Sat.Apr 22, 2017 - Fri.Apr 28, 2017

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices


Bob Gourley.

System 317

DevOps, Invest For Velocity And Quality!

Forrester IT

Delivering exceptional customer experiences and product for your business take speed and flexibility. More than ever before, speed and flexibility are required from every part of your organization, business and IT alike. DevOps provides your business leaders, enterprise architects, developers and I&O leaders a philosophy to achieve, not only the velocity that customers desire but also drive innovation and enforces quality. One example is ING.

Devops 264

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Corporate IT: Time to Start Building Your Leadership Team for 2020


As IT teams grapple with the digitization of their companies and industries, they must also – and as a result – help transform their company’s strategy and outlook on digitization , and the entire IT operating model to boot.

Report 252

The 3 biggest mistakes to avoid in cloud migrations

David Linthicum

I’ve heard many times that if you’re not making mistakes, you’re not making progress. If that’s true, we're seeing a lot of progress made this year in cloud migrations! Here are the three errors that I see enterprises repeatedly committing. [ To the cloud! Real-world container migrations. | Dig into the the red-hot open source framework in InfoWorld’s beginner’s guide to Docker. ]. Mistake 1: Moving the wrong apps for the wrong reasons to the cloud.

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

A Tutorial For Enhancing Your Home DNS Protection


Bob Gourley. Editor's note: We are aiming this tutorial at the non-technical person. Please share with anyone in your life who could benefit from this. -bg. Have you ever seen a picture of an old fashioned telephone operator?

Forrester Methodology To Selection Business Intelligence Implementation Service Providers

Forrester IT

Business Intelligence (BI) pros continue to look for outside professional services. Forty-nine percent of decision makers say their firms are already engaging and/or expanding their engagements with outside data and analytic service providers, and another 22% plan to do so in the next 12 months. There are two main reasons for this sustained trend: Read more. Application Development

More Trending

Think again: Data integration is different in the cloud

David Linthicum

It’s been nearly 20 years since I wrote the book “ Enterprise Application Integration ,” yet after all that time data integration remains an afterthought when it comes to cloud deployments. I guess that’s par for the course, since security, governance, monitoring, and other core services are often afterthoughts as well. When moving to the cloud, enterprises focus on the move itself, rather than on what they need after they get there. Although this may be a common plan, it’s not a best practice.

Course 221

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices


Bob Gourley.

System 209

For Better Security Operations, Speak to the Pack in its Native Tongue

Forrester IT

I have a huge German Shepherd that ranks only slightly behind my human children when it comes to being spoiled and how much attention he gets. I've been working on training him for nearly a year now, and he amazes me with how intelligent he is. He knows all the basics: sit, stay, here, lay down, etc. But he also picked up detecting scents very quickly and is learning to detect things with his nose that I can't even see with my eyes.

One in eight people have suffered a healthcare data breach

Computer Weekly

A quarter of victims had their NI number compromised and 18% saw their biometric identifiers compromised, but most people trust healthcare providers with their data

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Information Security: The 8 Types of Risk Assessment You Should Know About


“Risk assessment” has become a popular term in business, government, education, and many more places besides. It also has almost as many definitions as well.

Windows Server 2016 – Azure-Inspired Software Defined Networking (SDN) in YOUR Datacenter!

IT Pros Rock!

The Azure-inspired Software Defined Networking (SDN) stack that is built into Windows Server 2016 reduces the complexity and cost of network infrastructure. Not only that, you can now define your network infrastructure so that it is portable to your application requirements.

Security Challenges Drive Growth For IAM Solutions

Forrester IT

The world is changing fast, and bring-your-own-device (BYOD) and telecommuting are increasingly becoming the norm, not the exception. This increasingly mobile and flexible workforce creates new security challenges as more and different types of devices are being used in multiple locations. Security and risk professionals must ensure that only the right people get access to the right information at the right time and for the right reasons.

