December, 2017

article thumbnail

The American Way of War Is Based On Tech: Don’t Let It Be Our Downfall!

CTOvision

If you have not read it yet, I would like to bring your attention to the incredibly prescient science fiction short story by Arthur C. Clarke titled "Superiority" (available in the collection: The Collected Stories of Arthur C. Clarke). Written in 1951, this is such a great read because it captures some key, apparently enduring qualities […].

article thumbnail

Cyber security skills shortage can be addressed, says (ISC)2

Computer Weekly

The shortage of cyber security skills can be addressed, starting with training anyone who is unemployed, according to information security professional training and certification body (ISC)2

Security 226
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

We are Doing Agile, but are not Agile

Social, Agile and Transformation

Everyone, or at least almost everyone is doing some form of agile practices today. In fact, some leaders drive their digital transformation programs with leading agile to deliver customer facing applications. In a year of speaking at conferences, I did not meet anyone selling their waterfall, top-down project management practices as keys to their transformation programs.

Agile 182
article thumbnail

SCCM Intune Architecture Decision Making Tips and Sample Diagram

Anoop

High level (generalized) design decisions are discussed in this post. Most common design decision I have seen is discussed in the below paragraph. I must warn that this design decision won’t suit all scenarios. In this post, we will see SCCM Intune architecture decision making tips and sample diagram. The design decisions will be based […].

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

Keeping the company safe is the job of the CIO Image Credit: Bill Smith. I think that we can all agree that we are living in an increasingly dangerous world. As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

Banking 140
article thumbnail

Help Me Obi Wan

IT Toolbox

When old Ben Kenobi sat down with Luke Skywalker to listen to a plea for help from Princess Leia, the audience for the first Star Wars movie saw a hologram of Leia, delivering her message to the Jedi knight.

WAN 140

More Trending

article thumbnail

Businesses bracing for GDPR data deletion requests

Computer Weekly

Businesses are concerned that data deletion requests under the GDPR will have a significant or even crippling effect, with many unprepared to meet the expected demand

Data 231
article thumbnail

Developing a Strategy for Putting People First in Transformation Programs

Social, Agile and Transformation

If you are driving a transformation program, motivating and aligning people is a critical success factor Most leaders now understand how important it is to put people before process and technology when it comes to instrumenting large scale organizational change. That being said, many in technology leadership roles are not versed in methodologies to instrument change and some are not.

article thumbnail

The time to deal with IoT security is now

Network World

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.” But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula , global product management leader and security expert at SenecaGlobal , what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected device

Security 164
article thumbnail

Cheap Ways To Connect Data Centers

The Accidental Successful CIO

Data centers are only valuable if they can share data Image Credit: Sean Ellis. As the person with the CIO job at your company, you have the added responsibility of maintaining your company’s data centers. No matter if you have only one data center or hundreds of them, they are only as valuable as their ability to communicate with each other and the outside world.

article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Bitcoins are NOT Tulips

IT Toolbox

The basis and operations of Bitcoin have very different fundamentals than anything we have encountered in the financial industry ever before - thus trying to off-handedly relate it to some historical occurrence is mostly just foolish and ignorant.

Financial 140
article thumbnail

Recognizing Relevant Big Data and How to Use It

CTOvision

Big Data is everywhere you look, and we have seen how useful it can be. Among billions of terabytes of data gathered, there is a treasure of marketing data that businesses need to understand in order to know what is relevant and how to use it to get better business results. Businesses waste 40 percent […].

Big Data 253
article thumbnail

Enterprises urged to embrace public cloud after latest technology innovations

Computer Weekly

Due to the latest technology innovations in public cloud by the major providers, IDC has underlined the importance of this infrastructure

Cloud 253
article thumbnail

What I Learned about Digital Transformation from Speaking to Hundreds of Leaders

Social, Agile and Transformation

require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl":"mc.us14.list-manage.com","uuid":"786c41758ef1858a45a739f3e","lid":"8918f17d05"}) }) You learn a few things when you spend a chunk of the year on the road attending and speaking at conferences targeting CIOs, CTOs, CDOs (Chief Digital and Data Officers), CISOs and some CMOs. I’ve attended and spoken at over twenty events.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Can IoT help make the enterprise more secure?

Network World

It’s no secret that the rise of the Internet of Things (IoT) presents massive new security challenges. Heck, I’ve written about the issue here more than once. But one company claims that enterprise IoT also shows promise for addressing key security issues. Also on Network World: Is the U.S. finally about to take IoT security seriously? and The time to deal with IoT security is now.

article thumbnail

List of SCCM CB DMP Downloader State Messages

Anoop

SCCM state messages help to troubleshoot updates and servicing related issues. DMP downloader is the components which download source files of SCCM CB updates. Following are the list of List of SCCM CB DMP Downloader State Messages. What is State Message? SCCM State messages are sent using a messaging system that is built into SCCM […]. The post List of SCCM CB DMP Downloader State Messages appeared first on Anoops.

