Sat.Nov 25, 2017 - Fri.Dec 01, 2017

When it comes to the cloud, don’t start with technology

David Linthicum

It’s easy to get caught up in the technology of cloud computing. We’ll certainly see that occur at the annual AWS Re:Invent show this week, where hundreds of providers will show off new and shiny technology. But don’t get stuck in the weeds. What is cloud computing? Everything you need to know now. Also: InfoWorld’s David Linthicum explains how to move into a cloud career from traditional IT. ].

Businesses bracing for GDPR data deletion requests

Computer Weekly

Businesses are concerned that data deletion requests under the GDPR will have a significant or even crippling effect, with many unprepared to meet the expected demand

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

One Bitcoin Transaction Consumes One Week Worth of Electricity for Your Home

IT Toolbox

As the Bitcoin hype is increasingly rising so does its exorbitant energy consumption

Energy 174

Overview Windows 10 Co-Management with Intune and SCCM


Co-Management is another buzz word in device management world. What is this co-management? Windows 10 co-management is a dual management capability available with Windows 10 1709 version (Fall Creators Update) and later.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

AWS and Azure dominate the cloud. Neither should win

David Linthicum

As we close out another AWS Re:Invent conference, it’s become apparent that we have the AWS ecosystem and the Azure ecosystem. Although there are a few others in the marketplace, Google and IBM to name two, most investment and interest have been focused at the Amazon Web Services and Microsoft Azure public clouds thus far. Even the big enterprise technology providers have realized that they must focus on providing technologies that are complementary to AWS and/or Azure.

IBM 178

Councils continue to spend on Oracle despite budget constraints

Computer Weekly

Local authorities face a challenges balancing their meagre budgets with services they can afford to provide, but spending on Oracle seems to be increasing

Budget 178

More Trending

How big data technology is transforming fraud investigations


The inside story of the Paradise Papers leak With more than 1,4 terabytes of data, the Paradise Papers is the illustration of the new possibilities for the fraud investigation world. Conducting investigations is a challenge in the age of big data.

Should CIOs Be Working With “Engines”?

The Accidental Successful CIO

Perhaps you need an engine to power your IT shop Image Credit: Jorge Quinteros. As the person with the CIO job, you have a lot of challenges facing you. One of the biggest is how you are going to use your limited IT resources to meet the needs of the entire company.

TfL forges ahead with 4G for the Tube after successful test

Computer Weekly

Having built a pilot 4G network for ESN on the Waterloo & City Line during the summer, TfL is pressing ahead with plans to roll out mobile broadband for all London Underground users

Mobile 175

5 VoIP Trends That Are Pushing Enterprises to Evolve

IT Toolbox

These days, an increasing number of enterprises are choosing Voice over Internet Protocol technology because of the value it adds to their organizations. But this solution-based software isn't new. In fact, although it has been in the telecommunications field for two decades, it is only now starting to get the recognition and growth it truly deserves as key decision-makers realize its potential.

VOIP 141

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Short URLs for Lazy Microsoft Intune Admins


Are you a Lazy Microsoft Intune Admin? You don’t want to type and click on Intune blade? Here are some shortcuts for lazy admins like me

New Technology Has Changed The Face of Education


With the advancement of technology over the past few years, we have seen a major change in the education sector. The way children are taught and the way the children are interacting with the teachers has changed a lot with the advancement of technology. CTO Werner Vogels urges enterprises to get their encryption act together

Computer Weekly

During the closing keynote of AWS Re:Invent 2017, CTO, Werner Vogels, warned enterprises of the perils of overlooking encryption

What to Know About ERP Security

IT Toolbox

Security for your ERP system starts with the system itself and needs to extend down through the operating system to the bare iron. While, it’s not top-of-mind, security is critical – as a couple of cases making the evening news demonstrate. Security is a job, but it doesn’t have to be a major time sink. The biggest part of day-to-day security on an ERP system

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Video Tutorial SCCM 1710 New Features Overview Plus Upgrade Guide


Microsoft SCCM team released the latest production version 1710 of SCCM/ConfigMgr. The version is published as an opt-in option. This release of SCCM CB 1710 production version won’t show automatically in your SCCM console. This release is called Fast Ring production release of SCCM CB 1710.

