Sat.Mar 23, 2019 - Fri.Mar 29, 2019

Pros and cons of low-code development platforms

mrc's Cup of Joe Blog

Summary: A growing trend, low-code development claims to address many of the common challenges facing businesses today. But, how accurate are these claims? In this article, we take a realistic look at low-code platforms–exploring the pros and cons.

Don’t Drink From A Poisoned Well, Mitigate Supply Chain Risk With Zero Trust

Forrester IT

Motherboard and Kaspersky unveiled that hackers compromised a server of computer manufacturer, ASUS’ live software update tool to install a malicious backdoor on thousands of computers.

Riding Three Curves to Reach the Potential Wave of Digital Transformation

Future of CIO

We are living in a dynamic business environment in which inventions, developments, and conflicts are continuously changing and that makes it impossible to have complete knowledge and understanding of many issues facing the company and market today.

What you should know about serverless computing before you start

David Linthicum

Are you considering serverless computing ? So is everyone else in IT. A recent survey released by New Stack reveals that half of IT executives in the survey say they are already running with a serverless architecture, and 28 percent intend to do so within the next 18 months. The survey of 608 companies found that benefits among serverless users include scalability and a greater speed of development.

Survey 197

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

AI’s Impact on Food Service Industry

CTOvision

Artificial Intelligence (AI) is impacting a wide range of industries, and the food service and restaurant industry is certainly a good example. AI technologies are enhancing and changing the entire restaurant experience, from the ways in which we order food, to the way in which food is prepared and served, and how customers interact with […].

More Trending

CIO Power Politics: Master the Art of the Stall [Video]

CEB IT

Every CIO has been in a situation in which an executive or coworker has asked a difficult question about a project. The instinct is to answer immediately, but Tina Nunno , vice president and Gartner fellow, advises CIOs to resist the urge and stall for a better outcome.

Video 185

How to eliminate the security risk of redundant data

David Linthicum

When you move, you have a few choices of what to do with all the stuff you’ve accumulated. You could sell or donate most of the stuff you’ve accumulated over the years. Or, you could just move it, because you don’t have the time or the energy to figure out what you keep and how to dispose of what you don’t want. Most enterprises migrate their data to the public cloud in that second way: they just cart it all from the data center to the cloud.

How To 158

The ethics of artificial intelligence: Teaching computers to be good people

CTOvision

When people think about artificial intelligence or AI, they can be quick to jump to the all-too-common sci-fi depiction of a heartlessly rational computer willing to kill people to fulfill its programming. Real AI is light-years away from that. Today, AI is still pretty far from basic things humans can accomplish, like being able to […]. Artificial Intelligence News

Facebook’s Most Recent Ethical tHUD

Forrester IT

Today, the U.S. Department of Housing and Urban Development announced it is suing Facebook for violating the Fair Housing Act.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

CIOs Help Banks Prepare For The End Of The World

The Accidental Successful CIO

CIOs have to be able to anticipate the worst Image Credit: josef.stuefer. CIOs at banks have a great deal to worry about. Simply because their companies have so much valuable data and money, the bad guys are always trying to break in and steal things.

Create an Enterprise Architecture to Engage With “Things”

CEB IT

Whether it’s a refrigerator ordering a replacement water filter or a car scheduling a service appointment, the number and capability of in ternet-connected “ things ” continues to increase. In fact, the 10 billion internet-connected things in use in 2018 will increase by 32.7% in 2019. As this happens, these things will develop the capacity to buy, sell, and negotiate for products and services, with organizations having to adapt to this new reality.

How Do You Know When A Cybersecurity Data Breach Is Over?

CTOvision

Read Stephen Moore’s tips for businesses to find out when a cybersecurity data breach is over on Forbes : People often ask, “When does the pain of a security breach finally end?” The answer is often a surprise. It isn’t over when you’ve removed a hacker or insider threat from your network environment, just as […]. Cyber Security News

Content, Experiences Key Focuses At Adobe Summit

Forrester IT

At Adobe’s marketing conference, the company focused on content and experiences as the key differentiators for brands. Watch my video summary of the event that explores these key themes. Questions or comments? Find me on Twitter. Forrester clients: setup an inquiry.

