Sat.Apr 07, 2018 - Fri.Apr 13, 2018

article thumbnail

Time for Transformational Cybersecurity Part II

CTOvision

The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void. It also discussed root-of-trust encrypted metavisor technology that protects applications and data operating in the cloud. […].

Malware 179
article thumbnail

Automation, AI, And Robotics Are Critical CIO Targets

Forrester IT

We’ve just released a major new report, The CIO’s Guide To Automation, AI, And Robotics. We find that, to stay ahead, CIOs, CTOs, CDOs, and other executives integrating leading-edge technologies into their companies’ operations and business models must turn their attention to automation technologies, including intelligent machines, robotic process automation (RPA) bots, artificial intelligence, and physical […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Can CIOs Learn From The Evolution Of Smartphones?

The Accidental Successful CIO

Smartphones have matured and CIOs can learn from this Image Credit: Nokia Connect. CIOs exist in order to help their companies do more things and do them faster. The person in the CIO position has the responsibility of marshaling all of the company’s IT talent and using the importance of information technology to work on projects that are going to help the company to do a better job of competing.

article thumbnail

Changing the calculus of containers in the cloud

All Things Distributed

I wrote to you over two years ago about what happens under the hood of Amazon ECS. Last year at re:Invent, we launched AWS Fargate , and today, I want to explore how Fargate fundamentally changes the landscape of container technology. I spend a lot of time talking to our customers and leaders at Amazon about innovation. One of the things I've noticed is that ideas and technologies which dramatically change the way we do things are rarely new.

Cloud 148
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Assessments on AWS Snowball and AWS Snowball Edge Post Confirmed By User Feedback

CTOvision

In March I opined on the remarkable engineering in AWS Snowball and AWS Smowball Edge. There are many trends in tech now and some of them, like the specific capabilities in this cloud computing domain, can seem like they are slow to develop till they are right on you. This is one of those times […].

Trends 186
article thumbnail

A Social Take On Social Selling

Forrester IT

Social selling is one of my B2B Marketing and Sales team’s top inquiry topics. We’ve also helped numerous clients plan and execute effective social selling programs. Given this and the recent report that Mary Shea just published, New Tech: B2B Social Selling Tools, Q1 2018, I thought now would be a great time to touch […].

Social 331

More Trending

article thumbnail

IBM tweaks its z14 mainframe to make it a better physical fit for the data center

Network World

IBM is widening its mainframe range with some narrower models – ZR1 and Rockhopper II – that are skinny enough to fit in a standard 19-inch rack, which will answer criticisms of potential customers that the hulking z14 introduced in July 2017 too big to fit in their data centers (see photo above). In addition to new, smaller, packaging for its z14 hardware, IBM is also introducing Secure Service Container technology.

article thumbnail

Will There Be Another AI Winter?

CTOvision

Artificial Intelligence (AI) is an area that’s getting a lot of attention lately. Many companies are thinking about how they can incorporate AI products and services into their company, and how AI can help enhance their workforce. There is a lot of hype right now, but is this technology around to stay or is it […].

article thumbnail

What Question Must Your Messaging Answer?

Forrester IT

Account-based marketing (ABM), demand generation, social selling, channel marketing, go-to-market strategy, marketing mix, campaign execution and almost anything that today’s B2B marketer worries about hinges on having relevant content that engages your buyers. My colleague, Ryan Skinner, defines content marketing as: A marketing strategy where brands create interest, relevance, and relationships with customers by producing, […].

B2B 287
article thumbnail

Microsoft Intune Training Course Intune Certification

Anoop

Microsoft Intune training course from Microsoft learning is free of cost. But if you need a verified certificate then, you need to pay around USD 99$. Microsoft Course Number INF260x – Microsoft Azure Security Services includes one module on Microsoft Intune device management solution. If this is your first edX course, I would recommend you check […].

