A “Powerful” Board: How to Exercise “Supervisory” Power Effectively

Future of CIO

A “powerful” board can exercise supervisory power and co-determine of which powers are retained by the governing body and which are delegated to management, along with constraints that may apply. The “sovereign” power: Generally, the shareholders of the company exercise this third power.

Security Think Tank: Patching is vital and essentially a risk management exercise

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive

British navy sends robots to sea in military exercise

Network World

The Royal Navy is testing just how much robot craft can do by themselves in military exercises off the British coast. Operation Unmanned Warrior 16 is a chance for allied nations and the defense industry to show off their latest maritime autonomous systems, as part of a broader military exercise called Joint Warrior.

Security Think Tank: How to maximise the value or red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More. Amazon Cloud Computing Downtime

Europol hosts simulated cyber attack on retail sector

Computer Weekly

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

Retail 189

Twitter adds USB key verification, Florida names first Crypto Officer, Comcast’s data breach, WPA3 is finally here and why rebranding cybersecurity is necessary

CTOvision

Twitter said that the above exercise was a part of a two-factor authentication process and will protect Twitter accounts from being hacked. [.]. Twitter adds support for login verification with a USB key Twitter has taken a step towards providing better security by adding support for login verification through physical USB security keys, such as YubiKey.

EU-backed fund to encourage data-sharing between startups and enterprises launches

Computer Weekly

Three-year project seeks to encourage enterprises to embark on information-sharing exercises with startups and SMEs to bolster data-led innovation

“Right-Sizing” The Data Center: A Fool’s Errand?

Data Center Knowledge

For many, the quest to right-size turns into an exercise akin to a dog chasing its tail. So, we constantly ask ourselves the question: Is right-sizing a fool’s errand? Read More. Data Center Design Featured Resources

TIBER-EU Framework Offers An Opportunity To Improve FinServ Cyber Resilience

Forrester IT

In short, there is a new voluntary framework for threat intelligence-led red-teaming exercises that has been published by the European Central Bank (the Central Bank for eurozone economies). The European Central Bank yesterday launched its TIBER-EU (Threat Intelligence-Based Ethical Red Teaming for the European Union) framework for financial institutions regulated within the EU.

Choosing the Right CRM for SMB

IT Toolbox

Selecting the right CRM system for a small or medium size business is essentially an exercise in reduction. You need to decide which features are important to you and limit yourself accordingly. The modern CRM landscape is crowded with CRM systems with various prices and capabilities. Winnowing down the field is an important part of choosing the right system.

SMB 122

Understanding Collaboration - Disrupt, or be Disrupted

IT Toolbox

This could well be a futile exercise since the scope keeps expanding with everyThere are many scenarios to consider for collaboration, and I’ve been writing about this lately, both for internal use cases among workers, and external use cases to support end customers. A big challenge facing decision-makers is building a fence around collaboration so everyone understands what’s involved.

Simplicity is a strategy that works.

Forrester IT

This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management.

Using webinar metrics to blast CRM data to the next level

IT Toolbox

Frequently, that vital information is distilled into a simple e-mail-harvesting exercise, with customer details folded into an automated email routine. Webinars are becoming a highly popular component of the digital marketing tool box, but harnessing the rich customer data they yield is still a missed opportunity. Yet, there are more effective outcomes available.

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside

Do you collaborate more than 25%?

IT Toolbox

I've been wanting to get back into riding my bike as a way to break up my day, get a little exercise andIt's Sunday night and I just finished reviewing the week ahead at work. I have no unread emails, but I also have no unencumbered lunches. Just about every day something is going on that pinches into what should be my lunch hour.

Growing in a Down Economy

SPF13

This exercise of fat trimming should be an ongoing exercise, quarterly. Trimming the Fat I am all in favor of trimming the fat. Every company has inefficiencies and employees that aren’t adding value to the company. If a company larger than 200 employees is firing 10% or more of their employees they have a serious management issue. No well run company can operate efficiently with 10%+ of “fat”, and no company can expect to grow while letting go 10%+ of their staff

Paxata: Adaptive Data Preparation

CTOvision

The company’s technology dramatically reduces the most painful and manual steps of any analytic exercise, turning raw data into ready data for analytics, and empowering analysts to drive greater value for the business.

