Sat.Jul 18, 2020 - Fri.Jul 24, 2020

How COVID is Changing Technology Futures

Information Week

Accenture released its Technology Vision 2020 report in February, but then COVID hit. Here's how the pandemic is changing technology futures according to the company

Report 171

How to Prevent AI Dangers With Ethical AI


After widespread protests against racism in the U.S., tech giants Microsoft, Amazon and IBM publicly announced they would no longer allow police departments access to their facial recognition technology. The concern?

How To 303

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What Is the Real Cost of a Data Breach?


Read Dan May take a look at the intangible costs of a data breach on CPO Magazine : When contemplating a cybersecurity framework for a business, it’s vital that company-owners […].

Data 288

5 Priorities for IT Leaders During this Summer of COVID

Social, Agile and Transformation

It's been a very challenging year for everyone and indeed, this has been the case for first responders. Somewhere a couple of rungs further down the ladder, most organizations owe plenty of thanks to CIOs, IT leaders, and especially the IT service desk.

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

4 Ways to Excel as a Female Data Scientist

Information Week

Glassdoor has ranked data science as one of the top 10 best jobs in the US every year since 2015. Here's how you can stand out in this field

Data 170

What Functional Leaders Should Know About Scenario Planning


The COVID-19 pandemic has triggered a wide range of strategic planning activities. As the focus turns largely to recovery and renewal , functional leaders are increasingly pulled into enterprise conversations about likely outcomes when the way forward is neither clear nor certain.

More Trending

IT Certifications + Persistence Lead to a Cybersecurity Career

Association of Information Technology Professional

Meet Damarn Carroll, an ambitious cybersecurity professional who has successfully made his own career path with hard work and IT certifications

DevOps Isn't a Dirty Word

Information Week

Here's how visionaries can most effectively make the case for DevOps transformation

Devops 154

How General Managers Lead Through Disruption


Prior to COVID-19, the top priority of 51% of general managers (GMs) for 2020 was to grow revenue from existing products and services, and 35% agreed their second priority was to grow revenue from new products and services. But leading high-tech GMs now must pivot.

Survey 299

Who Is Spying On Me? A taxonomy of spies in the modern technology landscape


Watching the cyber threat evolve over the last few decades has made it clear: we are all targets. As individuals we need to do what we can to minimize the […]. Cyber War Spies


The History of the Word "Hacker"

According to one of the best English etymological dictionaries available, the word "hacker", with the sense of evil/good and brilliant computer programmer, was born in the halls of MIT. This fact alone reminds us that culture and words begin in actual places. At that time, to hack code, or hack out code, had a negative connotation. Where did this come from? Read this eBook to learn how the word "hacker" has evolved.

4 Things to Know About Emerging Technology

Association of Information Technology Professional

As emerging technology continues to be a hot topic, the benefits and potential of all these new things are best realized in the context of a modern IT approach


Reassessing Security Vulnerabilities and Gaps After COVID

Doctor Chaos

Written by: Kayla Matthews journalist & writer link]. The ongoing COVID-19 pandemic has highlighted a few areas of improvement in the business world. As the world's systems try to adapt to changing needs, their shortcomings become increasingly evident.

Navigate Turbulence with the Resilience of Responsible AI

Information Week

Extraordinary economic conditions require brand-new analytic models, right? Not if existing predictive models are built with responsible AI. Here's how to tell

How To 142

Launch to the Future: Quantum Internet


Watch as the U.S. Department of Energy joins science leaders from University of Chicago to announce a new national initiative to accelerate research in quantum science and technology. From the […]. CTO Cyber Security Quantum Computing Quantum Security

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

DevOps: Making Cybersecurity a Part of the Team

Association of Information Technology Professional

DevOps is posing new challenges for cybersecurity. Where does it fit in the process, and what do cybersecurity pros need to know to get the job done

Devops 206

Swans Reflecting Elephants

Doctor Chaos

Original article appears at [link]. The famous painting “ Swans Reflecting Elephants ” creates a double image and is an ideal metaphor of what we know about the Internet and the hidden layer beneath (the Darknet).

How to Plan Today for Tomorrow's Lights-Out Data Center

Information Week

A data center managed entirely by automated systems sounds like the setting for a science fiction movie. Yet human-less data centers are making their mark

Counting on AI: The right time for researchers to embrace Artificial Intelligence


While Artificial General Intelligence, or “singularity” as they call it, may be decades away, we have already reached a point where AI can significantly augment our intelligence and help us […].

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Six Free CompTIA Resources to Better Market Your MSP Business

Association of Information Technology Professional

CompTIA has compiled a number of free resources to help MSPs and other channel companies market themselves in new, innovative ways. Finding a different way to communicate your message and your services has never been more important

Into the Rabbit Hole – Offensive DNS Tunneling Rootkits

Doctor Chaos

originally posted at [link]. We see numerous evasion techniques that attackers use to bypass egress filtering solutions and establish command and control (C&C) within organizations.

What the IBM-Adobe Collaboration Means for Transformation

Information Week

Adobe Experience Manager running on Red Hat OpenShift and other IBM resources intended to help regulated enterprises meet security demands

Adobe 135

Managing Digital Risk in a New Age of Internet of Things


Read Arthur Fontaine explain how companies should manage digital risks associated with the Internet of Things on RSA Blog : Digital transformation is valuable and essential, but it creates digital […].

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

ChannelCon Preview: Creating a Lifetime of Partner and Customer Value

Association of Information Technology Professional

AchieveUnite's Bob O’Malley and Jessica Baker discuss why partner experience in the channel is essential and how creating a lifetime of partner and customer value is key to success


Malware is down, but IoT and ransomware attacks are up

Tech Republic Security

Malicious attacks disguised as Microsoft Office files increased 176%, according to SonicWall's midyear threat report

Tales of the Work From Home World

Information Week

Whether COVID-19 causes your organization to return to work-from-home or not, here are some remote work tips for managers and employees


Minimize Cloud Wastage in Today’s Hybrid World


Read Debjani Chaudhury explain how companies can minimize cloud wastage on Enterprise Talk : The cloud remains the most strategic resource for all businesses, offering greater organizational adaptability, agility, improved […].

Agile 275

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Top 5 programming languages for network admins to learn

Tech Republic Data Center

Network admins can find themselves spread a bit thin during these times of remote work while trying to provide support for all users. Leveraging programming to automate common tasks may help

SCCM Application Deployment Custom Report SQL Query | ConfigMgr


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s find out SCCM Application Deployment Custom Report SQL Query with Collection.

Companies with poor privacy practices are 80% more apt to suffer data breach

Tech Republic Security

Poor privacy=data breach as reported by Osano was proven July 15 when Twitter was hacked and 130 accounts--including Joe Biden's and Kanye West's--were exposed

Report 169

Cybersecurity Lessons from the Pandemic


Read Monica Verma explain how the coronavirus pandemic shows us how cybersecurity supports business and society on Dark Reading: There is absolutely no absolute security. Nature is designed in a […].

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!