March, 2020

article thumbnail

Agile, DevOps, and COVID-19

Forrester IT

Every other Friday, we have a meeting of the “DevOps Theme Team,” a group of Forrester analysts focused on next generation IT management approaches. We talk about Agile and DevOps, of course, but also extend into related areas like portfolio management and security. Today (unsurprisingly) the topic du jour was COVID-19 and its impacts specifically […].

Devops 498
article thumbnail

Can AI Predict Global Pandemics Like The Coronavirus?

Forrester IT

If you want to use ML to predict sparse events, then you are going to need a whole lot more sparse events. Maybe we don’t have the direct data to predict the big events like the coronavirus outbreak, but we are very likely to have the data to predict one or more proxy events for an outbreak.

Data 397
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Getting the Most Out of Augmented Intelligence

Information Week

Looking for a way to help your organization work smarter and faster? Augmented intelligence is ready to provide added support, new insights, and a competitive edge.

148
148
article thumbnail

Technology and Leadership Lessons From Admiral Archie Clemins

CTOvision

I received word yesterday of the passing, far too young, of Archie Clemins. He passed after a two year battle with cancer. Upon hearing of this terribly sad news I was overcome with a rush of memories, some of which I want to capture here for their valuable leadership lessons. Including lessons in enterprise technology […].

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

CIO Must Pivot to a Safer-Smarter World

Social, Agile and Transformation

My boss used to say to me, "Isaac, read the tea leaves" to get a sense of what to present, share, and focus on depending on the business temperament. Just two weeks ago, I was keynoting to CIOs about investing in data governance, agile data practices, and changing the culture to prepare their organization for machine learning organizations. I reminded IT leaders that a competitive, digital.

Agile 252
article thumbnail

Configure User Driven Installation UDI Using ConfigMgr | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see how to Configure User Driven Installation UDI using ConfigMgr. In this guide, we will be covering how you can integrate MDT with Configuration Manager or MEMCM for creating a User Driven Installation (UDI) in SCCM OSD to provide the various deployment configuration information prior to performing the deployment for getting better end-user experience.

Windows 218

More Trending

article thumbnail

Four Phases Of The Coronavirus Pandemic

Forrester IT

In looking at the experiences of the Asian countries that entered the COVID-19 crisis in January, I believe that the pandemic will play out over four phases in the US. Phase One (Infection) ran from January through mid-March. In this period, there was no social distancing and no active management — the virus was passing […].

Social 544
article thumbnail

5G and IoT security: Why cybersecurity experts are sounding an alarm

Tech Republic Security

Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments.

Security 217
article thumbnail

Five Core Virtues For Data Science And Artificial Intelligence

CTOvision

Read Aaron Burciaga list the five core virtues for data science and artificial intelligence on Forbes : Virtues should be digitized. As we speed toward reliance on machines to process more and more information and provide cognitive support for all types of decision-making, we must consider ways to imbue automated processes, data machinations and recommender […].

article thumbnail

What is DevOps in 5 Minutes with @NYIke

Social, Agile and Transformation

Agile without DevOps can lead to conflict where agile teams want to deploy frequently but are slowed down by operations that preserve reliability over speed. DevOps without agile leads to teams focusing on systems, automation, and technology first and often at the detriment of capabilities and features required by customers and end-users. Transformation-driven organizations need both Agile.

Devops 223
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

SQL Query All SCCM Applications with no Deployments | ConfigMgr

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Hello, this is my first post here, I have more than 13 years of experience in ConfigMgr. I’m going to start a series of posts related SQL and WQL queries (SQL Query) to help SCCM admins. Related post – SCCM Management Insights – Healthy SCCM Infra Introduction When it comes to your SCCM Infrastructure cleanup […].

article thumbnail

Essential things to know about container networking

Network World

Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says

Network 210
article thumbnail

Responding To Coronavirus: A Playbook For Marketing And Communications

Forrester IT

Marketing and comms teams should take a leading role in supporting their organization’s response to the coronavirus. Read this post to understand the most critical actions to take now.

B2B 544
article thumbnail

How hackers are using COVID-19 fears to push new scams and malware

Tech Republic Security

Cybercriminals may be staying home, but they're not taking a break from phishing attempts and password hacking during the coronavirus outbreak.