System 137
article thumbnail

Punch-Up Your Sales Process with CRM

IT Toolbox

CRM can do more than track sales calls. You can use the features in CRM to expand your sales efforts, increase the bottom line and improve morale among your employees. Automate Emails. Dealing with emails is one of the major tasks sales staffs have to perform.

140
140
article thumbnail

Are You Dedicating Unnecessary Funding to IT?

CTOvision

You may view your company’s IT department as indispensable, especially as the workers within it troubleshoot issues with slow page loading times for a web browser, keep employees’ computers free from viruses and protect your network for interior or exterior threats. However, you also might have unnecessary expenditures associated with the IT department.

Network 215
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

How to futureproof your career as a CIO

Computer Weekly

Many CIOs have yet to earn the right to be on the board. How can IT leaders upgrade their business acumen, to benefit their own careers and the health of their employer?

How To 219
article thumbnail

'Paris s'éveille'! Introducing the AWS EU (Paris) Region

All Things Distributed

Today, I'm happy to announce that the AWS EU (Paris) Region, our 18th technology infrastructure Region globally, is now generally available for use by customers worldwide. With this launch, AWS now provides 49 Availability Zones, with another 12 Availability Zones and four Regions in Bahrain, Hong Kong, Sweden, and a second AWS GovCloud (US) Region expected to come online by early 2019.

Training 112
article thumbnail

IDG Contributor Network: Leveraging reconfigurable computing for smarter cybersecurity

Network World

The reality for security teams today is that they are facing challenges on multiple fronts. The number of security breaches is increasing, which means the number of security alerts to be examined each day is increasing. The attacks are becoming more sophisticated and multi-dimensional. The number of cybersecurity solutions available continues to grow, which requires time and effort to understand.

Network 133
article thumbnail

2017 SCCM ConfigMgr Intune Community Around Me

Anoop

As David James mentioned in his tweet here, the summery of 2017 for SCCM is 3 production releases (SCCM CB 1702, 1706, and 1710).12 Tech Preview releases of SCCM CB. 100s of new features, 14k code check-ins + bug fixes and now managing >100 million endpoints. In this post, we will see more about 2017 SCCM […]. The post 2017 SCCM ConfigMgr Intune Community Around Me appeared first on Anoops.

124
124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Remembering IBM LAN Server Part 2

IT Toolbox

Notwithstanding its heritage, LAN Server 4.0 would incorporate some relatively strong enterprise-wide services, including support for the Open Software Foundation's (OSF) Distributed Computing Environment (DCE), a graphical user interface, and extended peer services.

LAN 133
article thumbnail

The Three Big Trends in 2018 That Will Matter When Doing Business in Europe

CTOvision

Having a crystal ball that predicts future trends would be immensely helpful for American tech CEOs to plot the optimum course and avoid speed bumps when it comes to doing business next year. So consider this a start in that direction by identifying three developments that will be a challenge unless companies are aware and […].

Trends 185
article thumbnail

DevOps in the public sector: Assessing the challenges and the benefits

Computer Weekly

Public sector IT leaders trying to transform the way their organisation works using DevOps talk about the challenges they face

Devops 256
article thumbnail

5 Ways live streaming is going to change the future of education

Kitaboo

Did you know more than 80% of internet and mobile audiences watched more live-videos in 2016 as compared to 2015, and streaming video accounts for more than two-thirds of all internet traffic and is expected to jump to 82% by 2020? So, what’s the future of education? The answer is, dynamic and ever-changing, as live streaming will be an integral part of it.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DDI is a critical component of IoT success

Network World

The Internet of Things (IoT) era has finally arrived, and businesses need to be prepared for a world where everything is connected. I’m an analyst so I’ll support my proclamation that IoT is here with data: There are currently 25 billion internet-connected devices, and that will double by 2020 and then grow to 80 billion by 2025. ZK Research. However, there’s a more basic way of understanding where we are in the adoption cycle: IoT has become the norm, not the exception, according to companies I

Internet 127
article thumbnail

Bangalore IT Pro User Group Event for SCCM Intune Professional

Anoop

We are arranging an in-person event in Bangalore. This is a full day event for SCCM and Intune professionals. Bangalore IT Pro event is scheduled for 16th Dec 2017. There are a couple of Azure AD, Azure with Terraform sessions. In this post, we will see “Bangalore IT Pro User Group Event for SCCM Intune […]. The post Bangalore IT Pro User Group Event for SCCM Intune Professional appeared first on Anoops.

Groups 109
article thumbnail

Why You Need a Strategy to Drive UC Adoption

IT Toolbox

This is a topic I address often, as it’s easy to think of Unified Communications as a technology purchase. That may be true, but it only addresses one part of the UC story. There is a great deal to consider on both sides of the purchase – planning for UC and then living with UC once it’s deployed.

article thumbnail

How Taking the Time to Verify Your Network Could Save You Millions

CTOvision

As our reliance on technology increases, so does the need for modern systems to support these devices and experiences. This has sparked a shift to services that deliver always-on, connected and remote-based content. Software-as-a-service has become increasingly reliable and necessary to keep up with modern trends. All of this, of course, relies on a solid, […].

Network 184
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.