Sat.Sep 16, 2017 - Fri.Sep 22, 2017

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […]. Big Data CTO Cyber Security

More than one million new phishing sites created each month

Computer Weekly

Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Safer but not immune: Cloud lessons from the Equifax breach

David Linthicum

I’ve stopped covering breaches. First, because clouds are nowhere to be found among them. The focus of this blog is advice to enterprises that are moving, or have moved, to cloud computing.) Second, because it just seems like piling on a company that’s already in distress. However, breaches are on the minds of enterprises on the move, due to the latest breach at Equifax. [ The cloud storage security gap—and how to close it.

Seven Ways ERP Can Improve Risk Mitigation

IT Toolbox

Business is no friend of risk. While fortunes are won and new markets are conquered through calculated risk, firms nonetheless try to avoid it whenever possible. Risk represents lost revenue, disrupted partnerships, idle equipment, brand damage and a host of other effects that aren’t typically advantageous to corporations. So risk mitigation is

177
177

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Want to Learn Big Data? These Courses Can Help

CTOvision

One of the best things about the explosion of different kinds of technology across the world, is the fact that many tech-related courses can be easily accessed. Whether you are looking to build your knowledge about big data or build a skill that could help you in your job, there are lots of ways to […]. Big Data CTO News Online Education technology

Course 259

How to make the right technology choice

Computer Weekly

Organisations need digital technology, but how do you decide which is the best technology for you? The answer is not to make one big decision, but many small ones. Thinking about technology, behaviour and data will help you find the right answers

How To 194

More Trending

When ERP Meets Blockchain

IT Toolbox

We are at the start of a new enterprise resource planning (ERP) digital transformation with the introduction of blockchain technology, best known as a digital ledger (think distributed database) behind cryptocurrency. However, businesses are adopting blockchain as a trusted system through which to share records with partners. That’s where you’ll see blockchain enter the

Time For A Fourth Law of Robotics

CTOvision

Science fiction fans recognize Asimov’s prescient thoughts on robot programming, captured in his three laws of robotics. In Asimov’s sci-fi world, robots were all programmed to protect their humans (the first law), to obey their humans (the second law) and to protect themselves (the third law). These laws laid the foundation for many fantastic, futuristic […]. CTO Cyber Security News Robots

Cyber security demands change in approach

Computer Weekly

There needs to be a change in the way technology is designed and in attitudes to data security to ensure cyber safety, say industry experts

Data Quality – The most important data dimension?

Eric D. Brown

In a recent article I wrote over on CIO.com titled Want to Speed Up Your Digital Transformation Initiatives? Take a Look at Your Data , I discuss the importance of data quality and data management in an organization’s digital transformation efforts.

Data 169

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Why Enterprise Architecture is not delivering today

IT Toolbox

The moment we start searching for an Enterprise Architecture (EA)example we begin realising that something is fishy. There is hardly any. Yet, the media abounds in stories about the experiences we had in working towards achieving EA. Some claim success without ever showing an outcome as proof.

Last Chance To Register For The Data Event Of The Year: StrataData NYC 25-28 Sep 2017

CTOvision

The yearly Strata Data conference (formerly known as Hadoop World) will be 25-28 Sep 2017. This is the place to be to network with peers, learn lessons from others in the field, and track the status of the greatest technological solutions in the Big Data field. Topics include: AI, Big data & the Cloud, Data […]. Artificial Intelligence Big Data CTO Cyber Security News

ScotRail to test ‘world’s fastest’ in-train Wi-Fi service

Computer Weekly

The train operator has teamed up with Cisco, Network Rail Telecoms and others to collaborate on an Innovate UK funded proof of concept for ultrafast Wi-Fi on board

Equifax Versus Pretty Much All of Us

Doctor Chaos

Guess what? You are scuuuuh-REWED!!! Let’s set the record straight right up front. 143 million people had their personal information stolen in the Equifax breach. The entire US population is 324 million. It is estimated there are 125 million households in the United States. The odds of your information being safe and sound is about […]. Data Breach data breach

Data 153

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

If your Business Architecture framework does not return results follow this

IT Toolbox

Today there is no proper method to model your enterprise, no matter what they say. We haven't seen so far in the public domain models that illustrate the architecture of an enterprise so that you can understand what you would get as EA.