Malware 212
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Coronavirus and the Cybersecurity Threat Landscape

CTOvision

Read Raef Meeuwisse explain the interesting link between the Coronavirus epidemic and the cybersecurity threat landscape on Infosec Magazine : Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions […].

Security 348
article thumbnail

The Role of AI in the Race for a Coronavirus Vaccine

Information Week

AI can spot patterns in data and make predictions, and the hope is these tools could identify drug prospects to test on humans within months.

Tools 188
article thumbnail

Intune Third-Party Patching Automation | PatchMyPC | Review

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. PatchMyPC released a solution for Intune third-party patching automation using Win32 application management. Let’s see what are features of this solution and how to set this up. Introduction One of the challenging questions during modern management discussion is third-party patching.

Windows 217
article thumbnail

How enterprise networking is changing with a work-at-home workforce

Network World

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns. What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.

Network 209
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Getting Digital CX Right Amid The Pandemic

Forrester IT

Emotion is the most important dimension of CX quality — even for digital. Our CX Index™ data proves it. That goes double given the uncertainty of the COVID-19 pandemic. Read three ways to ensure you're delivering emotionally relevant CX during this difficult time.

Data 502
article thumbnail

Cybercriminals now recycling standard phishing emails with coronavirus themes

Tech Republic Security

The latest malicious COVID-19 campaigns are repurposing conventional phishing emails with a coronavirus angle, says security trainer KnowBe4.

Security 213
article thumbnail

The AI Impact for IoT: Why It’s a Must

CTOvision

Read Alyse Falk take a look at the impact of artificial intelligence on the Internet of Things on Toolbox : The Internet of Things (IoT) has been developing very quickly in the recent few years, it is expected that more devices will join the network in the future. Artificial intelligence goes hand in hand with […].

article thumbnail

5 New Ways DevOps Will Leverage the Cloud

Information Week

It's impossible to know what the future will bring for DevOps in the cloud, but the areas highlighted here are sure to play a role.

Devops 187
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Setup ConfigMgr LAB Infrastructure in Azure IaaS | SCCM | MEMCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. You can easily setup a ConfigMgr LAB Infrastructure in Azure IaaS. In this post, I try to help you with setting up an SCCM LAB in Azure (Setup ConfigMgr LAB Infrastructure). You need to have a valid Azure subscription to build the EndPoint Manager LAB environment in Azure.

article thumbnail

As the networks evolve enterprises need to rethink network security

Network World

Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices.

Network 185
article thumbnail

PandemicEX: The Employee Experience of Coronavirus

Forrester IT

What is the employee experience of a pandemic? Companies are making plans, governments are tracking the spread of the virus, but who is listening to the voice of the employees? What impact are they experiencing because of the coronavirus, even if they aren’t exposed to it? Help us track and share that. TAKE THE 10-MIN […].

article thumbnail

Almost half of mobile malware are hidden apps

Tech Republic Security

Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android's accessibility features, according to a McAfee report.

Malware 205
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Cybersecurity Pros Really Think About Artificial Intelligence

CTOvision

The cybersecurity industry has been targeted by technology and business leaders as one of the top advanced use cases for artificial intelligence (AI) and machine learning (ML) in the enterprise today. According to the latest studies, AI technology in cybersecurity is poised to grow over 23% annually through the second half of the decade. That’ll […].

article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

What is Kubernetes? Using containers makes life simple. You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. Containers are amazing and helpful tools, benefitting our machines that make the world a better place, but that is only part of the picture.

Policies 159
article thumbnail

New ConfigMgr Primary Server Installation Step by Step Guide | SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this guide you shall learn how to install new Configuration Manager | Microsoft Endpoint Manager Configuration Manager | SCCM | ConfigMgr Primary Server. Let’s dive into New ConfigMgr Primary Server Installation Step by Step Guide (LAB setup). Prerequisites – ConfigMgr Primary Server Installation The following are the prerequisites of ConfigMgr|SCCM server installation.

Windows 213
article thumbnail

Cisco warns of five SD-WAN security weaknesses

Network World

Cisco has issued five warnings about security weaknesses in its SD-WAN offerings, three of them on the high-end of the vulnerability scale. The worst problem is with the command-line interface (CLI) of its SD-WAN Solution software where a weakness could let a local attacker inject arbitrary commands that are executed with root privileges, Cisco wrote.

WAN 183
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.