Sat.Sep 16, 2017 - Fri.Sep 22, 2017

More than one million new phishing sites created each month

Computer Weekly

Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot

Seven Ways ERP Can Improve Risk Mitigation

IT Toolbox

Business is no friend of risk. While fortunes are won and new markets are conquered through calculated risk, firms nonetheless try to avoid it whenever possible. Risk represents lost revenue, disrupted partnerships, idle equipment, brand damage and a host of other effects that aren’t typically advantageous to corporations. So risk mitigation is

177
177

Chatbots and voice assistants: Often overused, ineffective, and annoying

David Linthicum

There’s yet another cloud service from AWS: Amazon Lex, which lets developers build conversational interfaces into applications for voice and text. It uses the same deep learning technologies that power Amazon's Alexa voice assistant. Lex lets you quickly build natural language conversational bots, aka chatbots. Microsoft has a similar technology, called the Microsoft Bot Framework.

Data Quality – The most important data dimension?

Eric D. Brown

In a recent article I wrote over on CIO.com titled Want to Speed Up Your Digital Transformation Initiatives? Take a Look at Your Data , I discuss the importance of data quality and data management in an organization’s digital transformation efforts.

Data 168

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How to make the right technology choice

Computer Weekly

Organisations need digital technology, but how do you decide which is the best technology for you? The answer is not to make one big decision, but many small ones. Thinking about technology, behaviour and data will help you find the right answers

How To 193

More Trending

Safer but not immune: Cloud lessons from the Equifax breach

David Linthicum

I’ve stopped covering breaches. First, because clouds are nowhere to be found among them. The focus of this blog is advice to enterprises that are moving, or have moved, to cloud computing.) Second, because it just seems like piling on a company that’s already in distress. However, breaches are on the minds of enterprises on the move, due to the latest breach at Equifax. [ The cloud storage security gap—and how to close it.

Equifax Versus Pretty Much All of Us

Doctor Chaos

Guess what? You are scuuuuh-REWED!!! Let’s set the record straight right up front. 143 million people had their personal information stolen in the Equifax breach. The entire US population is 324 million. It is estimated there are 125 million households in the United States. The odds of your information being safe and sound is about […]. Data Breach data breach

Data 153

Cyber security demands change in approach

Computer Weekly

There needs to be a change in the way technology is designed and in attitudes to data security to ensure cyber safety, say industry experts

Why Enterprise Architecture is not delivering today

IT Toolbox

The moment we start searching for an Enterprise Architecture (EA)example we begin realising that something is fishy. There is hardly any. Yet, the media abounds in stories about the experiences we had in working towards achieving EA. Some claim success without ever showing an outcome as proof.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […]. Big Data CTO Cyber Security

Is It Time For CIOs To Start To Apply Logic To Salaries?

The Accidental Successful CIO

Should CIOs get involved in determining how much employees get paid? Image Credit: 401(K) 2012. Psst – would you like to know a secret? It turns out that at most companies, how much any given employee gets paid is determined more by art than science.

ScotRail to test ‘world’s fastest’ in-train Wi-Fi service

Computer Weekly

The train operator has teamed up with Cisco, Network Rail Telecoms and others to collaborate on an Innovate UK funded proof of concept for ultrafast Wi-Fi on board

If your Business Architecture framework does not return results follow this

IT Toolbox

Today there is no proper method to model your enterprise, no matter what they say. We haven't seen so far in the public domain models that illustrate the architecture of an enterprise so that you can understand what you would get as EA.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Want to Learn Big Data? These Courses Can Help

CTOvision

One of the best things about the explosion of different kinds of technology across the world, is the fact that many tech-related courses can be easily accessed. Whether you are looking to build your knowledge about big data or build a skill that could help you in your job, there are lots of ways to […]. Big Data CTO News Online Education technology

Course 124

4 data-driven ways to digitize your business

Datacponomy

In today’s digital landscape, customers expect you to deliver products and services in a fast and efficient manner. Heavyweights like Amazon and Google have set a bar in terms of operations, and they’ve set it high.

Google 113

Cyber security improves business opportunities and customer loyalty, survey shows

Computer Weekly

Businesses view cyber security as a way to provide new opportunities and improve customer loyalty, according to a Vodafone report

Survey 188

How marketing and communication industries are putting the major impact on big data?

IT Toolbox

This post looks at big data and the marketing/communication industries

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Time For A Fourth Law of Robotics

CTOvision

Science fiction fans recognize Asimov’s prescient thoughts on robot programming, captured in his three laws of robotics. In Asimov’s sci-fi world, robots were all programmed to protect their humans (the first law), to obey their humans (the second law) and to protect themselves (the third law). These laws laid the foundation for many fantastic, futuristic […]. CTO Cyber Security News Robots

Educational Content Gets More Viewing Time Than Cats on YouTube

Perficient - Digital Transformation

Google Think has a long but interesting blog post about, “ What Brands Can Learn from Educational Content on YouTube ” Here are some stats from the post: Educational content gets 4X viewing time than animal video content. Yes, that a statistic pushed directly towards digital marketers).

Ireland mulls datacentre planning review to help others avoid Apple-like build delays

Computer Weekly

Speaking at the inaugural Datacloud Ireland event, Irish state minister Patrick Breen outlined the government’s commitment to helping other datacentre operators avoid the planning problems Apple has encountered in Athenry

Apple 185

VoIP for a Connected Business

IT Toolbox

Voice over internet protocol (VoIP) has come a long way. Today, this technology allows companies to connect their communication's systems and integrate their computing systems as well, for seamless transactions. The newest VoIP technology offers a full communication's system powerful enough for most any business, so if your business is still using "old school" landlines, you should definitely rethink

VOIP 149

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

RFUN: The Recorded Future Annual Threat Intelligence Conference Oct 4-5 2017

CTOvision

The 6th Annual Recorded Future Threat Intelligence Conference will be held 4-5 Oct at the Newseum in Washington DC. This event should be of interest to any threat intelligence professional, specially those in the disciplines of cyber threat intelligence and business risk.

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.

UK organisations lose £217m a year due to lack of cloud skills

Computer Weekly

The cloud computing skills shortage in the UK is costing businesses hundreds of millions of pounds in lost revenue

Cloud 182

As a database choice, SAP HANA doesn't feature

IT Toolbox

Working with an integration drive provider it was interesting to see taht their analysis with a third party had SAP HANA as a no show in the top ten

SAP 143

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.