Sat.Mar 18, 2017 - Fri.Mar 24, 2017

Google Drives Into The Business Content Services Segment of ECM

Forrester IT

Several Forrester colleagues and I attended the Google Next conference earlier this month, an event showcasing the Google Cloud Platform portfolio. One message, however, was distinctly NOT cloudy: Google is aiming at the enterprise market. And that includes your enterprise content.

Google 393

What Big Data and Public Speaking Have in Common


Brigg Patten. Public speaking is about turning even boring subjects into an inspiring experience. However, some speakers can make audiences cheer, while others put them to sleep. Genuine passion for the subject and good articulation can help, but successful public speaking engagements take something more. Analytics can actually tell us which elements can transform mere words into a unique experience.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IT Enterprise Architecture: How to Engage Business Partners and Enhance Digital Innovation


As senior management team sign off on multimillion dollar investments in digitization, thousands of people across all industries are rapidly uncovering new ways to use technology to increase productivity and create a competitive advantage.

The barrier to cloud security isn't the technology

David Linthicum

You want solid cloud security, so you work to find the best approach and technology. But that won’t get the job done. The truth is that competent cloud security technology is available, and most IT organizations’ cloud teams are good at finding and using it. But cloud IT doesn’t exist in a vacuum, so having the right approach and technology alone won’t secure your cloud operations. [ The cloud storage security gap—and how to close it. | 5 ways Microsoft has improved SharePoint security. ].

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Make Omnichannel A Cornerstone Of Your Digital Transformation – The Telco Angle

Forrester IT

Source: Forrester, "Make Omnichannel A Cornerstone Of Your Telecom Digital Transformation" Poor customer experiences remain the Achilles' heel of telcos' digital transformation efforts.

3 Early Strategies for Defending Your Company Now from Future Cyber Attacks


Carol M. Evenson. Far too often, companies don’t start to worry about digital security until after they experience an attack.

More Trending

Calculate your cloud costs with this simple formula

David Linthicum

"Cloudops" is the latest buzzword. Its meaning is simple: the ability to operate workloads, including both applications and data, once they get to the public cloud. What’s not so simple is figuring out what cloudops will cost over time, both based on future changes in technology costs and on adding or deleting workloads from the public cloud. [ Get started: A developer’s guide to serverless computing. Keep up with hot topics in programming with InfoWorld’s App Dev Report newsletter. ].

The Disruptive Force of Disruption

Forrester IT

Digital disruption is a fairly well understood dynamic: new entrant uses technology in new ways to upend existing business models and disrupt markets. In other words, digital disruption is a distinct force with a distinct life span that is mostly external to traditional markets and businesses. But what if it is more than that? What if it is the canary in the coal mine representing the first signals of a shift in our economy and society?


The Toll of Ransomware is Growing


Rick Delgado. Opening an unknown email, clicking a new link, or accessing a malicious document: it doesn’t take much to fall victim to a cyber attack. There are a variety of attacks that can greatly hurt your company and lead to a loss of finances and sensitive information, but ransomware attacks are increasing in frequency and severity for a number of companies. .

IT Project Management: 4 Principles of a High-Impact Dashboard


IT project managers’ job is to steer highly complex and expensive IT projects to completion on time and – if possible – under budget, so a big part of their role is letting everyone know how projects are progressing.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Cardiff man admits terrorist charges after posting encryption instructions on Islamic blog

Computer Weekly

Samata Ullah, a resident of Cardiff, pleaded guilty to five terrorism charges, including developing an encrypted version of an Islamic website and posting videos explaining how to use encryption

Video 187

A Spring Break Conversation Topic With Your College Kid

Forrester IT

I don't know about you but this Spring Break is different in my family. My daughter, who has almost finished her first year at a Liberal Arts College, came back for Spring Break with the big question "Mom, what major should I choose?"

Chances to Speak at O’Reilly Media’s Upcoming Conferences


Bob Gourley. O'Reilly Media is looking for speakers to share lessons learned at several of their upcoming conferences. Presentations could be a success story, cautionary tale, hard-won lesson, or perhaps even a worthy failure. Here are some of the upcoming events to consider speaking at: O'Reilly Artificial Intelligence Conference in San Francisco.