Court grants Lauri Love appeal against extradition

Computer Weekly

Alleged hacker’s appeal court hearing will be the first major test of the UK’s forum bar, designed to protect vulnerable people from extradition


Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Where CIOs Get the Most Job Satisfaction


Rick Delgado. Today’s CIOs face a large number of responsibilities and pressures that only seem to be growing with each passing day. Businesses are turning more and more to technology to solve problems, making the CIO’s job all the more important. With all that added pressure to deliver results day in and day out, you might be tempted to think CIOs find their jobs frustrating, but the opposite turns out to be true.

Survey 172

Fileless Malware: You should already be prepared

IT Toolbox

The buzzword "fileless malware" is increasingly causing fear, uncertainty, and doubt. But we should already have controls in place

Forrester Methodology To Select Business Intelligence Implementation Service Providers

Forrester IT

Business Intelligence (BI) pros continue to look for outside professional services. Forty-nine percent of decision makers say their firms are already engaging and/or expanding their engagements with outside data and analytic service providers, and another 22% plan to do so in the next 12 months. There are two main reasons for this sustained trend: Read more Categories: Analytics. Professional Services. Services. business intelligence. implementation.

Education key to reducing systems attacks, says university security manager

Computer Weekly

Central Lancashire University’s IT networks and security manager says educating users is key to avoiding cyber security flaws

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Apple’s Leased Data Center Energy Use Quadrupled Since 2012

Data Center Knowledge

Colocation energy use now accounts for nearly one-quarter of Apple’s total data center energy consumption Read More. Apple Cloud Computing Colocation Featured

Apple 228

What Is IP Tracking and What You Need to Know About It

IT Toolbox

What tool can help you grab all the information you need about your online visitors and turn it to your advantage

Tools 156

9 essential tools for the security-conscious mobile worker

Network World

Have security gadgets, will travel Image by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all.

Tools 115

Nordea strikes partnership with Swedish mobile payment startup

Computer Weekly

Nordic bank links up with payments startup in its latest fintech project

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

IBM Launches Four Cloud Data Centers in US

Data Center Knowledge

Expanding cloud network strategically important in competition with rivals like AWS and Azure Read More. Cloud Computing Featured IBM

IBM 196

Enterprise Architecture and Agile do muddy the waters of Digital Transformation

IT Toolbox

In " Architecture is Dying – Why EA and Agile isn’t enough to stop Shadow IT ", Barry O'Reilly writes for IASA, " an association for all IT architects ", that "architecture is dying". Barry expects though a backlash

Developers Flocking To Amazon Alexa – The Growing Need For A Digital Assistant


Technology and the internet just never fail to surprise everyone with the latest innovations every day. The Amazon Echo is one of the latest gadgets the people are buying today. This good looking speaker can connect to a lot of music players by just asking it using your voices.

Cyber espionage up, but basic defences still down, DBIR shows

Computer Weekly

Organisations are still failing to address basic security issues and well-known attack methods, Verizon’s latest Data Breach Investigations Report reveals for a second year in a row

Report 168

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Cloud Giants Disagree on the Future of Corporate Data Centers

Data Center Knowledge

Google, Microsoft paint contrasting pictures of enterprise data centers’ relationship with cloud Read More. Cloud Computing Google Microsoft

The Effects that Augmented Reality Will Have on Healthcare

IT Toolbox

Augmented reality is the future, and it will impact many areas of health care

U.S. military wants white-hat hackers to target its cyber security systems

Network World

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month. Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as targets for a set of international hackers who have been vetted by HackerOne , which is running the program.

Barclays to create 1,750 UK IT jobs over three years

Computer Weekly

Barclays bank is creating nearly 2,000 IT jobs at a delivery centre in north west England

Serverless and Containers: How to Choose the Right Application Strategy

Speaker: Tolga Tarhan, Senior Vice President, GM AWS Services at Onica

When it comes to the modern tech stack, one of the fastest changing areas is around containers, serverless, and choosing the ideal path to cloud native computing. How do you as a technology leader point your team in the right direction, especially given how quickly this is evolving?