Sat.Mar 18, 2017 - Fri.Mar 24, 2017

The Disruptive Force of Disruption

Forrester IT

Digital disruption is a fairly well understood dynamic: new entrant uses technology in new ways to upend existing business models and disrupt markets. In other words, digital disruption is a distinct force with a distinct life span that is mostly external to traditional markets and businesses. But what if it is more than that? What if it is the canary in the coal mine representing the first signals of a shift in our economy and society?

319
319

What Big Data and Public Speaking Have in Common

CTOvision

Brigg Patten. Public speaking is about turning even boring subjects into an inspiring experience. However, some speakers can make audiences cheer, while others put them to sleep. Genuine passion for the subject and good articulation can help, but successful public speaking engagements take something more. Analytics can actually tell us which elements can transform mere words into a unique experience.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The barrier to cloud security isn't the technology

David Linthicum

You want solid cloud security, so you work to find the best approach and technology. But that won’t get the job done. The truth is that competent cloud security technology is available, and most IT organizations’ cloud teams are good at finding and using it. But cloud IT doesn’t exist in a vacuum, so having the right approach and technology alone won’t secure your cloud operations. [ The cloud storage security gap—and how to close it. | 5 ways Microsoft has improved SharePoint security. ].

IT Enterprise Architecture: How to Engage Business Partners and Enhance Digital Innovation

CEB IT

As senior management team sign off on multimillion dollar investments in digitization, thousands of people across all industries are rapidly uncovering new ways to use technology to increase productivity and create a competitive advantage. Line managers should partner more closely with the corporate IT team to ensure their business strategy makes full use of the digital capabilities at the company’s disposal.

Going to Market Smarter in the New Economy

The fight to find new customers and retain existing ones is the biggest business challenge for many companies. Technology will continue to play a part in fostering buyer allegiance and building brands in the “new normal.” In 2021, as companies continue to move more functions online, employees will take a more virtual -- and flexible -- mindset and lifestyle in parallel to the digitization of businesses. To succeed, you must change the way you conceive and build new products as a digital business. Download the report today to discover more!

Google Drives Into The Business Content Services Segment of ECM

Forrester IT

Several Forrester colleagues and I attended the Google Next conference earlier this month, an event showcasing the Google Cloud Platform portfolio. One message, however, was distinctly NOT cloudy: Google is aiming at the enterprise market. And that includes your enterprise content. Google Drive has been a popular offering in the cloud enterprise file sync and share market, and we evaluated it as a Leader in our 2016 Forrester Wave (subscription required).

Google 301

Cardiff man admits terrorist charges after posting encryption instructions on Islamic blog

Computer Weekly

Samata Ullah, a resident of Cardiff, pleaded guilty to five terrorism charges, including developing an encrypted version of an Islamic website and posting videos explaining how to use encryption

Video 187

More Trending

The Toll of Ransomware is Growing

CTOvision

Rick Delgado. Opening an unknown email, clicking a new link, or accessing a malicious document: it doesn’t take much to fall victim to a cyber attack. There are a variety of attacks that can greatly hurt your company and lead to a loss of finances and sensitive information, but ransomware attacks are increasing in frequency and severity for a number of companies. .

A Spring Break Conversation Topic With Your College Kid

Forrester IT

I don't know about you but this Spring Break is different in my family. My daughter, who has almost finished her first year at a Liberal Arts College, came back for Spring Break with the big question "Mom, what major should I choose?"

PSD2 – time to open and secure APIs and rethink business models

Computer Weekly

With the EU’s Payment Service Directive (PSD2) going into effect in January 2018, banks have no time to waste in preparing for the changes it will bring

How IT Uses Collaboration for Digital Transformation

IT Toolbox

As this series progresses, I’ll address the impact of digital transformation on three stakeholder groups, along with how each can use collaboration solutions like UC to manage these changes. As noted earlier, each group faces distinct challenges, and all of them need to

Groups 161

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

Chances to Speak at O’Reilly Media’s Upcoming Conferences

CTOvision

Bob Gourley. O'Reilly Media is looking for speakers to share lessons learned at several of their upcoming conferences. Presentations could be a success story, cautionary tale, hard-won lesson, or perhaps even a worthy failure. Here are some of the upcoming events to consider speaking at: O'Reilly Artificial Intelligence Conference in San Francisco.

Aprimo’s Acquisition Of ADAM Software Signals Market Consolidation

Forrester IT

Marketing resource management (MRM) vendor Aprimo snatched up ADAM Software, which bolsters Aprimo's digital asset management (DAM) capabilities and reinforces the consolidation and convergence that we predicted. There are a lot of small DAM vendors, but there has been a move to consolidate. Specifically, the capabilities of MRM, DAM, and content marketing platforms (CMP) continue to blur. MRM vendors like Aprimo help marketers assign tasks, track resources, budget, and review materials.

IR35 reforms will harm public sector innovation and competitiveness, say contractors

Computer Weekly

Research from recruitment consultancy Harvey Nash highlights contractor concerns about how the forthcoming IR35 reforms will affect competitiveness and talent recruitment in the public sector

Step-by-Step: Deploy Windows Server 2016 Storage Spaces Direct (S2D) Cluster in Microsoft Azure

IT Pros Rock!

