Sat.Apr 06, 2019 - Fri.Apr 12, 2019

CIOs Want To Run Their IT Department Like Adobe

The Accidental Successful CIO

Adobe has a satisfied workforce, how can CIOs have the same thing? Image Credit: a_bul16. Being the person with the CIO job is hard work. You try and you try and you try to do a good job but it always seems like you are somehow falling further and further behind.

Adobe 180

3 signs you’re going overboard with cloud features

David Linthicum

I’ve been working with new trendy tech for years, and one of the things that’s been driving me crazy is not the speed at which things move but the fact that my clients want to keep up at any cost. There are several new features (aka cloud services) that are announced or released from public cloud providers monthly, not just at their user conferences: new database services, new AI services, new blockchain services, new serverless services, new container services.

An Offensive Defense: Lessons from the Equifax and Marriott Breaches

CEB IT

In 2017, credit reporting agency Equifax announced the compromise of the personal data of 145 million U.S. consumers and limited information of residents of Canada and Great Britain, including names, addresses, Social Security numbers and birth dates.

Hotels 119

Cyber Catalyst Brings Minimal Value To Businesses

Forrester IT

In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Insights for your enterprise approach to AI and ML ethics: Advice for the C-Suite

CTOvision

This post is the third in a series of three based on interviews of Courtney Bowman and Anthony Bak of Palantir. The first post laid a foundation which can help any organization seeking to establish an ethics policy and program around AI and ML. The second post picked up from there and dove into the […]. Artificial Intelligence News

More Trending

The Art of the One Page Strategy

CEB IT

In 1967, Rollin Kin and Herb Kelleher drew a triangle on a napkin. At each point was a city: Dallas, San Antonio and Houston. The two men created a vision for a low-cost commuter airline moving passengers between the three cities.

Forthcoming Innovation Insights

Forrester IT

As you have heard from me before, in today’s age of the customer that is driven by digital transformations, to position your company for future market leadership you must prioritize tech-driven innovations that delivery net-new values to your customers.

.Net 165

Yahoo data breach settlement effort reaches $117.5 million

CTOvision

Yahoo has once again attempted to settle a class-action lawsuit involving millions of users following one of the largest data breaches in history with a revised settlement figure of $117.5 million. On Tuesday, the proposed resolution to the lawsuit was made public. The revised figure of $117.5 million has been made in response to criticism made […]. Cyber Security News

Data 152

10 Questions before starting a Machine Learning POC

Social, Agile and Transformation

37% of organizations have implemented artificial intelligence in some form according to Gartner. Since AI is a a broad category of algorithms covering cognitive, natural language, pattern recognition and other areas, I suspect the number of organizations experimenting with machine learning or deep learning is a lot smaller. Yet there are daily stories of different organizations benefiting. agile data AI big data data management data scientist innovation leadership

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

The Secret to DevOps Success

CEB IT

Richard, an infrastructure and operations (I&O) leader at a large manufacturing organization, has been tasked by his CIO to develop an DevOps initiative to help the company better scale its software releases and updates. This is the first time that Richard is working on this type of initiative. He is unsure about how to approach it and concerned about being successful.

Devops 159

Marketing Cloud Vendors Pick Up Where CDPs Left Off

Forrester IT

The last couple weeks have been an exciting time for the customer data platform (CDP) category. At long last, major marketing technology vendors formally declared their intentions to get serious about managing and activating data for marketing.

Data 158

The decentralised Web 3.0: How would the DWeb work?

CTOvision

Have you recently considered deleting your Facebook account, boycotting Amazon or trying to find an alternative to Google? You wouldn’t be alone. The tech giants are invading our privacy, misusing our data, strangling economic growth and helping governments spy on us. Yet because these few companies own so many of the internet’s key services, it […]. CTO News

Google 157

How can you be AI ready?

Datacponomy

Organizations implementing AI have increased by 270 per cent over the last four years, according to a recent survey by Gartner. Even though the implementation of AI is a growing trend, 63 per cent of organizations haven’t deployed this technology. What is holding them back: cost, talent shortage?

CIO Power Politics: How to Say No Assertively [Video]

CEB IT

“How do I say no assertively without damaging relationships and minimize collateral damage?”. This is one of the most common questions Tina Nunno , Distinguished Vice President Analyst, Gartner receives during conversations with CIO s.

