Sat.Mar 23, 2019 - Fri.Mar 29, 2019

Pros and cons of low-code development platforms

mrc's Cup of Joe Blog

Summary: A growing trend, low-code development claims to address many of the common challenges facing businesses today. But, how accurate are these claims? In this article, we take a realistic look at low-code platforms–exploring the pros and cons.

Don’t Drink From A Poisoned Well, Mitigate Supply Chain Risk With Zero Trust

Forrester IT

Motherboard and Kaspersky unveiled that hackers compromised a server of computer manufacturer, ASUS’ live software update tool to install a malicious backdoor on thousands of computers.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Riding Three Curves to Reach the Potential Wave of Digital Transformation

Future of CIO

We are living in a dynamic business environment in which inventions, developments, and conflicts are continuously changing and that makes it impossible to have complete knowledge and understanding of many issues facing the company and market today.

CIO Power Politics: Master the Art of the Stall [Video]

CEB IT

Every CIO has been in a situation in which an executive or coworker has asked a difficult question about a project. The instinct is to answer immediately, but Tina Nunno , vice president and Gartner fellow, advises CIOs to resist the urge and stall for a better outcome.

Video 289

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

What you should know about serverless computing before you start

David Linthicum

Are you considering serverless computing ? So is everyone else in IT. A recent survey released by New Stack reveals that half of IT executives in the survey say they are already running with a serverless architecture, and 28 percent intend to do so within the next 18 months. The survey of 608 companies found that benefits among serverless users include scalability and a greater speed of development.

Survey 287

Use Direct Mail To Get The Attention Of Your Digital-First B2B Buyers

Forrester IT

When was the last time you answered a phone call from a phone number you didn’t recognize or opened an email from an unfamiliar sender? Like, never? Same here. The sad truth about most modern marketing tactics is that they’re too cheap and too easy.

B2B 424

More Trending

How to Get Started With AIOps

CEB IT

Last year, Australia’s two largest supermarket chains suffered nationwide technical issues, forcing the companies to close stores until the issues were fixed. The result: Lost revenue and frustrated customers. The reality is that IT teams are dealing with increasing amounts of data and a variety of tools to monitor that data, which can mean significant delays in identifying and solving issues. The long-term impact of AIOps on IT operations will be transformative. “IT

How To 228

How to eliminate the security risk of redundant data

David Linthicum

When you move, you have a few choices of what to do with all the stuff you’ve accumulated. You could sell or donate most of the stuff you’ve accumulated over the years. Or, you could just move it, because you don’t have the time or the energy to figure out what you keep and how to dispose of what you don’t want. Most enterprises migrate their data to the public cloud in that second way: they just cart it all from the data center to the cloud.

How To 243

The Tao of Zero Trust

Forrester IT

I get asked 2 questions at least weekly, in some cases almost daily: Where do we start for Zero Trust – Fix your IAM and user side of the equation. What is the difference between other frameworks and Zero Trust – Ok, now we can get down to the nuts and bolts on this one.

How Do You Know When A Cybersecurity Data Breach Is Over?

CTOvision

Read Stephen Moore’s tips for businesses to find out when a cybersecurity data breach is over on Forbes : People often ask, “When does the pain of a security breach finally end?” The answer is often a surprise. It isn’t over when you’ve removed a hacker or insider threat from your network environment, just as […]. Cyber Security News

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Create an Enterprise Architecture to Engage With “Things”

CEB IT

Whether it’s a refrigerator ordering a replacement water filter or a car scheduling a service appointment, the number and capability of in ternet-connected “ things ” continues to increase. In fact, the 10 billion internet-connected things in use in 2018 will increase by 32.7% in 2019. As this happens, these things will develop the capacity to buy, sell, and negotiate for products and services, with organizations having to adapt to this new reality.

Is Hybrid Cloud the New Standard for Future Infrastructure?

Information Week

Plenty of young organizations may be cloud native with public services, but many incumbents cannot go that route

Cloud 160

Facebook’s Most Recent Ethical tHUD

Forrester IT

Today, the U.S. Department of Housing and Urban Development announced it is suing Facebook for violating the Fair Housing Act.

Millions of Android users beware: Alibaba’s UC Browser can be used to deliver malware

CTOvision

UC Browser, a hugely popular mobile browser from Alibaba-owned UCWeb, has a design flaw that allows attackers to swap out downloads from the company’s servers with files from any server on the internet, according to researchers at Russian security firm Dr. Web. The company has raised an alarm over the mobile browser because it can download […]. Cyber Security News

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

4 Types of Project Management Offices That Deliver Value

CEB IT

During conversations with clients, Gartner analysts discovered organizations designed project management offices (PMOs) in a variety of setups. But does an ideal set up exist? Often, large organizations have multiple PMOs, all of which can be very different,” says Mbula Schoen , Senior Principal Analyst, Gartner. This makes it hard for program and portfolio management (PPM) leaders to determine the type of PMO best suited to their organization.”.

