Sat.Sep 24, 2016 - Fri.Sep 30, 2016

How To Unlock Tech Industry Digital Transformation

Forrester IT

It's no surprise that tech companies are vested in the digital transformation of their customers. But many tech companies find it difficult to leave their product-centric models behind and focus on customer outcomes. That's just one of the findings from the research published on digital transformation in the tech sector. True customer obsession demands an outside-in perspective.

IT's secret weapon: The pragmatic hybrid cloud

David Linthicum

Private clouds are not having the impact many people thought they would, though private clouds are a valid architecture and have value in some enterprise problem domains. However, public clouds are far more common in enterprise deployments. You see more hybrid clouds than private clouds, but not the hybrids that vendors are selling.

Cloud 286

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Sunil Thomas. Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. This post is the continuation of a series discussing why a CTO makes or breaks your enterprise mobile strategy and in case you’ve missed it we have already discussed how to choose between building native apps vs. adopting the mobile web.

Mobile 283

Mobility is about to enter the post-app era, says Gartner

Computer Weekly

At an event in South Africa, Gartner analysts look ahead to an era of mobility that goes beyond apps

Mobile 210

The Pro’s Guide To Getting The Best ROI From Your New LMS

You need a Learning Management System when your courses and training programs need to be accessible online. Quickly build the perfect business case and easily determine which LMS will provide the best return on investment you need with this how-to eBook!

R.I.P. BlackBerry Phones

Forrester IT

An era has passed. BlackBerry will no longer make phones. RIM opened our eyes when it put the power of digital communications into our pockets. Email on the go was the beginning of the mobile mind shift. I loved the passion of Mike Lazaridis and his team for building great devices that we'd drive home and get if we left on the counter. His devices were the first to inspire such passion, such intimacy, such a feeling of empowerment that we now all take for granted. He started it.

Mobile 290

What to do when hackers break into your cloud

David Linthicum

There are two major types of public cloud computing attacks: single-tenant and cross-tenant. A cross-tenant attack is the stuff of IT nightmares, but it has not yet occurred. (In In a cross-tenant attack, the hackers gain root-level access to the cloud and thus access to most or all of the tenants -- including you.). Single-tenant breaches are more likely to occur. In these attacks, the hacker has compromised one or more machine instance, but can't go beyond that.

More Trending

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 205

Bosch And SAP Agree A Strategic Internet Of Things (IoT) Partnership To Facilitate Data Orchestration

Forrester IT

I recently attended an event at which Bosch and SAP announced a major partnership to more closely align their respective cloud and software expertise around the industrial internet of things. This partnership underlines the fact that SAP and Bosch are prepared to significantly transform their respective business models to generate new value for their customers. The SAP and Bosch partnership focuses on two main items: Read more Categories: Bosch. Bosch Software Innovation. Open Source.

SAP 280

Latest Microsoft Data Center Design Gets Close to Unity PUE

Data Center Knowledge

Innovation in data center design by cloud giants has widespread implications for their users as well as for the data center industry in general. Read More. Cooling Data Center Design Featured Microsoft Quincy, Wash

Dynamic Data Centers

CTOvision

Marty Meehan. Big Data and high performance computing (HPC) are on a collision course – from machine learning to business intelligence, the combined power of clustered servers, advanced networking and massive datasets are merging, and a new Big Data reality is on the rise. To leverage all this landscape has to offer, correctly selecting, implementing and managing new technologies is critical, and we’re here to point you in the right direction.

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

NGOs challenge UK and US mass surveillance in human rights court

Computer Weekly

Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights

Groups 205

Consultancies are adapting to the digital world

Forrester IT

The age of the customer is characterized by customer empowerment, digital technology, and new business models. These factors are changing who buys consulting, what they're expecting, how consultants execute on these projects, and how clients pay for them. As a result, firms including Deloitte, McKinsey, Booz Allen Hamilton, Cognizant and others are changing delivery, hiring and contracting models to: Read more.

244
244

Oracle Reduces Ellison’s Pay to $41.5 Million, Co-CEOs Cut

Data Center Knowledge

The three executives were among the 20 highest-paid in the U.S. last year. Read More. Executive Oracle

Oracle 211

The 4 Oct Synergy Forum in DC Can Help You Change The World

CTOvision

Bob Gourley. Thank you everyone who is engaging with us at our 4 Oct Synergy Forum in DC. What an incredible turnout. We can't share the signup list of attendees for obvious privacy reasons, but here is a gist: The event will be a gathering of some of most incredible, action-oriented thought leaders in America today. CIOs, CTOs, CISOs, Data Scientists, SES's, CEOs, Flag and General Officers are signed up to attend. And the speakers are awesome!