Video 144

What’s News In Food Tech? Data Tools Help Separate The Wheat From The Chaff

Forrester IT

Looking for a new data source to deliver differentiating insights? Yeah, you and everyone else. It’s not easy to find that local knowledge or the heads up about something that will drive business. There is more and more information out there. We’re constantly bombarded with news.

Tools 150

Is Your Business Ready for the Internet of Things?

CTOvision

Read why Aviva Leebow Wolmer says that adopting the Internet of Things is must for businesses on Entrepreneur : Ten years ago, it would have been strange to stand alone in a room and tell that someone named “Alexa” to order pizza — but today, most of us take in stride the virtual assistance that […]. CTO News

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

Network World

The Department of Homeland Security has issued a warning that some VPN packages from Cisco, Palo Alto, F5 and Pusle may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system. The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) warning comes on the heels of a notice from Carnegie Mellon's CERT that multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files.

How to Balance Personalization With Data Privacy

CEB IT

If you were asked to hand over your email address in return for a free pizza or a discount on your daily coffee, would you do it? How often do you tick "Agree" without reading an app's privacy policy? Despite having less trust in brands to use their data ethically, millennials are more willing to provide companies with information in exchange for convenience and personalized experiences, according to a recent Gartner survey.

How To 113

Get Sirius About Customer Engagement Marketing

Forrester IT

In 2003, Fred Reichheld, who was by then a partner at Bain & Company, introduced a way of measuring how well an organization treats its customers. This metric also assessed how well a firm generates relationships worthy of loyalty.

.Net 144

As the connectivity of trucking fleets grows, so do cybersecurity risks

CTOvision

Connectivity is changing commercial truck fleet operations. While the development of autonomous heavy vehicles is still in early stages, fleet owners have been increasingly relying on “connected” trucks to improve their uptime, safety, fuel efficiency and tracking, among other things. But every connected technology — from telematics and remote diagnostics to in-cab software and on-board […]. Cyber Security News

SCCM Step by Step Guide to Update Windows ADK and WinPE Versions

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. I think, most of the SCCM admins missed this latest Windows 1809 ADK change. In this post, you will see what are the ADK and WinPE changes concerned for SCCM admins.

8 Steps for a High-Impact Enterprise Architecture Program

CEB IT

Since 2013, Gartner has observed a dramatic resurgence and growth of interest in enterprise architecture (EA). Much of the growth and interest is being driven by the demands of digital business and the need for CIOs to start, restart or renew their EA programs. This resurgence is helping CEOs and fellow business leaders deliver on the promise of digital business transformation and optimization. But where should you begin?

Take A Stand For Consumer Privacy: The Anti-Surveillance Economy

Forrester IT

“If You’re Not Paying For It, You’re The Product. ” If you have worked in or around tech for the last decade, you have heard — or likely spoken — this irreverent remark about the data economy. While critics are all too willing to give this judgment on the use of consumer […].

The problem with AI ethics

CTOvision

Many AI critics say big tech companies are formulating AI ethics boards and principles as a strategy for avoiding the possibility of government regulation. Read more on The Verge : Last week, Google announced that it is creating a new external ethics board to guide its “responsible development of AI.” On the face of it, […]. Artificial Intelligence News

Google 139

SCCM OSD Task Sequence Steps by Step Ultimate Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Hello All, My name is Vishal Goyel, and this is my first post on this blog. I worked for several years as a Microsoft support engineer specialized in SCCM Task Sequence and OSD. In this post, you will learn step by step description of the SCCM OSD Task Sequence. Introduction SCCM OSD Task Sequence The […].

Three Perspectives of Strategic CIOs

Future of CIO

Due to the exponential growth of information and continuous disruptions often led by technologies, the business will not just use IT as a digital extension, but leverage IT across their organization to attain the enterprise-wide digital transformation.

The Security Snapshot: 10-Year Challenge

Forrester IT

At the start of the new year, a meme called the 10-Year Challenge went viral. The premise is simple: Post a photo of yourself in 2009 and a photo of yourself in 2019 to highlight certain changes that may have taken place in that time.

Anatomy of a Cloud-Native Data Breach

CTOvision

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a real-life example of a cloud-native data breach, how it evolved and how it […]. Cyber Security News

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

Network World

The Department of Homeland Security has issued a warning that some VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system. The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) warning comes on the heels of a notice from Carnegie Mellon's CERT that multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files.