Sat.Mar 23, 2019 - Fri.Mar 29, 2019

Pros and cons of low-code development platforms

mrc's Cup of Joe Blog

Summary: A growing trend, low-code development claims to address many of the common challenges facing businesses today. But, how accurate are these claims? In this article, we take a realistic look at low-code platforms–exploring the pros and cons.

Don’t Drink From A Poisoned Well, Mitigate Supply Chain Risk With Zero Trust

Forrester IT

Motherboard and Kaspersky unveiled that hackers compromised a server of computer manufacturer, ASUS’ live software update tool to install a malicious backdoor on thousands of computers.

Riding Three Curves to Reach the Potential Wave of Digital Transformation

Future of CIO

We are living in a dynamic business environment in which inventions, developments, and conflicts are continuously changing and that makes it impossible to have complete knowledge and understanding of many issues facing the company and market today.

AI’s Impact on Food Service Industry

CTOvision

Artificial Intelligence (AI) is impacting a wide range of industries, and the food service and restaurant industry is certainly a good example. AI technologies are enhancing and changing the entire restaurant experience, from the ways in which we order food, to the way in which food is prepared and served, and how customers interact with […].

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

What you should know about serverless computing before you start

David Linthicum

Are you considering serverless computing ? So is everyone else in IT. A recent survey released by New Stack reveals that half of IT executives in the survey say they are already running with a serverless architecture, and 28 percent intend to do so within the next 18 months. The survey of 608 companies found that benefits among serverless users include scalability and a greater speed of development.

Survey 180

More Trending

CIO Power Politics: Master the Art of the Stall [Video]

CEB IT

Every CIO has been in a situation in which an executive or coworker has asked a difficult question about a project. The instinct is to answer immediately, but Tina Nunno , vice president and Gartner fellow, advises CIOs to resist the urge and stall for a better outcome.

Video 164

The ethics of artificial intelligence: Teaching computers to be good people

CTOvision

When people think about artificial intelligence or AI, they can be quick to jump to the all-too-common sci-fi depiction of a heartlessly rational computer willing to kill people to fulfill its programming. Real AI is light-years away from that. Today, AI is still pretty far from basic things humans can accomplish, like being able to […]. Artificial Intelligence News

CIOs Help Banks Prepare For The End Of The World

The Accidental Successful CIO

CIOs have to be able to anticipate the worst Image Credit: josef.stuefer. CIOs at banks have a great deal to worry about. Simply because their companies have so much valuable data and money, the bad guys are always trying to break in and steal things.

Facebook’s Most Recent Ethical tHUD

Forrester IT

Today, the U.S. Department of Housing and Urban Development announced it is suing Facebook for violating the Fair Housing Act.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

How to eliminate the security risk of redundant data

David Linthicum

When you move, you have a few choices of what to do with all the stuff you’ve accumulated. You could sell or donate most of the stuff you’ve accumulated over the years. Or, you could just move it, because you don’t have the time or the energy to figure out what you keep and how to dispose of what you don’t want. Most enterprises migrate their data to the public cloud in that second way: they just cart it all from the data center to the cloud.

How To 149

How Do You Know When A Cybersecurity Data Breach Is Over?

CTOvision

Read Stephen Moore’s tips for businesses to find out when a cybersecurity data breach is over on Forbes : People often ask, “When does the pain of a security breach finally end?” The answer is often a surprise. It isn’t over when you’ve removed a hacker or insider threat from your network environment, just as […]. Cyber Security News

How to Get Started With AIOps

CEB IT

Last year, Australia’s two largest supermarket chains suffered nationwide technical issues, forcing the companies to close stores until the issues were fixed. The result: Lost revenue and frustrated customers. The reality is that IT teams are dealing with increasing amounts of data and a variety of tools to monitor that data, which can mean significant delays in identifying and solving issues. The long-term impact of AIOps on IT operations will be transformative. “IT

How To 136

Content, Experiences Key Focuses At Adobe Summit

Forrester IT

At Adobe’s marketing conference, the company focused on content and experiences as the key differentiators for brands. Watch my video summary of the event that explores these key themes. Questions or comments? Find me on Twitter. Forrester clients: setup an inquiry.

