Sat.Nov 30, 2019 - Fri.Dec 06, 2019

article thumbnail

The VPN is dying, long live zero trust

Network World

The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of digital business. VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside.

article thumbnail

How to excel at secured cloud migrations through shared responsibility: A guide

CTOvision

Read Louis Columbus explain how to excel at secured cloud migrations through shared responsibility on Cloud Computing : These and many other fascinating insights are from the recent Centrify survey, Reducing Risk in Cloud Migrations: Controlling Privileged Access to Hybrid and Multi-Cloud Environments, downloadable here. The survey is based on a survey of over 700 […].

Cloud 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Do CIOs Need To Know About Managing Millennials?

The Accidental Successful CIO

CIOs need to know a few basic things in order to lead millennials Image Credit: ITU Pictures. I’m hoping that we can all agree that the nature of our IT department’s workforce has been changing over the past few years. It sure seems like as importance of information technology grows, the department keeps getting younger and younger and younger. What has been happening is that we have been employing more and more members of the so-called millennial generation.

Firewall 173
article thumbnail

How can attackers abuse artificial intelligence?

CTOvision

Read how the cybercriminals can target artificial intelligence devices on Helpnet Security : But a new report published by the SHERPA consortium – an EU project studying the impact of AI on ethics and human rights – finds that while human attackers have access to machine learning techniques, they currently focus most of their efforts […].

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How To Prove That Fixing Customer Experience Problems Cuts Costs

Forrester IT

There’s an alternative approach to proving the economic value of CX, and it has some advantages: The math is simple and it’s hard to argue against. What’s more, you’ll be measuring something that executives like in good times and love in bad times: cost savings.

How To 494
article thumbnail

New Microsoft Edge Browser Deployment with Intune MEM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Microsoft Edge browser deployment guide using Endpoint Manager Intune. Intune team created an out of box experience to create an Intune application for new edge browser (chromium based) deployment. Related Post Deploy Microsoft Edge Browser with SCCM Endpoint Manager Introduction As per Microsoft, the new chromium based edge browser is the only one browser required […].

Microsoft 207

More Trending

article thumbnail

DDoS: An Underestimated Threat

CTOvision

Read why Marc Wilczek says distributed denial-of-service (DDoS) attacks have become more common, more powerful, and more useful to attackers on Dark Reading. On the flip side of the proliferation of Internet of Things (IoT) devices, the quest for increased connectivity and bandwidth (think 5G) and skyrocketing cloud adoption, IT is increasingly being weaponized to […].

Internet 202
article thumbnail

A Roundup Of Key Machine-Learning Announcements From AWS re:Invent

Forrester IT

For data science practitioners, machine learning developers or insights-driven business leaders, here are the key announcements from Amazon's AWS re:invent 2019 show that you should care about.

Data 312
article thumbnail

Microsoft Invoicing is being retired--export the customer data before it is gone forever

Tech Republic Cloud

Microsoft has decided to retire the Invoicing app in Office 365 in 2020. If you act quickly, you can preserve your customer data and import it to your replacement application.

Microsoft 156
article thumbnail

Grand Canyon Majesty - Foto Friday

Eric D. Brown

Grand Canyon Majesty — If you’ve never seen a sunset (or sunrise) over the grand canyon, you are missing out. This image is from my most recent trip on a workshop with  @don_smith_photography  and  @garyhartphoto  to the canyon to chase storms and lightning. One evening when no storms were around, I decided to set up for a sunset shoot and found this little gem of a location.

130
130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Deception for Speeding Up Your OODA Loop

CTOvision

Join Matt Devost, CEO & Co-Founder of OODA LLC. and Tony Cole, CTO of Attivo Networks for an in-depth discussion on cyber deception and how it plays into the OODA loop, the cycle of observe–orient–decide–act. Attackers and defenders may not realize it however both operate within an OODA loop where in a world without deception […].

CTO 200
article thumbnail

Retailers: Make Your Website Accessible Or Leave Money On The Table

Forrester IT

This blog post is part of Forrester’s Holiday 2019 retail series You want anyone to be able to buy from your retail website, right? News flash: You’re missing out on entire segments of your target market because of how your website is designed and coded — unless you’re part of the few brands (just 2.2% […].

Retail 259
article thumbnail

Using PowerShell for SQL Backup Verification

Mick's IT Blog

Earlier this year, we had a non-critical SQL server to crash. Come to find out, the backups were successful every night, but the data in the backup was corrupt. Needless to say, the server had to be recreated from scratch. Thankfully it was a non-critical server. We wanted a way to automatically verify SQL backups are valid. Using PowerShell, I wrote the following script that runs RESTORE VERIFYONLY against the latest backup contained in the designated directory.

Backup 142
article thumbnail

Grand Canyon Majesty – Foto Friday

Eric D. Brown

Grand Canyon Majesty — If you’ve never seen a sunset (or sunrise) over the grand canyon, you are missing out. This image is from my most recent trip on a workshop with @don_smith_photography and @garyhartphoto to the canyon to chase storms and lightning. One evening when no storms were around, I decided to set up for a sunset shoot and found this little gem of a location.

