2017

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Managers like to talk about the power of data and analysis, and the opportunity it gives them to launch new products and reach new customers.

AI Is Not An Exception – Technology Has Always Taken Jobs

Forrester IT

Yes, AI will take jobs away from many workers - our relatives, friends, and neighbors. So too have all technologies created throughout human history. We invent things to make things easier and the impossible possible. The invention of the wheel made transport easier.

The impacts on storage and compliance from Blockchain, robots and IoT

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2017 on the impact on storage and compliance of biometric security, Blockchain, and robots in internet of things deployments

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Hybrid cloud? Private cloud? Public cloud? Multicloud? How to choose

David Linthicum

My article “ Don’t waste your time with a hybrid cloud ” has gotten many people seeing red, and I can understand why. Many enterprise IT shops, and most enterprise technology companies, have pledged allegiance to the hybrid cloud model. The intellectual dishonesty of cloud-architecture purists.

Cloud 219

More Trending

Switch’s Las Vegas Data Center Stronghold Reaches North of 2 Million Square Feet

Data Center Knowledge

Company launches massive, 40MW Las Vegas 10 data center Read More. Colocation North America Switch SuperNAPs

Deep learning – when should it be used?

Eric D. Brown

“When should I use deep learning?” ” I get asked that question constantly. The answer to this question is both complicated and simplistic at the same time.

8 Ways to Build a Better Business Bot

IT Toolbox

The increasing demand for these technological solutions is not a result of blind consumerism, nor is it a case of mindless obsession with AI

184
184

Step-by-Step: Deploy Windows Server 2016 Storage Spaces Direct (S2D) Cluster in Microsoft Azure

IT Pros Rock!

In this short video, we’ll walk through deploying a Windows Server 2016 Storage Spaces Direct (S2D) Cluster to a Microsoft Azure subscription using Azure Resource Manager (ARM) Templates. Storage Spaces Direct (S2D) on Microsoft Azure.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Getting in the Game: An Insider’s Guide to Breaking into the Venture Capital World

The Investing Edge

Venture capital remains an unfamiliar world to many – but it’s not for lack of interest. For those following or involved in the tech space, it’s almost impossible not to wonder what happens in the VC world, since so many emerging companies depend on VC dollars.

Heimdal PRO Review

Doctor Chaos

Heimdal PRO – the security solution for everyone The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber attacks.

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it.

Why You Are Getting Disrupted

Forrester IT

The overriding theme of every disruption story I've ever heard is that firms thought they had more time than they did. So, I've been pondering the why. We can see disruption happening all around us, but why is it so difficult to get out in front of it?

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Almost three-quarters of tech workers thinking of leaving UK after Brexit

Computer Weekly

The UK’s decision to leave the European Union has many tech workers in the UK considering a move elsewhere

219
219

What to do if your public cloud is hacked

David Linthicum

It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur. The best way to recover from an attack, aka a hack, is to remain calm and follow these simple rules. What is cloud computing? Everything you need to know now. Also: InfoWorld’s David Linthicum explains how to move into a cloud career from traditional IT. ].

Cloud 219

The Business Case For Digital Transformation

Forrester IT

Photo: Rebecca Minkoff. Digital transformation investments are ultimately about business survival through disruption. Such investments have a direct impact on customer expectations and go beyond the traditional ROI.

Report 226

A Cloud for the Artificial Mind: This Data Center is Designed for Deep Learning

Data Center Knowledge

As deep learning proliferates, companies search for the best infrastructure strategy Read More. Data Center Design Featured HPC

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

When it comes to big data, think these three words: analyze; contextualize; internalize

Eric D. Brown

If you don’t know, I’m a bit of a data nerd. I’ve been writing about big data, data science, machine learning and other ‘new’ stuff for years. I believe in data science and I believe in big data.

IP Phones are Hot - What's Up with That?

IT Toolbox

The market for phone systems has always been large, and any change will be closely followed given its connection to the broader communications ecosystem. Depending on who you talk to, desk phones are either obsolete or still have utility, and businesses need to know which scenario to support when making decisions. This comes into play whether you’re thinking about replacing or upgrading a

System 180

The Top Emerging Technologies For Digital Predators

Forrester IT

If you've been following my research, you know I like to divide the business world into three categories of company: Digital Predators successfully use emerging digital technologies to gain market share and/or displace traditional incumbent companies (e.g. Amazon, Lyft, Priceline, AirBnB, Netflix).

You need a cloud exit plan, even for AWS, Google, Microsoft, or IBM

David Linthicum

The cloud computing infrastructure market—IaaS, PaaS, and private hosting—continues to consolidate around the four major providers, as they maintain or even grow market share at the expense of smaller providers. AWS has continued to grow its revenues more rapidly than the overall market. In other words, AWS is the one to beat, and it will likely remain so for sometime.

IBM 219

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Cognitive Search Is The AI Version Of Enterprise Search

Forrester IT

Written by Emily Miller, Senior Research Associate. Stop Wasting Time. More than half (54%) of global information workers are interrupted from their work a few times or more per month to spend time looking for or trying to get access to information, insights, and answers.

Corporate IT: Help Managers Get More From Their Data

CEB IT

Data, and the fruitful analysis of it, offer incredible opportunities for companies to spot trends and take advantage of them before competitors do.

Are you cloud-savvy? Take this test to find out

David Linthicum

There are a few people who are truly savvy about cloud computing, but most are just posers. Here is a quick test to see if you’ve got the right stuff. What is cloud computing? Everything you need to know now. Also: InfoWorld’s David Linthicum explains how to move into a cloud career from traditional IT. ]. Do you understand that serverless does not actually mean it is serverless? If yes, give yourself 10 points. Do you believe “cloud formation” is actually a formation of rain clouds?

Most influential women in UK tech: The 2017 longlist

Computer Weekly

Every year, Computer Weekly asks the technology industry to nominate who it thinks are the most influential women in UK tech – here is the 2017 longlist

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.