Video 96

Microsoft Ignite Guide for First Time Attendees

Mick's IT Blog

I have been coming to the Microsoft Ignite convention since it's inception in 2015. The first conference held in Chicago had a lot of fallacies. It was the first time Microsoft had combined the conferences into one. Since then, Microsoft has steadily improved.

Hotels 130

‘Sound policy’ to prosecute hackers in UK, says former DPP in Love case

Computer Weekly

The former director of public prosecutions (DPP), Ken Macdonald, said in written evidence in Lauri Love’s extradition case that it is normal practice to prosecute hackers accused of attacking US servers in the UK – rather than extradite them to the US

Five Enterprise Security Threats to Watch Today

IT Toolbox

One of the keynotes at this year’s OracleWorld in San Francisco was about the automated security built into Oracle’s new self-driving database. CEO Larry Ellison made a big deal about the dangers of cyberattack in a world where every part of a business is driven by software, and how the threat is getting beyond what humans can effectively manage. Whether that is

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.

Intel 127

FIX CBB Ring Devices are Getting CB Updates Intune Windows 10 Update Rings


Are you an early adaptor of Intune? Intune custom policies configured using CSPs are very helpful in most of the scenarios. But, you can get into trouble with some of the custom CSPs if you don’t update it promptly.

HPE Superdome Flex in-memory supports Big Bang research

Computer Weekly

Stephen Hawkin’s Cosmos research group takes delivery of a Superdome HPC to enable it to test theoretical models of the Big Bang

Class Room Vs. Online Learning

IT Toolbox

If you have never taken an online course, you may want to look at the pros and cons

Course 135

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Automation and Effective Attack Frameworks: The Lifeblood of Today’s Red and Blue Teams


With the constant threat of cyber attacks looming, the old adage “It’s not a matter of if you’re going to be breached, it’s a matter of when” still rings true. It’s no secret that the number of cyber attacks have sharply increased against organizations, each of them more destructive than.


IDG Contributor Network: The case for securing the SD-WAN

Network World

With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity.

WAN 76

GDPR likely to affect internal processes heavily, warns lawyer

Computer Weekly

Businesses should not overlook the fact that the EU’s new data protection laws may require fundamental changes to internal business processes, warns a data protection lawyer

Data 161

Top Five Reasons You Need to Invest in Security Certifications

IT Toolbox

Every company holds data that is critical and valuable to its daily operations. For this reason, it is important then to protect and secure its confidentiality, integrity, and availability. As the frequency of security breaches has intensified, companies must adopt proactive security measures to safeguard mission critical

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

CIOs as “Chief Improvement Officer”: How to Apply Maslow’s Hierarchy to IT management

Future of CIO

Abraham Harold Maslow was an American psychologist, who stated that people are motivated to achieve certain needs and that some needs take precedence over others.

Advancing Agriculture with IoT: 4 Real-World Examples

Perficient - Digital Transformation

With the world’s population on the rise, food production and farming will be more important than ever. According to the UN Food and Agriculture Organization, “the world will need to produce 70% more food in 2050 than it did in 2006.” Meeting this anticipated demand will require farmers and agricultural companies to push the technological boundaries of their current practices.

My brother Lauri Love should have the right to a trial in the UK

Computer Weekly

Lauri Love should face trial over hacking allegations in a British Court, rather than be extradited to the US, where his extraordinary skills will be lost to society, says his younger sister


Identity Management for SAP customers

IT Toolbox

Following SAP's recent purchase of Gigya, Janrain is offering a migration deal and questioning Gigya's independence

SAP 132

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.