Automation: How Can We Reskill the Workforce?

Information Week

The growing interest in automation in the enterprise highlights the need to place humans in jobs that are best suited for humans rather than machines, and a need for continuous training

Content, Experiences Key Focuses At Adobe Summit

Forrester IT

At Adobe’s marketing conference, the company focused on content and experiences as the key differentiators for brands. Watch my video summary of the event that explores these key themes. Questions or comments? Find me on Twitter. Forrester clients: setup an inquiry.

Adobe 358

3 security threats businesses need to prepare for by 2021

CTOvision

Read Alison DeNisco Rayome list three top cybersecurity threats that businesses should prepare for on the Tech Republic : To stay secure in the modern connected world, businesses must keep track of all emerging cybersecurity threats and assess the potential business impacts of when not if, they will experience a breach or incident, according to […]. Cyber Security News

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Customer Acquisition Tops 2019 Priorities for Technology CEOs

CEB IT

Sales effectiveness and marketing duties are critical and urgent focus areas, based on a recent survey of more than 100 technology company CEOs.

Survey 202

How to hack your own Wi-Fi network

Network World

One way to bolster your understanding of Wi-Fi security is to do some hacking yourself. That doesn’t mean you should infiltrate a company’s network or snoop on a neighbor’s setup. Rather, ethical hacking and legitimate Wi-Fi penetration testing – done in cooperation with the network owner – can help you learn more about the strengths and limitations of wireless security.

Does Your Employee Experience Create Happy Warriors?

Forrester IT

Last month, my colleague Dave Johnson and I published a report that shared a better way for companies to measure the quality of their employee experience.

Study 350

61% of CIOs believe employees leak data maliciously

CTOvision

There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as frequent and damaging occurrences, of concern to 95% of IT leaders, yet the vectors for those breaches – employees – are either unaware of, or unwilling […]. Cyber Security News

Data 221

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Tackle Tomorrow’s Digital Business Security Risks

CEB IT

Security and risk management leaders responsible for information security must evolve their practices and organizational cultures to keep pace with the digital business era. Risk management, governance, business continuity and people — the most important asset — are critical elements of a successful risk and security program,” says Earl Perkins , Vice President, Analyst at Gartner says.

Russia demands access to VPN providers’ servers

Network World

The Russian censorship agency Roskomnadzor has ordered 10 VPN service providers to link their servers in Russia to its network in order to stop users from reaching banned sites. If they fail to comply, their services will be blocked, according to a machine translation of the order. RELATED: Best VPN routers for small business. The 10 VPN providers are ExpressVPN, HideMyAss!, Hola VPN, IPVanish, Kaspersky Secure Connection NordVPN, OpenVPN, VPN Unlimited and VyprVPN.

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

Artificial Intelligence Beyond Deep Neural Networks

CTOvision

Read Naga Rayapati list four reasons that AI community should think beyond deep learning on Forbes : Artificial intelligence (AI) is dominated by pattern recognition techniques. Recently, major advances have been made in the fields of image recognition, machine translation, audio processing and several others thanks to the development and refinement of deep learning. But […]. Artificial Intelligence News

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Deploy Microservices to a Kubernetes cluster with Helm plugin

Flexagon

In one of my previous posts I described how FlexDeploy can automate building and deploying microservices with Docker containers. One of the most popular deployment platforms in containers world is Kubernetes.

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

Network World

Cisco has dropped 17 Security advisories describing 19 vulnerabilities in the software that runs most of its routers and switches, IOS and IOS/XE. The company also announced that two previously issued patches for its RV320 and RV325 Dual Gigabit WAN VPN Routers were “incomplete” and would need to be redone and reissued. Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ].

WAN 120

Barneys And Starbucks Raise The Bar With Loyalty Program Updates

Forrester IT

Grab a latte and start spring shopping – you’ll be rewarded. Barneys introduced a new loyalty program this month, and Starbucks announced upgrades to its existing program. We’re not surprised.

Machine learning is not real learning argues a new paper

CTOvision

Machine learning is not real learning — machine learning would appear to be a misleading phrase, maybe as a result we need to re-think our understanding of AI; at least these are the implications of a recently published paper. Artificial intelligence is a misleading phrase, or so many argue. It is misleading because there is […]. Artificial Intelligence News

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.