2017

CIOs Start To Become More Important

The Accidental Successful CIO

Companies are starting to realize the value of their CIOs Image Credit: las – initially. The importance of a CIO can be measured in a number of different ways. One such way is how often the CEO seeks out the CIO for consultation.

Budget 296

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially.

Mobile 241

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security.

Why You Are Getting Disrupted

Forrester IT

The overriding theme of every disruption story I've ever heard is that firms thought they had more time than they did. So, I've been pondering the why. We can see disruption happening all around us, but why is it so difficult to get out in front of it?

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

The impacts on storage and compliance from Blockchain, robots and IoT

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2017 on the impact on storage and compliance of biometric security, Blockchain, and robots in internet of things deployments

More Trending

What to do if your public cloud is hacked

David Linthicum

It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur. The best way to recover from an attack, aka a hack, is to remain calm and follow these simple rules. What is cloud computing? Everything you need to know now. Also: InfoWorld’s David Linthicum explains how to move into a cloud career from traditional IT. ].

Cloud 193

Corporate IT: How to Be a More Attractive Employer Than a Startup

CEB IT

It’s getting harder and harder for large corporate IT teams to attract qualified candidates to take up a job with them.

How To 195

Switch’s Las Vegas Data Center Stronghold Reaches North of 2 Million Square Feet

Data Center Knowledge

Company launches massive, 40MW Las Vegas 10 data center Read More. Colocation North America Switch SuperNAPs

Deep learning – when should it be used?

Eric D. Brown

“When should I use deep learning?” ” I get asked that question constantly. The answer to this question is both complicated and simplistic at the same time.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

8 Ways to Build a Better Business Bot

IT Toolbox

The increasing demand for these technological solutions is not a result of blind consumerism, nor is it a case of mindless obsession with AI

184
184

Step-by-Step: Deploy Windows Server 2016 Storage Spaces Direct (S2D) Cluster in Microsoft Azure

IT Pros Rock!

In this short video, we’ll walk through deploying a Windows Server 2016 Storage Spaces Direct (S2D) Cluster to a Microsoft Azure subscription using Azure Resource Manager (ARM) Templates. Storage Spaces Direct (S2D) on Microsoft Azure.

21.co Pioneers A New Way To Communicate: Recommend setting up your profile now

CTOvision

Bob Gourley. 21.co is known as the company making Bitcoin useful for developers. They provide capabilities like the 21 Bitcoin Computer which gives developers everything they need to build Bitcoin enabled apps.

Heimdal PRO Review

Doctor Chaos

Heimdal PRO – the security solution for everyone The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber attacks.

The Six Principles of Persuasion

Speaker: Michael Carducci, Tech Leader, VUE Expert, and Full Stack Developer

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

The Business Case For Digital Transformation

Forrester IT

Photo: Rebecca Minkoff. Digital transformation investments are ultimately about business survival through disruption. Such investments have a direct impact on customer expectations and go beyond the traditional ROI.

Report 225

Almost three-quarters of tech workers thinking of leaving UK after Brexit

Computer Weekly

The UK’s decision to leave the European Union has many tech workers in the UK considering a move elsewhere

219
219

Crisis Response Using Cloud Computing

Cloud Musings

Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver.

Cloud 198

The latest cyber attacks show why the cloud is safer

David Linthicum

Computer systems from the Ukraine to the United States were affected last week by the Petya cyber attack. It’s similar to the recent WannaCry ransomware attack last month. The WannaCry ransomware took advantage of vulnerabilities in the older versions of Windows that allowed the infection to spread. All someone needed to do was click a malicious link and—bang!—they they were infected. That is, if they hadn’t installed the patches and updates.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

Managers like to talk about the power of data and analysis, and the opportunity it gives them to launch new products and reach new customers.

A Cloud for the Artificial Mind: This Data Center is Designed for Deep Learning

Data Center Knowledge

As deep learning proliferates, companies search for the best infrastructure strategy Read More. Data Center Design Featured HPC

Should CIOs Learn How To Forgive?

The Accidental Successful CIO

To forgive is divine, but is this something that CIOs should be doing? Image Credit: timlewisnm. Ah, the process of getting older. Each one of us is doing this every day and, with a little luck, we really don’t spent all that much time thinking about it.

How To 177

IP Phones are Hot - What's Up with That?

IT Toolbox

The market for phone systems has always been large, and any change will be closely followed given its connection to the broader communications ecosystem. Depending on who you talk to, desk phones are either obsolete or still have utility, and businesses need to know which scenario to support when making decisions. This comes into play whether you’re thinking about replacing or upgrading a

System 180

Getting in the Game: An Insider’s Guide to Breaking into the Venture Capital World

The Investing Edge

Venture capital remains an unfamiliar world to many – but it’s not for lack of interest. For those following or involved in the tech space, it’s almost impossible not to wonder what happens in the VC world, since so many emerging companies depend on VC dollars.

3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

CTOvision

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […]. CTO Cyber Security News Cognitio

Trends 230

When it comes to big data, think these three words: analyze; contextualize; internalize

Eric D. Brown

If you don’t know, I’m a bit of a data nerd. I’ve been writing about big data, data science, machine learning and other ‘new’ stuff for years. I believe in data science and I believe in big data.

What Exactly The Heck Are Prescriptive Analytics?

Forrester IT

Prescriptive analytics is about using data and analytics to improve decisions and therefore the effectiveness of actions. Isn't that what all analytics should be about?

Most influential women in UK tech: The 2017 longlist

Computer Weekly

Every year, Computer Weekly asks the technology industry to nominate who it thinks are the most influential women in UK tech – here is the 2017 longlist

Digital Transformation Driven by ITaaS

Cloud Musings

Photo credit: Shutterstock When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment.

IBM 198