Corporate IT: 5 Mistakes to Avoid in Your 2017 Strategic Plan

CEB IT

” Too often, the strategic planning exercise is limited to a tightly bounded vacuum known as the leadership offsite. Done well, IT strategic planning does two things.

IT Enterprise Architecture: How to Become a Digital Strategy Consultant to the Business

CEB IT

EA’s goal in this exercise is to document a wide range of possibilities, rather than trying to pick which assumptions are most likely to occur (see chart 1). In this exercise, EA specifically avoids grouping the most popular assumptions into a single scenario.

Some server storage I/O benchmark tools, workload scripts and examples

IT Toolbox

There are various tools and workloads for server I/O benchmark testing, validation and exercising different storage devices (or systems and appliances) such as Non-Volatile Memory (NVM This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results.

Digital Risk of Data Increases When Employees Leave

CTOvision

Ultimately, the company may decide to pursue legal action against the former employee, a costly and unwanted exercise for everyone involved. Crystal Lister.

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Output interpretation – Just like any other type of modeling exercise, how you use and interpret the model can be a huge risk. Similar approaches should be taken in other model building exercises.

Corporate IT: Why Your IT Scorecard Isn’t Impressing People

CEB IT

This refocusing exercise doesn’t mean that IT teams need to spend time and money identifying and tracking new metrics, but rather creating composite metrics that measure outcomes, instead of inputs.

To unlock phones, feds demand all occupants surrender fingerprints

Network World

investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints. In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Those fingerprints were crucial to unlocking the smartphones, the Department of Justice argued.

Top Local Apps - Get a Great Workout Anywhere with Bodeefit!

IT Pros Rock!

Bodeefit – Step-by-Step Workouts with Prescriptive Exercises and Videos. It seems like I’m always traveling in my current role, and getting to the gym for a real workout is always a challenge.

Hotels 136

Hortonworks DataFlow 1.2 Released

CTOvision

Microsoft Band Screen: On or Off During Exercise? Katie Kennedy. Last month, Hortonworks announced their release of their Hortonworks DataFlow 1.2 , a data-source agnostic, real time data collection and dataflow management platform that makes data movement fast, easy and secure. HDF 1.2

Step-by-Step: Deploying Windows 8 Apps with System Center 2012.

IT Pros Rock!

After building your lab environment, follow these steps to configure boundaries, boundary groups and the Application Catalog site system roles prior to beginning the exercises below. As part of this process, we’ll organize the steps into the following exercises: Exercise 1: Create Application for an internal Windows 8 app package (.appx Exercise 2: Create Application for a published Windows Store app ( deep link on Windows Store ). Sign in. IT Pros ROCK!

System 125

Transformative Training for Hybrid Cloud

Cloud Musings

In comparison with other cloud computing certifications, the NCTA CloudMASTER® certification demonstrates real-world knowledge through practical activities and lab exercises, allowing students to learn and showcase a complete portfolio of skills on a wide range of common cloud technologies.

Social Media and Public Employees - Part 1 - CIO Musings

CIO Musings

CIO Musings - Life as a Public Sector CIO. A blog about things that interest me as a Chief Information Officer (CIO) working for a local government. Primarily focused on technology, leadership and some of my recreational pursuits. Follow me on twitter at @BarryCondrey Enjoy! Sunday, May 12, 2013.

Media 130

Digital Transformation Driven by ITaaS

Cloud Musings

To avoid vendor lock-in, this service can also be exercised across multiple IT service providers. Photo credit: Shutterstock When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment.

IBM 198

Step-By-Step: Getting Started with Azure Machine Learning

CanITPro

While we are unable to detail the exact process undertaken by Toyota Canada and Microsoft as completed during the Hackfest itself, this post will walk through steps accomplishing a similar exercise to enable further understanding of the Machine Learning process.

DevOps/OpsDev: The Name Debate is Over

Perficient - Digital Transformation

Any DevOps exercise should consider both halves in a single effort. DevOps was first introduced in 2008 as an extension of proper development, but shortly thereafter, “OpsDev” was on many of our minds.