Sat.Jun 18, 2016 - Fri.Jun 24, 2016

Computer Weekly announces the 50 most influential women in UK IT 2016

Computer Weekly

Computer Weekly announces its top 50 list of the most influential women in UK IT, including 2016 winner Maggie Philbin


To move to the cloud, you may need to fire your CIO

David Linthicum

CIOs are not necessarily from IT; they can come from all parts of the company. Indeed, when I was a corporate dude running around the hall of a Global 2000 company, I often reported to a CIO who came from the accounting group or from production. CIOs were almost always political animals, focused more on interpersonal relationships with the other executives than on the technical tasks at hand. And that's not always a bad thing because they do tend to obtain fatter budgets for IT.

IBM 159

Expert panel explores the new reality for cloud security and trusted mobile apps delivery

IT Toolbox

As enterprises and small to medium-sized businesses (SMBs) alike weigh the balance of apps and convenience with security -- a new dynamic is emerging. Security concerns increasingly dwarf other architecture considerations

How To Protect Your Children From Online Predators And Cyberbullying

Doctor Chaos

Written by Hilary Smith While the web is a useful tool, it can be very dangerous as well, particularly for our kids. However, not all sites are bad. The Internet can be a learning tool, for your children to visit educational websites. We have dreaded the online predator: who could act like a child and […]. InfoSec infosec

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Brexit and technology: How network effects will damage UK IT industry

Computer Weekly

Although largely ignored in the Brexit debate, network effects will damage the UK's high-tech industry if Britain leaves Europe

More Trending

3 Features Your Small Business Website Needs to Have

IT Toolbox

Even if you run your business offline, you still need to have a powerful online presence because it is a great marketing tool for your business

Microsoft’s Acquisition Of LinkedIn Will Not Translate Into A Revolution Of Enterprise Social Networking

Forrester IT

In a report , Forrester discussed arguments made by Microsoft regarding the potential benefits of the tie-up. There are some additional aspects that I also consider important when discussing the implications of the tie-up: Read more Categories: Enterprise Social Networking. Innovation. LinkedIn.

Social 141

Micro-segmentation key to new approach to infosec, says Unisys

Computer Weekly

Micro-segmentation enables organisations to improve data security at reasonable cost without compromising agility, governance, risk and compliance, says Unisys

Agile 152

How TierPoint Quietly Built a Data Center Empire in Secondary Markets

Data Center Knowledge

Flying generally under the radar, the private equity-backed data center roll-up has grown from a small local player to a service provider of national scale Read More. Colocation Featured Services Site Selection TierPoint

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Benefits of Using CRM Data for Programmatic Advertising Campaigns

IT Toolbox

Programmatic advertising automates a significant portion of the ad buying process, which frees up your staff's time for other high-skill tasks. You define your target audience for a campaign through a demand side platform (DSP), which connects you to ad inventory from relevant publishers. Machine learning and other artificial intelligence technology allow programmatic campaigns to find consumers

How To Protect Your Children From Online Predators And Cyberbullying

Doctor Chaos

Written by Hilary Smith While the web is a useful tool, it can be very dangerous as well, particularly for our kids. However, not all sites are bad. The Internet can be a learning tool, for your children to visit educational websites. We have dreaded the online predator: who could act like a child and […]. InfoSec infosec

Why cloud disruption will shift the dynamics of IT budgets

Computer Weekly

Cloud computing is set to become one of the most disruptive forces of IT spending since the dawn of the digital age

Budget 150

Slow Waning of the Enterprise Data Center in Numbers

Data Center Knowledge

Data center industry survey confirms rapid shift from on-prem to cloud and colo Read More. Cloud Computing Colocation Data Center Strategies Enterprise

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

How Businesses Can Successfully Implement VoIP Services

IT Toolbox

Voice over IP (VoIP) telephony services provide businesses with a host of benefits. From lowered costs to increased security, the advantages over legacy phone systems are numerous. Of course, these benefits don't simply materialize overnight. VoIP implementation can take a bit of work, but as long as a business utilizes the following tips, the transition can be seamless. Prepare

VOIP 143

Brexit: Questions CIOs Should Ask Now


The UK has voted to leave the European Union. While Brexit volatility has started with a bang, the consequences for CIOs and other business leaders when markets settle down are not yet fully understood. Uncertainty Reigns.

Budget 130

Singapore to block internet access for its public servants from 2017

Computer Weekly

From May 2017, most of Singapore’s public servants will not be able to access the internet from their workstations

Global Telia Outage Disrupts Popular Internet Services

Data Center Knowledge

Major customer says carrier reliability poor over last 60 days Read More. Connectivity Downtime Infrastructure

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

5 Ways to Boost VoIP Call Quality

IT Toolbox

Voice over IP (VoIP) is a terrific communications tool on which businesses increasingly rely to move their work forward, but especially for IT teams new to handling telephony in-house, it can be challenging to manage well at the outset. VoIP makes stronger demands on network quality than most other applications, and users tend to notice (and complain) right away if call quality slips. Here are five

VOIP 140

Ascent B2B IT Forum – Machine Learning: How Artificial Intelligence is Invading the Enterprise

The Investing Edge

There’s no denying that machine learning and artificial intelligence (AI) are invading the enterprise at warp speed. Almost every industry is affected by the technology, and the innovation it inspires is fascinating.

Think like attackers, says HPE cyber security strategist

Computer Weekly

Organisations need to think of cyber attackers as adversaries and competitors focused on stealing data, maximising their profit and minimising their risk, says HPE security strategist Tim Grieveson

Government IT: How to Prevent Ransomware from Extorting Your Organization


Computer hackers are an industrious bunch. The cyber attacks they stage are constantly evolving, and now pose a real threat to organizations and agencies in the public sector in particular.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

CRM Your Way to Success

IT Toolbox

Any CEO will tell you that it's a hard climb to reach the heights of success, especially in an uncertain economy. This is why more companies are looking at investing in software solutions which help them to increase sales and reduce operational costs. Customer Relationship Management (CRM) technology is one of the most popular choices for enterprises because it is multi-functional and versatile

With Brexit, A Customer-Focused Agenda Is More Important Than Ever

Forrester IT

Yesterday's decision by UK citizens to leave the European Union ("Brexit") brings about short-term uncertainties and unintended consequences that will make it harder for UK businesses to keep customers and attract talent. While times of high-market volatility can tempt firms to panic and cut spending on customer-focused initiatives, now is the time to drive innovation in order to win, serve, and retain customers.

UK IT community rocked but keeping calm in face of Brexit

Computer Weekly

The UK IT sector reacts with alarm, tempered by a calm pragmatism, to the British Referendum verdict to leave the European Union. Reporting by the Computer Weekly team

Report 146

An Update on the Megatrend of the Internet of Things


Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.