Sat.Dec 02, 2017 - Fri.Dec 08, 2017

article thumbnail

2018 Goal: Re-position Cybersecurity As An Enabler

CTOvision

As long as cybersecurity is viewed as a pain, it’ll never be integrated into the fabric of an organization. Fortunately, there have been significant advances in cloud-based security services that enable new ways to embed cybersecurity into enterprise services people want. Ever wonder why dentists re-positioned themselves as teeth whitening experts? Answer: no one likes […].

article thumbnail

Cambridge University deploys Dropbox for file sync-and-share

Computer Weekly

Dropbox replaces numerous consumer file share products and bespoke connections as Cambridge audits 6,500 academics to roll out invisible collaboration for hundreds of use cases

201
201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Help Me Obi Wan

IT Toolbox

When old Ben Kenobi sat down with Luke Skywalker to listen to a plea for help from Princess Leia, the audience for the first Star Wars movie saw a hologram of Leia, delivering her message to the Jedi knight.

WAN 140
article thumbnail

What I Learned about Digital Transformation from Speaking to Hundreds of Leaders

Social, Agile and Transformation

require(["mojo/signup-forms/Loader"], function(L) { L.start({"baseUrl":"mc.us14.list-manage.com","uuid":"786c41758ef1858a45a739f3e","lid":"8918f17d05"}) }) You learn a few things when you spend a chunk of the year on the road attending and speaking at conferences targeting CIOs, CTOs, CDOs (Chief Digital and Data Officers), CISOs and some CMOs. I’ve attended and spoken at over twenty events.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

5 Reasons Why You Should Consider Network Virtualization in Your Business

CTOvision

Every business has goals. One of the most important goals for a firm is to keep its current customers happy while at the same time reaching out to attract new customers. In doing all this, the business hopes to improve its market position and cut down on its cost of operations. Proper implementation of network […].

Network 183
article thumbnail

Researchers warn of new support scam malware

Computer Weekly

Security researchers have identified a new strain of support scam malware and a way of clearing up infected machines

Malware 240

More Trending

article thumbnail

Cheap Ways To Connect Data Centers

The Accidental Successful CIO

Data centers are only valuable if they can share data Image Credit: Sean Ellis. As the person with the CIO job at your company, you have the added responsibility of maintaining your company’s data centers. No matter if you have only one data center or hundreds of them, they are only as valuable as their ability to communicate with each other and the outside world.

article thumbnail

Empower Your Workforce to Play Insider Threat Defense

CTOvision

Your workforce is your greatest asset for mitigating insider threat risk in your organization. Training, equipping, and reinforcing an insider threat risk framework across your enterprise will best posture your organization to prevent, detect, and respond to a suspected insider incident. Here are three approaches to harvesting the defensive capital of your workforce to help […].

Training 172
article thumbnail

Executive interview: Antonio Neri, HPE

Computer Weekly

We speak to the man taking over from Meg Whitman as CEO of HPE about how he will continue the company's turnaround

Company 233
article thumbnail

Remembering IBM LAN Server Part 2

IT Toolbox

Notwithstanding its heritage, LAN Server 4.0 would incorporate some relatively strong enterprise-wide services, including support for the Open Software Foundation's (OSF) Distributed Computing Environment (DCE), a graphical user interface, and extended peer services.

LAN 133
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

List of SCCM CB DMP Downloader State Messages

Anoop

SCCM state messages help to troubleshoot updates and servicing related issues. DMP downloader is the components which download source files of SCCM CB updates. Following are the list of List of SCCM CB DMP Downloader State Messages. What is State Message? SCCM State messages are sent using a messaging system that is built into SCCM […]. The post List of SCCM CB DMP Downloader State Messages appeared first on Anoops.

System 137
article thumbnail

Application-Defined Networking Basics: Definitions and reasons to think ADN vs. alternatives

CTOvision

Virtualization first hit compute in a big way in the late 1990s, fueling VMware’s growth. In a somewhat overlapping timeline, virtualized storage gave administrators the ability to chunk up disks in a similar way. But networking hung in there. Almost every network on the planet today still has to balance collision domains, broadcast domains, subnet […].

Network 152
article thumbnail

Digital identity needs to be priority in 2018, says FireEye

Computer Weekly

Protecting digital identity, gaining data visibility and protecting employees are key challenges for the year ahead, according to the 2018 security predictions report by security firm FireEye

Security 181
article thumbnail

Why you have to look past security policies for real improvements

IT Toolbox

Why you have to look past security policies for real improvements Security policies are all the rage these days. I think an outsider looking in at what it takes to build and run a solid information security program, it would be to have a set of well-written policies. After all, that's what the auditors ask for when they show up. It's also what the standards bodies emphasize.

