Sat.Dec 16, 2017 - Fri.Dec 22, 2017

article thumbnail

Top 10 cyber crime stories of 2017

Computer Weekly

Here are Computer Weekly’s top 10 cyber crime stories of 2017

246
246
article thumbnail

We are Doing Agile, but are not Agile

Social, Agile and Transformation

Everyone, or at least almost everyone is doing some form of agile practices today. In fact, some leaders drive their digital transformation programs with leading agile to deliver customer facing applications. In a year of speaking at conferences, I did not meet anyone selling their waterfall, top-down project management practices as keys to their transformation programs.

Agile 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The time to deal with IoT security is now

Network World

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.” But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula , global product management leader and security expert at SenecaGlobal , what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected device

Security 167
article thumbnail

FedCloud Security Roadmap for 2018

CTOvision

As the Government continues to migrate to the cloud it becomes critical to integrate stronger security into its operations. Cloud and data security must go together. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. Using the services of a […].

Security 151
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Top 10 cloud stories of 2017

Computer Weekly

Here are Computer Weekly’s top 10 cloud stories of 2017

Cloud 215
article thumbnail

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

Keeping the company safe is the job of the CIO Image Credit: Bill Smith. I think that we can all agree that we are living in an increasingly dangerous world. As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

Banking 140

More Trending

article thumbnail

PKWARE Brings Persistent Encryption to Turnkey Key Management with Smartcrypt Appliances

CTOvision

PKWARE, a global leader in data security, recently announced the launch of four virtual and hardware key management appliances. The appliances will allow for simplified deployment and enhanced security features of Smartcrypt Enterprise Manager, the central component of PKWARE's Smartcrypt platform. Smartcrypt Appliances are the only key management appliances that have out-of-the-box support for persistent […].

Hardware 151
article thumbnail

Kaspersky Labs appeals US ban

Computer Weekly

Russian security software giant appeals US government's decision to ban the use of its products in federal agencies

article thumbnail

'Paris s'éveille'! Introducing the AWS EU (Paris) Region

All Things Distributed

Today, I'm happy to announce that the AWS EU (Paris) Region, our 18th technology infrastructure Region globally, is now generally available for use by customers worldwide. With this launch, AWS now provides 49 Availability Zones, with another 12 Availability Zones and four Regions in Bahrain, Hong Kong, Sweden, and a second AWS GovCloud (US) Region expected to come online by early 2019.

article thumbnail

How Splash Made a Splash at Dreamforce (on a Budget)

The Investing Edge

For those of you still recovering from Dreamforce 2017 , I interviewed Amy Holtzman, VP of marketing at leading event marketing platform Splash , to get the inside scoop on how they planned and executed on their own Dreamforce presence. For startups who don’t have the budget to buy a booth, take over a coffee shop, host a concert, or send the whole company to San Francisco for a week, this is an especially helpful guide on how to get the best return on a conference like Dreamforce.

Budget 87
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Video Guide Download Install and Configure MDT 8450

Anoop

I downloaded MicrosoftDeploymentToolkit_x64.MSI and installed it on SCCM CB 1711 preview lab environment. There are 32 and 64 bit versions of MDT 8450 available. This version (build 6.3.8450.1000) of the Microsoft Deployment Toolkit requires Windows 10 ADK build. In this post, we will see how to Download Install and Configure MDT 8450. More Videos – Subscribe the YouTube channel here […].

Video 84
article thumbnail

How to boost your personal brand as an IT professional

Computer Weekly

Seven steps to help you build a personal brand in the workplace, articulate the value you provide and build your professional reputation

How To 175
article thumbnail

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Network World

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

article thumbnail

The Endpoint Imperative: A Form Factor Renaissance

Cloud Musings

Workplace expectations are changing, and along with them, the devices we use to do our jobs. In this episode of "The End Point Imperative", Intel’s Sarah Wieskus tells us about how Intel is driving better user interface and performance while continuing to driving enhanced security and manageability. Kevin L. Jackson: Hi everyone and welcome to this episode of The Endpoint Imperative, a podcast series from Intel.

Intel 79
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Video Guide Windows Server 2016 Backup Solution from Veeam

Anoop

Veeam has a backup and restore solution for Microsoft Windows devices. Veeam agent for Microsoft Windows can be used to take backups of servers, desktops, and laptops. Previously, this solution was known as “Veeam Endpoint Backup” In this post, we will see Video Guide Windows Server 2016 Backup Solution from Veeam. Following are the 3 posts […].

