Thu.May 16, 2024

article thumbnail

What Really Motivates You at Work?

Harvard Business Review

When we work hard, we generally expect our efforts to be recognized by our employer. And most employers will do just that — showering someone with praise at a company meeting, taking a team to a nice dinner, or quietly delivering a cash bonus. But sometimes an employer’s broader recognition strategy does not align with what its individual workers want and need.

Meeting 135
article thumbnail

Cyber resilience: A business imperative CIOs must get right

CIO

With ransomware at an all-time high, companies need to understand that being cyber resilient means going beyond compliance to considering all aspects of a business, from operational continuity to software supply chain security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Day 2 Recap: Gartner Application Innovation and Business Solutions Summit

Xebia

Excited by the previous day’s momentum , attendees packed into the Augustus Ballroom at Caesar’s Palace in Las Vegas as guest keynote speaker Diana Nyad took the stage to kick off day two of the Gartner Application Innovation & Business Solutions Summit. Nyad is the first—and only—person to swim the 110 miles from Cuba to Florida without a shark cage.

article thumbnail

What’s holding CTOs back?

CIO

Anurag Dhingra is no stranger to the challenges CTOs face today. With 43% of CTOs reporting up to another IT leader or LOB executive, according to the 2024 State of the CIO survey , and just 38% having a budget separate from IT, as change agents they can find themselves in a difficult spot. Among the toughest hurdles Dhingra faced in a prior CTO position were not having execution responsibilities and having to “work extra hard selling ideas and getting buy-in from people who have budgets and exe

Culture 326
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Your Social Media Presence Can Help You Land (or Lose) a Job Opportunity

Harvard Business Review

Your digital footprint and online activities can have a big effect on how attractive and visible you are to potential employers. How do you notify your network about your job search without sounding too desperate or needy? And if you’re currently employed, how do you walk the tightrope between subtly reaching out to your social media contacts and not setting off alarm bells with your employer?

Media 144

More Trending

article thumbnail

How to Ask for the Feedback You Really Need

Harvard Business Review

When we ask for feedback on our work, we often get poor-quality feedback that’s not useful or that makes us feel attacked or defensive. Part of the reason is in how we’re asking for feedback. Most requests are too generic, too open, and too late. The result is that you’re more likely to get a heap of opinion rather than a helping of insight. Instead of saying, “I’d love it if you could provide some feedback,” try setting the other person up to add more value by being more prescriptive about what

How To 143
article thumbnail

Italian CIOs at the crossroads of transformation and sustainability

CIO

Digital transformation is a gradual journey, and for many CIOs, becoming more data-driven hinges on how sustainability practices are systematically adopted. As if the constant redefinition of the CIO role wasn’t enough, ESG goals, specifically in Italy, are now irrefutable parts of the job. “There’s no digital without sustainability, and there’s no sustainability without digital,” says Stefano Epifani, president of the Fondazione per la Sostenibilità Digitale, the first recognized research found

article thumbnail

#783 Becoming a Leader that Crushes Technical Debt with Juan Orlandini, CTO at Insight

Modern CTO

Today we’re talking to Juan Orlandini, CTO at Insight of North America. We discuss what he’s realized recently as a CTO coach, what he’s learned about aging, and just spend time catching up with an old friend of the show. All of this right here, right now, on the Modern CTO Podcast! To learn more about Insight, check out their website here. Have feedback about the show?

CTO Coach 128
article thumbnail

Baldor’s first-ever CIO sets the transformation agenda

CIO

Baldor Specialty Foods is turning to IT to take its business to the next level. The high-end organic produce and fresh meats distributor envisions IT — analytics and AI, specifically — as the key to more efficient distribution logistics and five-star customer experience. To cultivate its ambitious digital plans, the Bronx-based company, which prepares and delivers fresh food from “farm to table” of restaurants and caterers in New York City, Boston, Baltimore, and Washington, D.C., poached its fi

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

Background Cloud cryptomining has become an emerging trend in recent years, powered by the scalability and flexibility of cloud platforms. Unlike traditional on-premises infrastructure, cloud infrastructure allows attackers to quickly deploy resources for cryptomining, making it easier to exploit. One of the most common cryptomining threats for cloud environments is the Kinsing malware.

Malware 125
article thumbnail

Shine a Spotlight on Your Team’s IT Excellence with CIO Awards Canada

CIO

Are you ready to showcase your team’s IT prowess and gain the recognition they deserve? Welcome to the CIO Awards Canada, the premier program that celebrates the brilliance of Canadian organizations using technology to drive innovation and business success. Let us take you on an exciting journey where your hard work can be recognized on a national stage!

article thumbnail

Error'd: ABQ is the bomb

The Daily WTF

This week we have an unusual number of submissions involving dates or timestamps. That is, the usual sorts of error'ds, but unusually many of them. Gerald E. chuckled "I do love the back to the future movies. But now I can see Beck from the future." Steven J. Pemberton , as his mother calls him, snarked about Utilita: "I received this letter from my energy supplier on 10th May, telling me they were going to install a smart meter at my house on 3rd May.

Airlines 119
article thumbnail

Building Toward Unified Observability

DevOps.com

Observability, AI and automation can help organizations achieve proactive IT management and eschew traditional monitoring. Here’s what’s involved.

article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, and Terrence Sheflin

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

The State Department’s Cyber Strategy Seeks to Build Coalitions Against China

Ooda Loop

At the RSA cybersecurity conference, the Secretary of State announced the release of the Department’s new International Cyberspace & Digital Policy Strategy whose four goals are to advance economic prosperity; enhance security and address cybercrime; promote human rights, democracy, and the rule of law; and other transnational challenges.