Adobe 162

The Six Principles of Persuasion

Speaker: Michael Carducci, Tech Leader, VUE Expert, and Full Stack Developer

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

5 Ways to Kickoff Data Governance in Self-Service BI Programs

Social, Agile and Transformation

Sponsoring self-service BI where business users are empowered to develop their own dashboards and instrumenting data governance are not conflicting objectives. In fact, they are complementary and both are necessary to enable data driven organizations. Don't believe me? Go count the number of Excel spreadsheets or GSheets are on your network. Try to count how many duplicate data sources are. agile data big data citizen development data management data scientist it management organizational chang

Millions of Android users beware: Alibaba’s UC Browser can be used to deliver malware

CTOvision

UC Browser, a hugely popular mobile browser from Alibaba-owned UCWeb, has a design flaw that allows attackers to swap out downloads from the company’s servers with files from any server on the internet, according to researchers at Russian security firm Dr. Web. The company has raised an alarm over the mobile browser because it can download […]. Cyber Security News

Customer Acquisition Tops 2019 Priorities for Technology CEOs

CEB IT

Sales effectiveness and marketing duties are critical and urgent focus areas, based on a recent survey of more than 100 technology company CEOs.

Survey 132

The Tao of Zero Trust

Forrester IT

I get asked 2 questions at least weekly, in some cases almost daily: Where do we start for Zero Trust – Fix your IAM and user side of the equation. What is the difference between other frameworks and Zero Trust – Ok, now we can get down to the nuts and bolts on this one.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Why There Are IT Outages – And What to Do About Them?

Datacponomy

What do fat fingers, power failures, and Godzilla have in common? Answer: They have all been responsible for IT outages that, even if they aren’t caused by Godzilla, can cause monster-sized budget holes for companies. How monster-sized?

3 security threats businesses need to prepare for by 2021

CTOvision

Read Alison DeNisco Rayome list three top cybersecurity threats that businesses should prepare for on the Tech Republic : To stay secure in the modern connected world, businesses must keep track of all emerging cybersecurity threats and assess the potential business impacts of when not if, they will experience a breach or incident, according to […]. Cyber Security News

Create an Enterprise Architecture to Engage With “Things”

CEB IT

Whether it’s a refrigerator ordering a replacement water filter or a car scheduling a service appointment, the number and capability of in ternet-connected “ things ” continues to increase. In fact, the 10 billion internet-connected things in use in 2018 will increase by 32.7% in 2019. As this happens, these things will develop the capacity to buy, sell, and negotiate for products and services, with organizations having to adapt to this new reality.

Does Your Employee Experience Create Happy Warriors?

Forrester IT

Last month, my colleague Dave Johnson and I published a report that shared a better way for companies to measure the quality of their employee experience.

Study 152

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

Network World

Cisco has dropped 17 Security advisories describing 19 vulnerabilities in the software that runs most of its routers and switches, IOS and IOS/XE. The company also announced that two previously issued patches for its RV320 and RV325 Dual Gigabit WAN VPN Routers were “incomplete” and would need to be redone and reissued. Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ].

WAN 79

61% of CIOs believe employees leak data maliciously

CTOvision

There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as frequent and damaging occurrences, of concern to 95% of IT leaders, yet the vectors for those breaches – employees – are either unaware of, or unwilling […]. Cyber Security News

Data 146

4 Types of Project Management Offices That Deliver Value

CEB IT

During conversations with clients, Gartner analysts discovered organizations designed project management offices (PMOs) in a variety of setups. But does an ideal set up exist? Often, large organizations have multiple PMOs, all of which can be very different,” says Mbula Schoen , Senior Principal Analyst, Gartner. This makes it hard for program and portfolio management (PPM) leaders to determine the type of PMO best suited to their organization.”.

Apple’s Partnership With Goldman Sachs Will Drive Seismic Shifts In The Banking Industry

Forrester IT

Apple and Goldman Sachs are partnering to deliver a new credit card. The industry seems to be quick to dismiss the partnership, especially the rewards program – but we think they’re missing the bigger picture. There’s an awful lot more at stake here than credit card rewards. The bigger concern for digital banks, traditional banks, […].

How to hack your own Wi-Fi network

Network World

One way to bolster your understanding of Wi-Fi security is to do some hacking yourself. That doesn’t mean you should infiltrate a company’s network or snoop on a neighbor’s setup. Rather, ethical hacking and legitimate Wi-Fi penetration testing – done in cooperation with the network owner – can help you learn more about the strengths and limitations of wireless security.

Artificial Intelligence Beyond Deep Neural Networks

CTOvision

Read Naga Rayapati list four reasons that AI community should think beyond deep learning on Forbes : Artificial intelligence (AI) is dominated by pattern recognition techniques. Recently, major advances have been made in the fields of image recognition, machine translation, audio processing and several others thanks to the development and refinement of deep learning. But […]. Artificial Intelligence News