Adobe 186

5 Ways to Kickoff Data Governance in Self-Service BI Programs

Social, Agile and Transformation

Sponsoring self-service BI where business users are empowered to develop their own dashboards and instrumenting data governance are not conflicting objectives. In fact, they are complementary and both are necessary to enable data driven organizations. Don't believe me? Go count the number of Excel spreadsheets or GSheets are on your network. Try to count how many duplicate data sources are. agile data big data citizen development data management data scientist it management organizational chang

Customer Acquisition Tops 2019 Priorities for Technology CEOs

CEB IT

Sales effectiveness and marketing duties are critical and urgent focus areas, based on a recent survey of more than 100 technology company CEOs.

Survey 135

61% of CIOs believe employees leak data maliciously

CTOvision

There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as frequent and damaging occurrences, of concern to 95% of IT leaders, yet the vectors for those breaches – employees – are either unaware of, or unwilling […]. Cyber Security News

Data 141

The Tao of Zero Trust

Forrester IT

I get asked 2 questions at least weekly, in some cases almost daily: Where do we start for Zero Trust – Fix your IAM and user side of the equation. What is the difference between other frameworks and Zero Trust – Ok, now we can get down to the nuts and bolts on this one.

Why There Are IT Outages – And What to Do About Them?

Datacponomy

What do fat fingers, power failures, and Godzilla have in common? Answer: They have all been responsible for IT outages that, even if they aren’t caused by Godzilla, can cause monster-sized budget holes for companies. How monster-sized?

4 Types of Project Management Offices That Deliver Value

CEB IT

During conversations with clients, Gartner analysts discovered organizations designed project management offices (PMOs) in a variety of setups. But does an ideal set up exist? Often, large organizations have multiple PMOs, all of which can be very different,” says Mbula Schoen , Senior Principal Analyst, Gartner. This makes it hard for program and portfolio management (PPM) leaders to determine the type of PMO best suited to their organization.”.

3 security threats businesses need to prepare for by 2021

CTOvision

Read Alison DeNisco Rayome list three top cybersecurity threats that businesses should prepare for on the Tech Republic : To stay secure in the modern connected world, businesses must keep track of all emerging cybersecurity threats and assess the potential business impacts of when not if, they will experience a breach or incident, according to […]. Cyber Security News

Does Your Employee Experience Create Happy Warriors?

Forrester IT

Last month, my colleague Dave Johnson and I published a report that shared a better way for companies to measure the quality of their employee experience.

Study 178

Is Hybrid Cloud the New Standard for Future Infrastructure?

Information Week

Plenty of young organizations may be cloud native with public services, but many incumbents cannot go that route

Cloud 113

How to Get Started With AIOps

CEB IT

Last year, Australia’s two largest supermarket chains suffered nationwide technical issues, forcing the companies to close stores until the issues were fixed. The result: Lost revenue and frustrated customers. The reality is that IT teams are dealing with increasing amounts of data and a variety of tools to monitor that data, which can mean significant delays in identifying and solving issues. The long-term impact of AIOps on IT operations will be transformative. “IT

How To 124

Millions of Android users beware: Alibaba’s UC Browser can be used to deliver malware

CTOvision

UC Browser, a hugely popular mobile browser from Alibaba-owned UCWeb, has a design flaw that allows attackers to swap out downloads from the company’s servers with files from any server on the internet, according to researchers at Russian security firm Dr. Web. The company has raised an alarm over the mobile browser because it can download […]. Cyber Security News

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

Initiating an SCCM Compliance Check via PowerShell

Mick's IT Blog

Recently, I have been working on Configuration Baselines for security purposes. While doing so, two of my baselines required remediation that takes longer than 1 minute. I do not recall where I read it, but I believe the timeout for a compliance check is 1 minute.

Tackle Tomorrow’s Digital Business Security Risks

CEB IT

Security and risk management leaders responsible for information security must evolve their practices and organizational cultures to keep pace with the digital business era. Risk management, governance, business continuity and people — the most important asset — are critical elements of a successful risk and security program,” says Earl Perkins , Vice President, Analyst at Gartner says.

Artificial Intelligence Beyond Deep Neural Networks

CTOvision

Read Naga Rayapati list four reasons that AI community should think beyond deep learning on Forbes : Artificial intelligence (AI) is dominated by pattern recognition techniques. Recently, major advances have been made in the fields of image recognition, machine translation, audio processing and several others thanks to the development and refinement of deep learning. But […]. Artificial Intelligence News

Apple Services = Yawn; Apple Positioning = Consumer Protector

Forrester IT

Apple yesterday laid out a set of new services, including its new streaming TV service, but the overarching story is much bigger. Tim Cook orchestrated a show of Apple flexing the muscle of its 1.4

Apple 164