Backup 84
article thumbnail

Top 10 storage and backup stories of 2017

Computer Weekly

In Computer Weekly’s top 10 storage stories of 2017, we tracked key trends such as the continued rise of hyper-converged infrastructure, the emergence of NVMe flash and object storage

Storage 163
article thumbnail

30% off APC 1500VA Compact UPS Battery Backup & Surge Protector

Network World

An APC UPS provides backup power power and surge protection to power and protect your PC or Mac, network router, gaming consoles like Xbox and PS4, AV and other business electronics from the dangers of power surges, spikes, lightning and power outages. By powering your critical electronics with a backup battery during blackouts, you ensure personal and professional connectivity when it matters most.

Backup 79
article thumbnail

Cloud Storage 2.0 Set To Dominate Market

Cloud Musings

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important. Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage.

Storage 79
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

5 Steps To Reduce Due Diligence Investment Failures

Future of CIO

In my activities as an angel investor, and my work with new ventures seeking investment, I find the “due diligence” stage to be fraught with the most risk. Usually this stage only really starts after an investor has expressed serious interest, or already informally agreed to invest. Most founders consider the story already told and the deal pending, so they aren’t sure what more then can do.

Meeting 76
article thumbnail

Nordic states innovate to attract global tech players

Computer Weekly

The Nordic region is already a hotbed for tech startups and has the ingredients to attract more investment from the established tech giants

151
151
article thumbnail

Ranking the World’s Top CEOs Using Social Media Sentiment Data

Dataconomy

CEOs of the world’s leading companies have a global influence that stretches beyond their own business and commercial interests. The general public is increasingly looking to the people steering some of the largest companies in the world for their views on political and social issues. In a Financial Times article. The post Ranking the World’s Top CEOs Using Social Media Sentiment Data appeared first on Dataconomy.

Social 72
article thumbnail

Top "Cloud Musings" Posts For 2017

Cloud Musings

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.) ↑ Grab this Headline Animator ( Thank you. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.

Cloud 79
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Rethinking the 'production' of data

All Things Distributed

This article titled " Daten müssen strategischer Teil des Geschäfts werden " appeared in German last week in the "IT und Datenproduktion" column of Wirtschaftwoche. How companies can use ideas from mass production to create business with data. Strategically, IT doesn't matter. That was the provocative thesis of a much-talked-about article from 2003 in the Harvard Business Review by the US publicist Nicolas Carr.

Data 72
article thumbnail

Highways England awards telecoms service contract to Telent

Computer Weekly

Network upgrade will enable Highways England to prepare for technologies such as 5G and connected cars

Network 143
article thumbnail

In 2018, Telecom and Networking are Vital (Again)

The Investing Edge

Our collective nostalgia for the 1990s is a thing that is either currently happening , or already passed , depending on your pop culture barometer. For most of us, that time represents Seinfeld and Pulp Fiction , and for others it marks the heyday of the telecom and networking markets as the internet drove explosive growth. Much like the resurgence of 90s pop-culture, we believe networking is again an exciting area of new technologies and services.

Network 70
article thumbnail

Book: The Daily Stoic: 366 Meditations on Wisdom, Perseverance, and the Art of Living

Storage IO Blog

This book was a delight. I started reading it earlier this year, caught up quickly (I started in July), and then mostly read a page each day when I was in the bathroom in the morning. I let it unfold slowly, reading the daily quote and Ryan Holiday’s (and Stephen Hanselman’s) thoughts on the quote, and then rereading the quote. I was near the end so I finished it off last night.

Study 68
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Hiring or Managing a Team? Here Are 3 Tools You Should Be Using

Dataconomy

One of the perennial challenges that enterprises face is hiring high-quality employees that will stick around for the long haul. Technology is evolving to enable new ways of solving hiring problems that have long plagued companies across all industries. Take collaboration collaboration software and services, for example, which have allowed. The post Hiring or Managing a Team?

Tools 50
article thumbnail

Top 10 enterprise IT in the Nordics stories in 2017

Computer Weekly

The Nordic region might be best known in IT circles for its startup communities – but it has much more to offer

article thumbnail

How can CIOs Set up a prioritization process to survive and thrive from the whirlwind of daily busyness?

Future of CIO

IT-driven digital transformation is the journey of continuous delivery and improvement; it is crucial to set the right priority to survive and thrive. Business transformation or change initiatives today nearly always involve some form of information and technology. IT should be seen by any business as a digital transformer and focus on setting principles and developing the next practices for improving business effectiveness, efficiency, and performance.

article thumbnail

Secure Pico Channels with DIDs

Phil Windley

Summary: Decentralized identifiers are a perfect complement to the event channels in picos and provide the means of performing secure messaging between picos with little effort on the developer's part. Picos are Internet-first actors that are well suited for use in building decentralized soutions on the Internet of Things. See this description of picos for more details.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.