Sat.May 12, 2018 - Fri.May 18, 2018

article thumbnail

When Comparing Blockchains, Decentralization Comes in Degrees

Dataconomy

Word clouds are an easy way to see which topics within any subject are most prominent. Generate a word cloud from the Reddit cryptocurrency forum or an array of blockchain whitepapers, and one will quickly see that a single term – “decentralized” – is the biggest and boldest. It’s no. The post When Comparing Blockchains, Decentralization Comes in Degrees appeared first on Dataconomy.

Cloud 63
article thumbnail

5 Recommendations on Implementing DevOps CI/CD Pipelines

Social, Agile and Transformation

CI/CD is one of the key devops practices because it enables teams to align on development practices and ensure there is a consistent, reliable, and automated way to deliver applications to multiple compute environment. If you're new to CI/CD, consider reading my InfoWorld posts on What is CI/CD and on getting started with CI/CD. What you'll see is that there are many steps to mature this.

Devops 155
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Welcome the New Project Manager!

Cloud Musings

According to CIO.com , the six traits of highly effective project managers are: Be a strategic business partner who can offer higher-level strategic leadership skills, not just technical management skills, provide significant advantages for organizations of all sizes. Encourage and recognize valuable contributions because a project leader’s effectiveness is strongly impacted by the contributions of others on his or her team.

article thumbnail

Not all Machine Learning is Artificial Intelligence

CTOvision

One of the downsides to the recent revival of popularity of Artificial Intelligence (AI) is that we see a lot of vendors, professional services firms, and end users jumping on the AI bandwagon labeling their technologies, products, service offerings, and projects as AI projects without necessarily that being the case. On the other hand, there […].

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Back2Basics: Why B2B Marketers Should Differentiate On Customer Experience

Forrester IT

“To survive in a world of ‘killer competition,’ you can either distinguish yourself from your competitors or offer the lowest price.” That’s the opinion of Jack Trout, co-author of Positioning, late president of Trout & Partners, father of the positioning concept In this month’s conversation with Johannesburg-based author Mark Eardley, we discuss why differentiation seriously […].

B2B 339
article thumbnail

What is the cost of bad data?

Eric D. Brown

How much is bad data costing you? It could be very little – or it could be a great deal. In this article I give an example of what the cost of bad data really is. A few days ago, I received a nice, well designed sales/marketing piece in the mail yesterday. In it, a local window company warned me of the dangers of old windows and the costs associated with them (higher energy costs, etc etc).

Data 170

More Trending

article thumbnail

Chinese Intelligence Operations In America

CTOvision

In part 2 of our Cyberwar series we’ll take a look at how the Chinese government utilizes the US’s open business environment to stage intelligence operations on American soil. Reconnaissance: While there has been a lot of recent press on Cambridge Analytica, the reality is there’s a giant industry that sells information on individuals who play […].

article thumbnail

The Data-Driven Marketing Revolution Will Be Televised

Forrester IT

I recently heard L.L. Bean’s chief sales and brand officer walk through the company’s brand refresh and corresponding marketing campaign. He showed some TV spots (most of which elicited laughs, like this winner), and I was reminded of the company’s expanded TV spend. Is TV dead? Hardly. But it is about to change more radically […].

Data 293
article thumbnail

CIOs Struggle To Keep Their Airlines In The Air

The Accidental Successful CIO

Airlines run on their IT systems and CIOs have to keep these running. Image Credit: Job Garcia. When we think about the person who has the CIO job, we think of someone who spends their time thinking about the importance of information technology including such things as cloud computing, building new data centers, and the arrival of the internet of things.

Airlines 138
article thumbnail

Cisco CEO trumpets Catalyst 9K advances, software business success

Network World

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent. But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in and has installed 2,700 of the big boxes this quarter bring the total to 5,800 since its introduction in 2017.

Software 140
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Iran’s Hacker Hierarchy Exposed: The Islamic Republic of Iran Makes Maximum Use of Contractors and Universities to Conduct Cyber Operations

CTOvision

On 9 May Levi Gundert, Sanil Chohan, and Greg Lesnewich of Recorded Future provided a detailed assessment on the nature of the cyber threat from Iran titled: Iran’s Hacker Hierarchy Exposed. This report was widely cited in the press and immediately raised the bar for quality in strategic cyber threat intelligence (I saw several other […].