IT Infrastructure: 7 Implications of Digitization for Infrastructure Operations


Digitization has left few parts of a big company’s operations untouched over the past two to three years.

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

PSD2 – time to open and secure APIs and rethink business models

Computer Weekly

With the EU’s Payment Service Directive (PSD2) going into effect in January 2018, banks have no time to waste in preparing for the changes it will bring

Aprimo’s Acquisition Of ADAM Software Signals Market Consolidation

Forrester IT

Marketing resource management (MRM) vendor Aprimo snatched up ADAM Software, which bolsters Aprimo's digital asset management (DAM) capabilities and reinforces the consolidation and convergence that we predicted. There are a lot of small DAM vendors, but there has been a move to consolidate. Specifically, the capabilities of MRM, DAM, and content marketing platforms (CMP) continue to blur. MRM vendors like Aprimo help marketers assign tasks, track resources, budget, and review materials.

How IT Uses Collaboration for Digital Transformation

IT Toolbox

As this series progresses, I’ll address the impact of digital transformation on three stakeholder groups, along with how each can use collaboration solutions like UC to manage these changes. As noted earlier, each group faces distinct challenges, and all of them need to

Groups 161

Mashape, Creator of Top Open Source API Management Tool Kong, Raises $18M

Data Center Knowledge

Andreessen Horowitz leads round, spearheaded by Nicira co-founder Martin Casado Read More. Cloud Computing Featured

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

IR35 reforms will harm public sector innovation and competitiveness, say contractors

Computer Weekly

Research from recruitment consultancy Harvey Nash highlights contractor concerns about how the forthcoming IR35 reforms will affect competitiveness and talent recruitment in the public sector

Does How You Look Really Matter?

The Accidental Successful CIO

Studies show that what you wear to work may impact how effective you are Image Credit: Matthew Kenwrick. When you go into the office, how do you dress? Do you put on a suit, find just the right tie, and make sure that your shoes are polished?

Study 164

5 Ways to Combat VoIP Eavesdropping

IT Toolbox

Phone eavesdropping is back in the headlines, making it a good time to review options for guarding your voice over IP (VoIP) phone system. There’s a rich history to VoIP eavesdropping, including such attacks as Vomit, SIPtap, and Peskyspy. That history is only going to

VOIP 149

Canada Firm Uses Salt, Tesla and Flywheels in Clean Energy Race

Data Center Knowledge

Battery tech is advancing quickly, thanks to Tesla, while other energy storage methods are being refined. Read More. Green Data Centers Power

Energy 158

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Not as much progress as you’d expect in public cloud adoption

Computer Weekly

Why are many executives still wary of moving enterprise IT systems to the cloud

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

Network World

A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker–chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University of South Carolina in a paper.

5 Ways to Save Money on Tech Investment

IT Toolbox

Here we will provide you with some great tips on how to save money on technology and still be satisfied with your purchase

How To 140

BASF to Collaborate With HPE on 1-Petaflop Supercomputer

Data Center Knowledge

System expected to significantly cut research time for world's largest chemical maker Read More. Hewlett Packard Enterprise HPC

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

UK impersonation fraud up 39% in last quarter of 2016

Computer Weekly

Just ahead of the end of the UK tax year, a survey underlines the importance of guarding against business email compromise aimed at stealing data and money

Survey 151

Stop using password manager browser extensions

Network World

It's been over a year since I presented on LostPass at ShmooCon, and in that time, many more bugs have been found in password managers. The most severe of which are in browser-based password managers extensions such as LastPass. Tavis Ormandy yesterday demonstrated a remote code execution on the latest LastPass version. This isn't the first extremely severe bug he's found in LastPass, either; there've been so many extremely severe bugs in LastPass it would be tedious to list them out.


3 Ways CRM Taps into the Growing Demand for Personalization

IT Toolbox

Consumers have made it clear: They want personalized shopping experiences that recognize their preferences across platforms and coordinates all their experiences with a given brand. That’s a challenge for most organizations, which are struggling to learn the best ways to personalize customers’ experiences. Any organization with a customer relationship management (CRM) system, however

System 136

SaaS Keeps SMBs and Solopreneurs from Falling Behind in Cloud

Data Center Knowledge

Mom-and-pop shops and sole proprietors can use enterprise-grade SaaS to take on the big boys. Read More. Cloud Computing Shared

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.