from October 2017 to October 2018. My experience is that enterprises are dealing something that turned out to be much more complex than the hype led them to believe. So, many enterprises have shelved blockchain efforts, opting instead to spend the money on cloud migration. InfoWorld explains: What is multicloud?

My Top NRF 2019 Takeaways (AKA, News Vs. Nonsense)

Forrester IT

I say this as both an analyst and a recovering retail professional: NRF is like drinking Red Bull. from a 50′ beer bong. for three days straight. on Jupiter. You just know what’s coming, but there is almost no way to prepare for the deluge of […

Retail 171

Quantum-embedded chips could secure IoT

Network World

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack. The U.K.-based based startup says it has introduced “the world's most advanced security product for IoT devices.”

How Do I Know If My Email Has Been Leaked in a Data Breach?

CTOvision

Read Emily Gray-Fow explain how you can know whether your email has been leaked in any data breach on Business2Community : Many people use their email addresses and a small set of passwords (or even just one password) to log in to their online accounts. Unfortunately, this means that any hacker with your email address […]. Cyber Security News

Data 96

How to Capture and Manage Technical Debt in Agile Development

Social, Agile and Transformation

If you're concerned about the technical debt accumulated by your organization, then consider developing ways to capture and measure it. In my last post, I suggest teams should target nimble architectures and leverage agile principles that enable iterating on the design. Don't plan to get it perfect, plan to get it wrong, iterate on what you learn, and recognize when the business is. agile planning agile software development it management product management software development

Agile 125

Location, Location, Location!

Forrester IT

There are three things that matter in real estate: location, location, location. It is the real estate agent’s mantra and is largely believed to be the most important factor to consider when buying property.

Top 10 IoT vulnerabilities

Network World

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.

What Financial Services Executives Need To Know About Data Security

CTOvision

Read why financial services executives need to know about data security on Forbes : The financial services industry experiences 35% of all data breaches, earning it the unflattering title of the most-breached sector. It’s easy to understand why. The industry is known for its wide array of interconnected systems and the processing of millions of […]. Cyber Security News

Windows 10 Version Numbers & Build Numbers

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. In this post, I will try to keep the Windows 10 version Numbers and Windows 10 build numbers. There was many issues about Windows 10 upgrades and quality of upgrades. There are less number of hotfixes released in the latest versions of Windows 10. So Windows 10 quality is getting stabilized with new versions. Windows […].