Strategy 111
article thumbnail

Scoring Big: The Intricacies of an Athletic Director Search

N2Growth Blog

Understanding the Role of an Athletic Director The role of an athletic director is crucial for an athletic program’s success and overall operation. This esteemed position involves more than just overseeing athletic teams and facilities. An athletic director is a strategic leader responsible for managing budgets, developing policies and procedures, and promoting a positive and inclusive athletic culture.

Sport 97
article thumbnail

Have you ever been involved in a company acquisition (either being bought or buying another company)?

thoughtLEADERS, LLC

Our reader poll today asks: Have you ever been involved in a company acquisition (either being bought or buying another company)? Yes, and it went great 12.25% Yes, and it went okay 43.54% Yes, and it went terrible 20.75% Nope, never happened to me 23.46% Mergers can work, but they take work. Read the rest of this post at thoughtLEADERS, LLC: Leadership Training for the Real World.

Company 108
article thumbnail

Crafting a Legacy: The Importance of Succession Planning in Family Businesses

N2Growth Blog

Understanding the Concept of Succession Planning Succession planning is a critical aspect of organizational management. Its primary purpose is to prepare for and replace key leaders or business owners without disrupting the workflow. It is a proactive strategy that ensures an organization is ready to handle sudden or planned departures of critical workforce elements.

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Tech at Work: How the End of Cookies Will Transform Digital Marketing

Harvard Business Review

What will the end of third-party cookies mean for digital advertising, online publishing, and the open Internet?

article thumbnail

Unlocking Excellence: The Role of a Chief Procurement Officer

N2Growth Blog

Key Responsibilities of a Chief Procurement Officer in Enhancing Excellence The Chief Procurement Officer role has become increasingly important in driving organizational success. As the primary procurement and supply operations overseer, the CPO is crucial in improving procurement excellence. One of their primary responsibilities is to develop and execute effective procurement strategies that align with the organization’s overall business objectives.

article thumbnail

Vercel’s Valuation Jumps To $3.25B After $250M Series E

Crunchbase News

The big rounds just keep coming this week. Vercel , a platform that allows companies to develop web applications in the cloud, locked up a $250 million Series E at a valuation of $3.25 billion. There have been eight rounds this week of at least $100 million to U.S.-based startups. The round was led by Accel , with participation from other existing investors including CRV , GV , Notable Capital (previously GGV Capital ), Bedrock , Geodesic Capital , Tiger Global , 8VC and SV Angel. 1.

article thumbnail

Employee Personal GitHub Repos Expose Internal Azure and Red Hat Secrets

Aqua Security

What happens when employees at some of the world’s largest organizations like Microsoft and RedHat use personal GitHub repos for their side projects? They can unknowingly expose corporate secrets and credentials opening the doors for a security incident. Unfortunately, this isn’t just a hypothetical situation.

Azure 95
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Banning Non-Competes: Great News For Spinout Entrepreneurs

CEO Insider

In late April 2024, the Federal Trade Commission (FTC) made an historic decision when it passed a rule to ban non-compete clauses for all workers in U.S. industries, with a small exception for senior executives. Far from hurting business, the new ban makes everyone a winner, employees and businesses alike, by opening the door to […] The post Banning Non-Competes: Great News For Spinout Entrepreneurs appeared first on CEOWORLD magazine.

article thumbnail

Eye On AI: Huge AI Valuation Jumps Are Here Again

Crunchbase News

This column is a look back at the week that was in AI. Read the previous one here. Here we go again with valuations in the AI startup space. While the first quarter saw only a single $1 billion round and a few big valuation jumps , this month has certainly brought both back to the forefront and shown that investors are still willing to say yes to a deal no matter the cost.

Journal 94
article thumbnail

SQL at 50: What’s next for the structured query language?

InfoWorld

In May 1974, Donald Chamberlin and Raymond Boyce published a paper on SEQUEL, a structured query language that could be used to manage and sort data. After a change in title due to another company’s copyright on the word SEQUEL, Structured Query Language (SQL) was taken up by database companies like Oracle alongside their new-fangled relational database products later in the 1970s.

article thumbnail

Contributing to Apache Kafka®: How to Write a KIP

Confluent

Learn how to contribute to open source Apache Kafka by writing Kafka Improvement Proposals (KIPs) that solve problems and add features! Read on for real examples.

How To 88
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Designing and developing APIs with TypeSpec

InfoWorld

Some time ago I wrote about the work Microsoft was doing to improve the Azure APIs. That project delivered a set of automatically generated API definitions and SDKs, making it easier to link your applications to the cloud and to manage Azure services using code. Behind the scenes was a new language Microsoft developed called CADL , the Concise API Design Language.

article thumbnail

Unlocking the Future with Precision AI Workstation Demos

Dell EMC

See the possibilities of AI-driven business transformation at Dell Technologies World 2024.

article thumbnail

Kora: A cloud-native redesign of the Apache Kafka engine

InfoWorld

When we set out to rebuild the engine at the heart of our managed Apache Kafka service, we knew we needed to address several unique requirements that characterize successful cloud-native platforms. These systems must be multi-tenant from the ground up, scale easily to serve thousands of customers, and be managed largely by data-driven software rather than human operators.