Report 183
article thumbnail

ServiceNow Offers A Refreshing Take On Customer-Centricity With Their Customer Service Application

Forrester IT

I attended ServiceNow’s Knowledge18 conference, held in Las Vegas on May 7-10. It’s a well attended conference by 18,000 people who use one or more of their cloud service management, HR, security and customer service products which are all built on an enterprise-grade platform. At the conference, there was a lot of emotion spent talking […].

article thumbnail

WSUS Offline Tool Keep Windows Machines Updated

Anoop

WSUS Offline tool allows you to update lab machines running Windows 10, Server 2016 or Office 2016. You have to download Microsoft update only once from the internet and then use WSUS Offline Tool to install it on all the lab machines. Without it needing to have an internet connection. As I mentioned below, I […]. The post WSUS Offline Tool Keep Windows Machines Updated appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Windows 109
article thumbnail

The Enterprise of Thing's troubling lack of security

Network World

When it comes to security and manageability, Enterprise of Things (EoT) devices must have far more stringent requirements than consumer IoT devices, which often have virtually no built-in security. Indeed, enterprise use of consumer-grade IoT is highly risky. Making the matter even more urgent is the growing number of deployed EoT devices, which is expected to increase significantly over the next two to three years.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Don’t Get Distracted: The Equifax Breach Might Not The Big Issue Here

CTOvision

I am not happy about the massive Sep 2017 Equifax breach (or any other breach). All of us have a right to be angry with this leadership failure. But I worry, emotions like anger at this breach might be distracting us from bigger issues. Like do we want companies that aggregate data on U.S. citizens […].

Data 171
article thumbnail

All Brands Need A Full-Fledged Digital Commerce Strategy

Forrester IT

The internet has enabled brands to sell more of their products to an ever-expanding universe of shoppers, but digital distribution has also added complexity to the relationship between brands and retailers and other channel partners. All brands need to set parameters around the digital sales of their goods, regardless of the type of brand or […].

Strategy 276
article thumbnail

Setup Co-Management Cloud DP Azure Blob Storage

Anoop

A Cloud-based Distribution Point (CDP) is an SCCM DP that is hosted in Microsoft Azure. The application packages will be stored in Azure Blob storage. And it is a PaaS (Platform As A Service) solution from Microsoft SCCM. Security Patching of Azure PaaS solution servers is Microsoft’s responsibility. In this post, we will see how to […].

Storage 94
article thumbnail

Building A Collaborative Team

Cloud Musings

Recently, Harvard Business Review cited some insightful research into team behavior at 15 multinational companies. It found that although these teams tended to be large, virtual, diverse, and composed of highly educated specialists, those same four characteristics made it hard for teams to accomplish their goals. It also showed that complex team members were less likely—absent other influences—to share knowledge freely, learn from one another, shift workloads to break up bottlenecks, or help one

article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Facebook gives sensitive user information to advertisers, White House emails not protected, Discounted cyber insurance, Intel’s unethical conduct

CTOvision

These are some of the cybersecurity stories CTOvision is tracking. For others see our portal into all things cybersecurity and cyberwar. Facebook lets advertisers target users based on sensitive interests CTOvision has been tracking the Facebook data issues for quite a while and will continued to keep you in the loop (see The Ethics Of […].

article thumbnail

Who Should Care About Quantum Computing?

Forrester IT

The media has been all over quantum computing for a few years now, creating muddy waters for our clients as they try to understand this conceptually difficult emerging technology. I’ve been tracking quantum computers for about five years, but I’ve kept it off the research radar because I thought it was outside the “Should clients care?

Media 212
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

What is blockchain technology?

Network World

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google Assistant sounds eerily human, The White House forms AI committee, Carnegie Mellon launches AI degree

CTOvision

These are some of the hot topics we are tracking in the domain of Artificial Intelligence: Google Grapples With ‘Horrifying’ Reaction to Uncanny AI Tech We provided our thoughts on Google Duplex here (we think it is cool tech but needs bounding). This is consistent with how others seem to be viewing it. From Boomberg: […].

article thumbnail

B2B Marketers Need To Establish Process Rigor (Without The Mortis)

Forrester IT

I had the pleasure of collaborating with fellow Forrester analysts, Jessie Lui and Ryan Skinner, on the subject of marketing process – one of the lynchpin competencies in Forrester’s Marketing Innovation Playbook. As Jessie Lui explained in her blog introducing the series, we wrote three reports, each targeted at a beginner, intermediate or advanced maturity […].

B2B 210
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

What an Apple phishing attack looks like | Salted Hash Ep 32

Network World

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

Apple 64
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Clairvoyance™ An Early Warning System to Prevent Insider Threats

CTOvision

Editor's note: I have tracked the team and technologies of ICG Solutions for several years and reached out to ask that they provide CTOvision readers with an update. I believe their approaches are unique and worth investigating for multiple use cases, including use cases around protecting enterprises from damaging activity perpetrated by people in positions […].

System 152
article thumbnail

A Week In India: Three Lessons Learned

Forrester IT

I was lucky enough to spend a week in India earlier in the month and had some interesting conversations with services firms about how the expectations from their customers and the nature of their engagements are changing. Aside from experiencing the wonderful cities of Bangalore, Hyderabad, and Pune and sampling delicious samosas and paneer dishes, I also managed to have some great conversations with Forrester […].

196
196
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

Tech Talk: Prepping for GDPR

Network World

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules means. They offer insights on how companies can prepare – and what happens if they don't.

Company 62
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.