Sat.Apr 07, 2018 - Fri.Apr 13, 2018

Time for Transformational Cybersecurity Part II

CTOvision

The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void. It also discussed root-of-trust encrypted metavisor technology that protects applications and data operating in the cloud. […]. CTO Cyber Security News

Automation, AI, And Robotics Are Critical CIO Targets

Forrester IT

We’ve just released a major new report, The CIO’s Guide To Automation, AI, And Robotics.

What Can CIOs Learn From The Evolution Of Smartphones?

The Accidental Successful CIO

Smartphones have matured and CIOs can learn from this Image Credit: Nokia Connect. CIOs exist in order to help their companies do more things and do them faster.

Cloud migrations: Don’t settle for just some operational savings

David Linthicum

I’ve stopped thinking of simple migration to the public clouds as “success.” Yes, businesses do benefit. You decrease operational costs by a certain amount, if you plan correctly, and you certainly increase the convenience of not having to deal with hardware and software. But all that gets you to just 10 to 20 percent in savings. What is cloud computing? Everything you need to know now.

Google 209

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

empow – Delivering on the Unmet Promises of Cybersecurity

The Investing Edge

I am thrilled to announce Ascent’s investment in our newest portfolio company, empow. While I am excited for all of our investments, this one feels special in that it exhibits several of the core themes of Ascent’s strategy: It’s a thesis driven investment based on months of research and outreach. It’s partnering with an exceptional entrepreneur from across the Atlantic to help build a US presence. It’s revitalizing a relationship with an outstanding CEO of a prior Ascent investment.

More Trending

Drupal and the secret of my success

SPF13

As my tenure on the Drupal Association was concluding, I was asked to give the Keynote for DrupalCon. It was my privilage to talk about my 20 year history with open source and how much I learned from and valued the Drupal community.

What Facebook and the CLOUD Act mean for cloud privacy

David Linthicum

Enterprises have enough to worry about with the data breaches that seem to occur each week, but now you're learning that social networking systems are gathering and using all sorts of data about everyone. Not only information about you, your friends, and your family, but your peers and employees. Some of that information was not knowingly provided to them.

Cloud 168

The Role of Big Data and Mobile Apps in Healthcare

Datacponomy

For those with chronic health issues or life-threatening illnesses, the line of specialists and procedures can seem endless. Moreover, each time a new practitioner or clinic is visited, the patient is required to fill in long and complicated forms – especially if a medical insurance is involved.

What Question Must Your Messaging Answer?

Forrester IT

Account-based marketing (ABM), demand generation, social selling, channel marketing, go-to-market strategy, marketing mix, campaign execution and almost anything that today’s B2B marketer worries about hinges on having relevant content that engages your buyers.

B2B 173

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Assessments on AWS Snowball and AWS Snowball Edge Post Confirmed By User Feedback

CTOvision

In March I opined on the remarkable engineering in AWS Snowball and AWS Smowball Edge. There are many trends in tech now and some of them, like the specific capabilities in this cloud computing domain, can seem like they are slow to develop till they are right on you. This is one of those times […]. Big Data and Analytics Cloud Computing CTO News

Wasabi Hot Innovations Tour: How "Hot Cloud Storage" Changes Everything!

Cloud Musings

Digital storage requirements are growing exponentially. Budgets simply can’t keep up and existing Federal Data Center Consolidation Initiative (FDCCI), “Cloud First” Policy, Federal IT Acquisition Reform Act (FITARA) and Modernizing Government Technology (MGT) Act challenges aren’t going away.

Hotels 151

How GDPR Will Affect Data Science

Datacponomy

By now, any data professional worth his or her salt should know about the General Data Protection Regulation (GDPR). This EU law, set to be enforced in May 2018, has sent shockwaves (and a fair bit of fear) across many industries and professions. But, perhaps the one area set to.

Where To Invest Your Adtech And Martech Dollars

Forrester IT

As a B2C marketer, do you know how you should spend your technology budget? Where should you invest and from which technologies should you divest? These questions can keep marketers up at night as they think about ways to provide contextually relevant experiences to their consumers.

Budget 136

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Will There Be Another AI Winter?

CTOvision

Artificial Intelligence (AI) is an area that’s getting a lot of attention lately. Many companies are thinking about how they can incorporate AI products and services into their company, and how AI can help enhance their workforce. There is a lot of hype right now, but is this technology around to stay or is it […]. Artificial Intelligence CTO News

IBM tweaks its z14 mainframe to make it a better physical fit for the data center

Network World

IBM is widening its mainframe range with some narrower models – ZR1 and Rockhopper II – that are skinny enough to fit in a standard 19-inch rack, which will answer criticisms of potential customers that the hulking z14 introduced in July 2017 too big to fit in their data centers (see photo above). In addition to new, smaller, packaging for its z14 hardware, IBM is also introducing Secure Service Container technology.

IBM 81

Getting to Base Camp: A Conversation with Pete Williams on the Mistakes Made in AI Implementation

Datacponomy

Machine learning and AI are the latest technologies transforming business — carrying on from digitization and big data. It is difficult, however, to pull apart the hype from implementation and distinguish the realities from the marketing jargon.

SAP’s Customers’ CIOs Face Some Urgent Crucial Decisions

Forrester IT

The CIOs of SAP customers need to pay close attention to the vendor’s announcement earlier today with details on how it intends to modernize its software licensing model.

SAP 135

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Looking for Blockchain Innovation During RSA 2018

CTOvision

Dear readers, I'll be in the San Fransisco area during RSA. I'm on a mission to learn more about real world solutions and companies that leverage blockchain and will be using my trip to focus on that. Of course I'll also spend time doing other things I love like spending a bit of time on […]. Blockchain and Cryptocurrency CTO Cyber Security News

One in five serverless apps has a critical security vulnerability

Network World

Serverless computing is an emerging trend that is likely to explode in popularity this year. It takes the idea of a smaller server footprint to the next level. First, there were virtual machines, which ran a whole instance of an operating system. Then they were shrunk to containers, which only loaded the bare minimum of the OS required to run the app. This led to a smaller footprint. Now we have “serverless” apps, which is a bit of a misnomer.

Microsoft Intune Training Course Intune Certification

Anoop

Microsoft Intune training course from Microsoft learning is free of cost. But if you need a verified certificate then, you need to pay around USD 99$. Microsoft Course Number INF260x – Microsoft Azure Security Services includes one module on Microsoft Intune device management solution. If this is your first edX course, I would recommend you check […].

Apple’s Brand Playbook Unlocked

Forrester IT

Do you want to be like Apple? In 2010, Apple ranked as the 17th most valuable brand in the world. Just three years later, it had garnered the top spot and has remained there. Since 2010, Apple’s brand value has increased at a compound annual growth rate of 36%, while the entire “brandscape” has grown […].

Apple 133

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Steps to Take to Beat the Insider Threat in 2018

CTOvision

Hackers get the headlines, but a data breach is more likely to originate inside your own office walls. Errors, negligence and malicious intent by employees are the leading causes of security incidents but remain the least reported. Why do employees pose so much risk? The list of reasons is long: busy schedules that lead to sloppiness […]. CTO Cyber Security News

Cisco broadens Tetration security delivery with cloud, virtual buying options

Network World

Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system. Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. [ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies. |

The Need for a Seamless Shopping Experience

Perficient - Digital Transformation

Have you heard of omnichannel retail? If not, you’ve probably experienced it.

Apple 60

AI Will Drive Product Improvements In ePurchasing And CLM, But Not New Revenues

Forrester IT

Artificial intelligence (AI) is a widely-discussed topic in the software market.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.