Policies 124
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

DDI is a critical component of IoT success

Network World

The Internet of Things (IoT) era has finally arrived, and businesses need to be prepared for a world where everything is connected. I’m an analyst so I’ll support my proclamation that IoT is here with data: There are currently 25 billion internet-connected devices, and that will double by 2020 and then grow to 80 billion by 2025. ZK Research. However, there’s a more basic way of understanding where we are in the adoption cycle: IoT has become the norm, not the exception, according to companies I

Internet 126
article thumbnail

Thoughts from a seasoned IT professional and security rookie

CTOvision

Note: I've been asked to post this from a reader that asked to remain anonymous but would like to inject some thoughts into our dialog here. If you have thoughts you would like to insert into the discussion feel free to contact us. -mj Allow me to introduce myself. Or perhaps not. I am a […].

Security 151
article thumbnail

Ransomware up nearly 2,000% in two years as “cyber mafia” hit business

Computer Weekly

Cyber attacks on businesses in 2017 grew in frequency, sophistication and malice, a report on the new age of organised cyber crime reveals

Report 203
article thumbnail

The Importance of ERP Testing

IT Toolbox

The test program is one of the most vital components of any ERP installation. It must be carefully planned and exhaustively pursued from the very beginning of the implementation. Unfortunately, testing is too often scrimped, or, worse yet, elements of the test program are sacrificed in an effort to get the product out the door. This doesn’t work.

article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Office 365 Monitoring and Dashboards in SCOM

Anoop

Office 365 is a SaaS solution by Microsoft. There are 24.9 million total subscribers as of that last report. This confirms a vast number of people using Office 365 to help manage their businesses. I always had a question whether organizations need a monitoring solution for Office 365 or not. In this post, we will […]. The post Office 365 Monitoring and Dashboards in SCOM appeared first on Anoops.

Microsoft 102
article thumbnail

Game Changing Business Software for Your Company

CTOvision

When companies start to grow, they often start to look at upgrading the original software systems that they started out with. Because recent productivity software packages have migrated to the cloud, it can be deceptively easy to convert your users to an online set of services like accounting that you pay a monthly fee for. […].

Software 151
article thumbnail

Chief data officer role is key to business success, says Gartner

Computer Weekly

There’s a new chief in business, set to take on stewardship of the company’s data assets, research shows

Data 220
article thumbnail

Changes in Collaboration You Need to Know About

IT Toolbox

As 2017 heads to a close, it’s time to step back and reflect on the state of the market we call “collaboration” Not only is change constant, but many shifts we’re seeing are far-reaching and poised to transform not just collaboration, but the very essence of work.

119
119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

5 e-Learning trends to look forward to in 2018 and beyond

Kitaboo

It is that time of the year when industry leaders predict eLearning market trends for the fast-approaching new year. So, let’s have a look at what does 2018 and beyond have in store for the Learning Management System (LMS) and eLearning industry. Gamification: Gamification makes learning difficult concepts easy and fun; besides, it also provides learners with the opportunity to exercise their skills in virtual settings before practising them in real-time situations.

Trends 88
article thumbnail

How Technology Has Transformed Education in the 21st Century

CTOvision

Almost every aspect of life has been influenced by technology in the last decade. The impact of technology on education since the advent of the World Wide Web has grown tremendously. Technology has created a new method of learning in graduate schools and colleges through online programs and research. The number of students under the […].

Education 145
article thumbnail

Steal a march on cyber criminals through security by deception

Computer Weekly

Security by obscurity, although a common and tempting practice, is generally not recommended, but security by deception offers a way for defenders to make it more difficult for attackers to succeed and easier for defenders to catch them

Security 163
article thumbnail

Closer customer integration key for future VoIP success

IT Toolbox

The popularity of intertwining hosted business phone systems with internal platforms is tempting larger VoIP companies into further integration projects. This requires upgrades that can integrate existing VoIP phone plans, usually via a URL that can filter real-time data. Such processes can be leveraged for an unlimited number of uses.

VOIP 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Video Tutorial Decrypt Files Protected Intune SCCM WIP Policy

Anoop

Windows Information Protection (WIP) is accidental Data Leakage protection solution from Microsoft. WIP is fully supported in Windows 10 anniversary edition (1607) and later versions. In this post, we will see more details about Decrypt Files Protected Intune SCCM WIP Policy. Certificates Details – Intune/SCCM WIP Policies Encrypting File System (EFS) Data Recovery Agent (DRA) certificate has […].

article thumbnail

The Endpoint Imperative: ID’ing and Overcoming the Stumbling Blocks to Digital Transformation

Cloud Musings

Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices. Intel’s Kaitlin Murphy has some pointers to assure that your PC fleet and mobile devices are not your Digital Transformation Stumbling Blocks. Kevin: Hello everyone and welcome to this episode of " The Endpoint Imperative " podcast series from Intel.

Intel 79
article thumbnail

Bitcoin industry enters top 10 DDoS targets

Computer Weekly

The bitcoin industry has become one of the top 10 industries most targeted by distributed denial of service attacks, a report has revealed

Industry 187
article thumbnail

How would 10 years of commitment change you?

IT Toolbox

When I started, I never knew it would end up being a long term commitment. I just didn't think about that. I was focused on the present and what I thought I could do then. Later, much later, I started to think about it as something that would be a long term part of my life.

119
119
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.