How Embedding AI-Powered Analytics Can Give You a Competitive Advantage

Embedding dashboards and reports aren’t enough. Futureproof your application by offering instant, actionable insights that will give you and your customers a competitive advantage.

Computer Weekly @ 50 startup interview: Callum Murray, MD, Amiqus

Computer Weekly

We discuss with Callum Murray, managing director of Amiqus, how the company uses machine learning and open data to build tools

Tools 199

Update Your Balanced Scorecard With Business Outcome And Agility Metrics

Forrester IT

We've entered the age of the customer, where powerful customers are disrupting every industry. In response, companies will have to change how they develop, market, sell, and deliver products and services directly to their customers and through their partners.

Agile 233

Snagging Creds From Locked Machines With LAN Turtle Or USB Armory

Doctor Chaos

This is a really cool research by Mubix found at room362 (HERE). The concept is you can use a Hak5 LAN Turtle or USB Armory stick to run responder to steal user credentials while the Windows system is locked. I used the LAN Turtle and found it pretty straight forward. Below is how I setup […]. Tools hacking tools

LAN 142

Optimizing HPC Program Performance with OpenMP and Reveal

CTOvision

Marty Meehan. What do you do when the performance of the MPI program that distributes your work across many cores and nodes starts to level off? Like any good programmer, you enlist the help of your favorite performance profiler to understand what’s going on. You find that you are now network bound, or that the MPI memory footprint has grown so large that there is little room left for your program.

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Trust issues stifling digital economy growth, study shows

Computer Weekly

Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows

Study 197

Amazon, Google Detail Next Round of Cloud Data Center Launches

Data Center Knowledge

Amazon plans Paris data centers, while Google unveils eight new cloud locations planned for 2017 Read More. Amazon Cloud Computing Data Center Strategies Google

Creepy clowns cause sheriff to consult with FBI and Homeland Security

Network World

If you are going to be dressing up in a costume for Halloween, you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.”

Film 131

Nlyte Software is the First to Address Federal DCOI Reporting and Validation

CTOvision

Marty Meehan. As federal budgets face tighter scrutiny, government agencies at all levels have been seeking innovative ways to operate more efficiently at lower cost without compromising security. Consolidating and optimizing government data centers is an important way to shift more IT resources from back-office activities to value-added services.

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Yahoo security still poor despite massive breach, claims Venafi

Computer Weekly

Yahoo is likely to have been a victim of its own encryption and security is still poor despite the huge breach that hit the company in 2014, according to security firm Venafi

Taking Data to the Edge: CDN’s Role Grows in the Data Center

Data Center Knowledge

We’re taking more and more data to the edge and CDNs are guiding the way. Read More. CDNs Data Center Strategies Featured CDN data center

The spiraling cost of college textbooks

Doctor Chaos

written by Aamir Lakhani September 30th, 2016 Every college student will tell you textbooks are expensive. If they don’t, their parents certainly will. Textbook prices have been steadily rising through the years, which is expected. What is not usual, however, is the rate of increase. One recent estimate stating they have increased a whopping 1,041% […]. Cyber

130
130

IDG Contributor Network: Passwords will be wirelessly transmitted through bodies

Network World

Low-frequency transmissions created by off-the-shelf biometric devices, such as fingerprint sensors, can be diverted through the body and can securely transmit password-like authentication. The off-the-shelf biometric sensors, such as touchpads, are “re-purposed to send out information,” says Shyam Gollakota, University of Washington assistant professor of computer science and engineering and senior author on the research paper, in a University of Washington article.

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Lax perimeter security exposes bank to hacker extortion attempt

Computer Weekly

Failure to follow standard network security best practice has exposed a Californian investment bank to cyber criminals’ demands

Data Center Stocks are Hot Internationally

Data Center Knowledge

Bevan Slattery’s Nextdc is the most expensive stock in Australia’s S&P/ASX 200 index Read More. Asia-Pacific Colocation Investing

Microsoft Removed Journal From Windows Due To Security Issues

Doctor Chaos

Last month, Fortinet researcher Honggang Ren discovered a heap overflow vulnerability in Windows Journal and reported it to Microsoft. This month, Microsoft released update KB3161102 and removed the Journal component from all versions of Windows because the file format used by Journal has been demonstrated to be susceptible to a number of security exploits. Microsoft […]. InfoSec infosec

A CIO Always Has To Maintain Credibility

The Accidental Successful CIO

Credibility is hard to get and easy to lose in the world of IT Image Credit: opensource.com. Quick question for you: if I asked someone that you know if you were a credible person , what would they tell me? I think that both you and I hope that they would tell me that “yes” you are a credible person. However, if I asked them the same thing about your IT department, what would they say then? How IT Departments Have Lost Credibility.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!