Four Common Password Practices You Might Want To Reconsider

CTOvision

Every few years, the National Institute of Standards and Technology revises its Digital Identity Guidelines, which include password best practices. The revisions are greeted with consternation by some because the guidance can run counter to long-cherished beliefs about what constitutes a good password and a good authentication system. NIST takes into consideration both the theoretical […]. CTO Cyber Security News

Cyber security improves business opportunities and customer loyalty, survey shows

Computer Weekly

Businesses view cyber security as a way to provide new opportunities and improve customer loyalty, according to a Vodafone report

Survey 188

Educational Content Gets More Viewing Time Than Cats on YouTube

Perficient - Digital Transformation

Google Think has a long but interesting blog post about, “ What Brands Can Learn from Educational Content on YouTube ” Here are some stats from the post: Educational content gets 4X viewing time than animal video content. Yes, that a statistic pushed directly towards digital marketers).

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

How marketing and communication industries are putting the major impact on big data?

IT Toolbox

This post looks at big data and the marketing/communication industries

RFUN: The Recorded Future Annual Threat Intelligence Conference Oct 4-5 2017

CTOvision

The 6th Annual Recorded Future Threat Intelligence Conference will be held 4-5 Oct at the Newseum in Washington DC. This event should be of interest to any threat intelligence professional, specially those in the disciplines of cyber threat intelligence and business risk.

Ireland mulls datacentre planning review to help others avoid Apple-like build delays

Computer Weekly

Speaking at the inaugural Datacloud Ireland event, Irish state minister Patrick Breen outlined the government’s commitment to helping other datacentre operators avoid the planning problems Apple has encountered in Athenry

Apple 185

Is It Time For CIOs To Start To Apply Logic To Salaries?

The Accidental Successful CIO

Should CIOs get involved in determining how much employees get paid? Image Credit: 401(K) 2012. Psst – would you like to know a secret? It turns out that at most companies, how much any given employee gets paid is determined more by art than science.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

VoIP for a Connected Business

IT Toolbox

Voice over internet protocol (VoIP) has come a long way. Today, this technology allows companies to connect their communication's systems and integrate their computing systems as well, for seamless transactions. The newest VoIP technology offers a full communication's system powerful enough for most any business, so if your business is still using "old school" landlines, you should definitely rethink

VOIP 149

Cyber at the Crossroads: A one day symposium on the critical cyber events of 1997 and 1998 that shaped our response to cyber war

CTOvision

There are many challenges in cybersecurity. Most challenges are due to adversaries that continue to innovate and create new means of breaking into systems. But other challenges come from leaders who do not learn the lessons from history. We have called that problem cyber threat amnesia, the observed tendency of any organization to forget the […]. Artificial Intelligence Big Data CTO Cyber Security Events Internet of Things News

UK organisations lose £217m a year due to lack of cloud skills

Computer Weekly

The cloud computing skills shortage in the UK is costing businesses hundreds of millions of pounds in lost revenue

Cloud 182

4 data-driven ways to digitize your business

Datacponomy

In today’s digital landscape, customers expect you to deliver products and services in a fast and efficient manner. Heavyweights like Amazon and Google have set a bar in terms of operations, and they’ve set it high.

Google 170

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

As a database choice, SAP HANA doesn't feature

IT Toolbox

Working with an integration drive provider it was interesting to see taht their analysis with a third party had SAP HANA as a no show in the top ten

SAP 143

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network. Here are six tips to betters secure your Wi-Fi network.

UAE banks share information to combat cyber threats

Computer Weekly

Banks in the United Arab Emirates will share information on cyber attacks through a platform instigated by the country’s banking federation

Using Contextual Signals With Mobile Users

Perficient - Digital Transformation

Mobile is an interesting beast. Users have a different experience for a variety of reasons. Not the least of which is the fact that you interact with mobile almost anywhere and definitely outside your home or work.

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.