In this short video, we’ll walk through deploying a Windows Server 2016 Storage Spaces Direct (S2D) Cluster to a Microsoft Azure subscription using Azure Resource Manager (ARM) Templates. Storage Spaces Direct (S2D) on Microsoft Azure. ARM templates streamline the process of provisioning complex solutions in the cloud. In this scenario, we’ll be leveraging two ARM templates from the Azure Quick Start template gallery: Deploy VNET and Active Directory Domain Controllers.

How to Empower Your Users So You Can Create a Great Product

Speaker: Johanna Rothman, Management Consultant, Rothman Consulting Group

Join Johanna Rothman, Author and Consultant, for her session that will discuss why instead of designing for the users, CTOs and their teams should collaborate with empowered users to create a great product together.

3 Early Strategies for Defending Your Company Now from Future Cyber Attacks

CTOvision

Carol M. Evenson. Far too often, companies don’t start to worry about digital security until after they experience an attack. If they’re lucky, the first attack won’t cause too much damage, but an even better situation would be if the people responsible for the attack walked away from the encounter empty-handed. The best way to ensure that ‘s what happens is to start planning for such an event now, before it’s even an issue.

IT Project Management: 4 Principles of a High-Impact Dashboard

CEB IT

IT project managers’ job is to steer highly complex and expensive IT projects to completion on time and – if possible – under budget, so a big part of their role is letting everyone know how projects are progressing. However, like many other parts of a big business, the availability of a lot more data on the topic has made reporting much more difficult. Dashboards are now frequently stuffed with so much data that stakeholders struggle to process the information.

Not as much progress as you’d expect in public cloud adoption

Computer Weekly

Why are many executives still wary of moving enterprise IT systems to the cloud

5 Ways to Combat VoIP Eavesdropping

IT Toolbox

Phone eavesdropping is back in the headlines, making it a good time to review options for guarding your voice over IP (VoIP) phone system. There’s a rich history to VoIP eavesdropping, including such attacks as Vomit, SIPtap, and Peskyspy. That history is only going to

VOIP 149

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

Mashape, Creator of Top Open Source API Management Tool Kong, Raises $18M

Data Center Knowledge

Andreessen Horowitz leads round, spearheaded by Nicira co-founder Martin Casado Read More. Cloud Computing Featured

IT Infrastructure: 7 Implications of Digitization for Infrastructure Operations

CEB IT

Digitization has left few parts of a big company’s operations untouched over the past two to three years. And while IT teams have been at the forefront of this, much of their focus has been on the glitzy end of the transformation; working on things like how to help line managers sell their products via new digital channels.

UK impersonation fraud up 39% in last quarter of 2016

Computer Weekly

Just ahead of the end of the UK tax year, a survey underlines the importance of guarding against business email compromise aimed at stealing data and money

Survey 151

5 Ways to Save Money on Tech Investment

IT Toolbox

Here we will provide you with some great tips on how to save money on technology and still be satisfied with your purchase

How To 140

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

Network World

A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker–chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University of South Carolina in a paper.

Canada Firm Uses Salt, Tesla and Flywheels in Clean Energy Race

Data Center Knowledge

Battery tech is advancing quickly, thanks to Tesla, while other energy storage methods are being refined. Read More. Green Data Centers Power

Energy 158

Security Think Tank: Minimise data to cut costs and comply with GDPR

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security

3 Ways CRM Taps into the Growing Demand for Personalization

IT Toolbox

Consumers have made it clear: They want personalized shopping experiences that recognize their preferences across platforms and coordinates all their experiences with a given brand. That’s a challenge for most organizations, which are struggling to learn the best ways to personalize customers’ experiences. Any organization with a customer relationship management (CRM) system, however

System 136

The Beauty and Brains of Actionable Data: How to Go From Concept to Reality

Speaker: Dr. Joe Perez, Senior Systems Analyst at NC Dept. of Health & Human Services, and Chief Technology Officer at SolonTek

Join Dr. Joe Perez, Senior Systems Analyst at NC DHHS, and Chief Technology Officer, SolonTek, to learn how you can capitalize on your ideas by blending internal with external while leveraging them into a cohesive strategy for both the short term and the long term.

Make Omnichannel A Cornerstone Of Your Digital Transformation – The Telco Angle

Forrester Omnichannel

Source: Forrester, "Make Omnichannel A Cornerstone Of Your Telecom Digital Transformation" Poor customer experiences remain the Achilles' heel of telcos' digital transformation efforts. We live in the age of the customer, and today's telco customer has expectations that far exceed the traditional standard of telco customer service. A random search on Trustpilot for customer satisfaction with telcos in various countries shows widespread dissatisfaction.

BASF to Collaborate With HPE on 1-Petaflop Supercomputer

Data Center Knowledge

System expected to significantly cut research time for world's largest chemical maker Read More. Hewlett Packard Enterprise HPC

Security Think Tank: Education and automation will up security and cut user friction

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security

5 Business Tech Trends Changing the Way Employees Collaborate

IT Toolbox

Technology has dramatically changed the way we do business over the past decade. The workplace dynamic has been enhanced through the introduction and evolution of team collaboration. Email and phone calls are now taking a backseat to unified communications. Through software collaboration tools, work teams are discovering new ways to interact with their coworkers and get things done more quickly

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.