Course 126
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Inno Setup PowerShell Uninstaller

Mick's IT Blog

I recently encountered an application that uses the Inno Setup installer. Part of my process when I deploy an application is to also create an uninstaller. While creating the uninstaller, I decided to make a function for uninstalling Inno Setup installed applications. The way I have written this function is that you need to use the exact name as displayed in the add/remove programs for the AppName parameter.

article thumbnail

Looking for Blockchain Innovation During RSA 2018

CTOvision

Dear readers, I'll be in the San Fransisco area during RSA. I'm on a mission to learn more about real world solutions and companies that leverage blockchain and will be using my trip to focus on that. Of course I'll also spend time doing other things I love like spending a bit of time on […].

Course 157
article thumbnail

Apple’s Brand Playbook Unlocked

Forrester IT

Do you want to be like Apple? In 2010, Apple ranked as the 17th most valuable brand in the world. Just three years later, it had garnered the top spot and has remained there. Since 2010, Apple’s brand value has increased at a compound annual growth rate of 36%, while the entire “brandscape” has grown […].

Apple 287
article thumbnail

One in five serverless apps has a critical security vulnerability

Network World

Serverless computing is an emerging trend that is likely to explode in popularity this year. It takes the idea of a smaller server footprint to the next level. First, there were virtual machines, which ran a whole instance of an operating system. Then they were shrunk to containers, which only loaded the bare minimum of the OS required to run the app.

article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Speaking Global Azure Bootcamp 2018 Bangalore

Anoop

Bangalore Microsoft MVPs are organizing Global Azure Bootcamp 2018 (GAB 2018) Bangalore edition with the help of open source communities. This event scheduled for 21st April 2018. I will be co-presenting on modern management and co-management topics with Vimal and Rajul. Registration for the event is open, and you can go ahead and register for […].

article thumbnail

Steps to Take to Beat the Insider Threat in 2018

CTOvision

Hackers get the headlines, but a data breach is more likely to originate inside your own office walls. Errors, negligence and malicious intent by employees are the leading causes of security incidents but remain the least reported. Why do employees pose so much risk? The list of reasons is long: busy schedules that lead to sloppiness […].

Security 155
article thumbnail

Two Important Video Questions Answered

Forrester IT

Brands know that video resonates with their buyers, but if you’re new to producing video, the format can be daunting. There’s a great opportunity for B2B marketers to use video to help distill and showcase their company’s big ideas. In our report A Blueprint For Successful B2B Video Marketing we outline 3 steps that marketers […].

Video 261
article thumbnail

Wasabi Hot Innovations Tour: How "Hot Cloud Storage" Changes Everything!

Cloud Musings

Digital storage requirements are growing exponentially. Budgets simply can’t keep up and existing Federal Data Center Consolidation Initiative (FDCCI), “Cloud First” Policy, Federal IT Acquisition Reform Act (FITARA) and Modernizing Government Technology (MGT) Act challenges aren’t going away. On top of all that, e-discovery, data privacy and digital forensics have made rapid data access and immutability absolute must haves.

Storage 87
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SCCM CB 1803 Review of Upgrade and Features

Anoop

SCCM CB 1803 preview version is released a few weeks back. I was busy with SCCM CB 1802 production posts so I couldn’t get time to install SCCM 1803 preview version. In this post, we will see the review of my SCCM CB 1803 upgrade experience. What is SCCM CB Preview Version If you have not […]. The post SCCM CB 1803 Review of Upgrade and Features appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

article thumbnail

The Cloud Security Alliance Hosts 5th Annual Federal Summit on 15 May 2018

CTOvision

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. It is a member-driven organization. The Cloud Security Alliance is led by […].

Cloud 151
article thumbnail

Zuckerberg vs. US Senate, Round 1: Reasonable Expectations

Forrester IT

“…would not reasonably expect.” Those four words form the basis of a fair and ethical data practice. Today, as he was questioned by the Senate Judiciary and Commerce Committees, Mark Zuckerberg made it clear that, even now, he isn’t concerned with what users might reasonably expect him to do with their data, as long […].