130
130
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Amazon’s kooky new keyboard lets humans and AI write music together

CTOvision

Amazon has come up with an entertaining but unlikely way to get developers excited about using its AI services: music. At its AWS re:Invent event in Las Vegas on Sunday night, the company unveiled a new music keyboard called DeepComposer, which developers can use to compose music in collaboration with Amazon generative AI models running in […].

article thumbnail

Here’s What Happened On The Biggest Online Shopping Day Of The Year

Forrester IT

This blog post is part of Forrester’s Holiday 2019 retail series. Retailers (and consumers) have been talking about all things holiday for months, but the “official” kick-off of the highly anticipated shopping season took place this past weekend. By many counts, it was a success. The National Retail Federation (NRF) reported that a record breaking 189.6 […].

Retail 221
article thumbnail

StarCIO Report: Digital Survey 2019

Social, Agile and Transformation

Several weeks ago, I wrote the article on CIO.com, 5 outdated technology practices that doom digital transformations where I dated several technology practices and suggested others that were replacing them. Several weeks later, I opened a poll to selected CIOs, IT leaders, and high potentials to tell me which practices were most outdated in their organizations and what digital practices they.

Survey 130
article thumbnail

Are you eating your brain?

Eric D. Brown

I know — Are you eating your brain? — is a strange title…but stick with me here. I’m listening to an audiobook titled Understanding Complexity by Scott Pag e and heard an interesting bit of trivia about a marine animal called the Sea Squirt. What’s interesting about the sea squirt is the following : …almost as soon as it stops moving, its brain is absorbed by its body.

Exercises 130
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Artificial Intelligence Industry and Global Challenges

CTOvision

Read Fabian Westerheide take a look at the global challenges faced by the artificial intelligence industry on Forbes : Whoever controls the strongest artificial intelligence controls the world. Artificial intelligence is the most important technology of the 21st century. It is therefore important to understand global ambitions and movements. In this article I examine the […].

article thumbnail

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

LVMH Acquires Tiffany & Co.: Why It’s A Prudent Match LVMH (Moët Hennessy Louis Vuitton) is acquiring Tiffany & Co. for approximately €14.7 billion (or $16.2 billion). For LVMH this will strengthen its presence in the US market and position in the jewelry category. For Tiffany & Co., it presents an opportunity to turn around […].

B2C 212
article thumbnail

Device Encryption – Bitlocker made Effortless – Part 2

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In my previous article, I tried to explain the working mechanism of Bitlocker encryption, the internal OS components involved and most importantly – why it is necessary and how it helps secure the OS platform from cold boot attacks. I would urge you to give it a read here if you have not seen it […].

Windows 156
article thumbnail

Reviewing my map of the 2010s at the end of the decade

Trends in the Living Networks

Ten years ago I released my map of the 2010s , consisting of 14 “ExaTrends” (Exa being the cube of Mega). Click through on the images for the full size pdf. The complete text describing the ExaTrends on pdf is also on the post below the images. What are your thoughts on how well I did at anticipating the decade just past? Overall the themes seem to be pretty accurate, though the pace of some may have been a little off, and among other misses, the key theme of social polarization, whi

Energy 142
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Why business leaders are short sighted on AI

CTOvision

Read Greg Nichols explain why business leaders are short-sighted in matters of artificial intelligence on ZDNet : Artificial intelligence is one of the most marketed (hyped, you might say) and ill-defined technology categories being packaged and lobbed at those in the enterprise these days. You might think overexposure would lead to fatigue and a healthy […].

article thumbnail

Retailers Now Choose Commerce Tech Based on How Providers Engage, Not What They Are

Forrester IT

Legacy suites and platforms have reinvented themselves and a new component-based model has entered the ring. Gone are the days of take-it-or-leave-it, prefab, legacy commerce suites and isolated, minimally integrated platforms. As we’ve seen business models adapt to rapidly shifting customer needs and expectations, retailers’ demands of their commerce technology models have evolved at the […].

Retail 216
article thumbnail

Windows 10 Rollback Uninstall Updates Enhanced Diag Options

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, Learn How to reduce the Windows 10 rollback rate, Diagnosing install failures, and Uninstall Updates. These are the information shared by Suma Sagane Gowda & Steve Diacetis in the MS Ignite session. More details about session below. Introduction We will see more details about Windows Rollback, Diagnosing install failures, and uninstall updates. […].

Windows 141
article thumbnail

What Digital Transformation Is (And Isn't)

Information Week

If you're confused about what digital transformation means, you're not alone. But survey data highlights some agreement about how it's changing the way companies do business.

Survey 155
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Command and control – Google on its vision of the cloud, privacy, data and security

CTOvision

There are a raft of platforms and services jostling for business when it comes to getting organisations up on the cloud and changing the way they operate. At the heart of this market is the big three cloud platforms – Amazon Web Services, Microsoft Azure and Google Cloud. Digital transformation, AI, security, big data, IoT, and […].

Google 152
article thumbnail

2020 Marketing Trends

Forrester IT

In the past three weeks, I have shared the key findings of our predictions research to different clients and at some Forrester events in London and in Amsterdam. It is always interesting to challenge clients on some of their assumptions, discuss what trends will accelerate next year or to be challenged on some of the […].

Trends 195
article thumbnail

The open source decade, fueled by cloud and GitHub

Tech Republic Cloud

Commentary: The last decade has been open source's most productive by far. Find out why Matt Asay considers it a Cambrian explosion of choice and innovation.

article thumbnail

New Android bug targets banking apps on Google Play store

Tech Republic Security

Labeled "StrandHogg," the vulnerability discovered by the mobile security vendor Promon could give hackers access to users' photos, contacts, phone logs, and more.

Banking 140
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.