Data 244
article thumbnail

The Role of Big Data and Mobile Apps in Healthcare

Dataconomy

For those with chronic health issues or life-threatening illnesses, the line of specialists and procedures can seem endless. Moreover, each time a new practitioner or clinic is visited, the patient is required to fill in long and complicated forms – especially if a medical insurance is involved. It’s now clear. The post The Role of Big Data and Mobile Apps in Healthcare appeared first on Dataconomy.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NAKIVO Backup & Replication Beta Release v7.4 Features

Anoop

NAKIVO backup and replication v 7.4 beta version released recently. I tried their production version of the software, and it was a pleasant experience to install and use for Hyper-V labs. More details – Video Walk Through of NAKIVO Hyper-V Backup. All Beta program participants who fulfill the program requirements can receive an Amazon gift card. […].

Backup 68
article thumbnail

SitScape and AECOM announce five-year strategic partnership

CTOvision

As an advisor to SitScape I've been in a position to watch the capabilities of that firm evolve over time, from their beginnings as an incredibly functional and fast integrator of visualizations to what is now an incredible provider of enterprise grade collaborative user-defined visualization and solutions. It has been great watching them grow in […].

article thumbnail

The CIAM Implications Of The Facebook/Cambridge Analytica Scandal

Forrester IT

My fellow Forrester analysts have been covering the data and privacy implications of the Facebook/Cambridge Analytica scandal in several excellent blog posts, such as this one and this from yesterday but this scandal has highlighted some CIAM-specific implications that CISOs and CMOs need to assess, particularly around the future role of social login.

Social 235
article thumbnail

How GDPR Will Affect Data Science

Dataconomy

By now, any data professional worth his or her salt should know about the General Data Protection Regulation (GDPR). This EU law, set to be enforced in May 2018, has sent shockwaves (and a fair bit of fear) across many industries and professions. But, perhaps the one area set to. The post How GDPR Will Affect Data Science appeared first on Dataconomy.

Data 77
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Review: Lenovo ThinkPad X1 Carbon

Scott Lowe

As part of the transition into my new role at Heptio (see here for more information), I had to select a new corporate laptop. Given that my last attempt at running Linux full-time was thwarted due primarily to work-specific collaboration issues that would no longer apply (see here ), and given that other members of my team (the Field Engineering team) are also running Linux full-time, I thought I’d give it another go.

Dell 60
article thumbnail

In Defense Of 3% Of Google’s Employees And Their (And Everyone’s) Right To Have Opinions

CTOvision

On 4 April the New York Times and then many others reported that thousands of Google employees signed an open letter asking Google to stop working on an Artificial Intelligence project with the US military. The letter, addressed to Google's chief executive Sundar Pichai, sought to cancel any involvement anyone from Google might have with […].

article thumbnail

SAP’s Customers’ CIOs Face Some Urgent Crucial Decisions

Forrester IT

The CIOs of SAP customers need to pay close attention to the vendor’s announcement earlier today with details on how it intends to modernize its software licensing model. Please don’t think that “software licensing” is an esoteric topic that you can delegate to someone a level or two down in your organization. It isn’t. There […].

Licensing 218
article thumbnail

CIOs as “Chief Insight Officer”: How to Fix These IT Management Flaws

Future of CIO

Many IT organizations still get stuck at the lower level of maturity. Old IT thinking cannot move fast enough in the era of the digitalization. Digital CIOs today need to have both business acumen and technological understanding to become the trustful business partner. They must be able to fix these IT management flaws in order to improve IT performance and maturity in order to get digital ready.

How To 49
article thumbnail

Next-Gen Procurement: Transforming Processes with the Power of Generative AI

Generative AI goes beyond just automating tasks and providing real-time answers. Did you know that implementing generative AI reduces sourcing cycle times and allows for faster decision-making across procurement operations? In this whitepaper — Next-Gen Procurement: Transforming Processes With the Power of Generative AI — experts reveal how the strategic application of generative AI within procurement processes is paving the way for groundbreaking improvements.