July, 2024

article thumbnail

5 IT risks CIOs should be paranoid about

CIO

As a digital transformation leader and former CIO, I carry a healthy dose of paranoia. Call it survival instincts: Risks that can disrupt an organization from staying true to its mission and accomplishing its goals must constantly be surfaced, assessed, and either mitigated or managed. Is the organization transforming fast enough? Are stakeholders struggling or unhappy?

article thumbnail

CrowdStrike CEO: 97% of Windows Systems Back Online After Crash

DevOps.com

More than 97% of the Windows desktops that were suddenly disrupted a week ago by a problematic software update from CrowdStrike are back online, according to the cybersecurity company’s top executive, but the pain from the worldwide outage will continue to be felt.

Windows 130
article thumbnail

Is it Time to Give Cyber Sovereignty a Real Chance?

Ooda Loop

In its latest International Cyberspace and Digital Policy Strategy, the Department of State promoted a technological future that supports “digital solidarity,” a term that repackages the United States’ long held position of preserving an open Internet via the collaboration of similarly-minded nations to align their goals with one another.

Policies 124
article thumbnail

How to Integrate Cloud, Data, and AI Technologies — and Make Your Company More Adaptable

Harvard Business Review

Building a strong, flexible “digital core” that integrates cloud, data, and AI technologies to serve as an interconnected foundation for your company is the key to future growth. It is your means of supporting the current business drive toward efficiency and effectiveness, while remaining flexible enough to respond to the new needs of the organization and quickly adopt and scale the latest technology innovations.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions

Tenable

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs to do to protect itself. Tenable Research has discovered a vulnerability in Google Cloud Platform involving its Cloud Functions serverless compute service and its Cloud Build CI/CD pipeline service.

Cloud 142

More Trending

article thumbnail

H2 Forecast: Who’s Next To IPO?

Crunchbase News

Last year right around this time there were rumblings of the slumbering IPO market finally reawakening. It kinda did with a few big names like Arm Holdings and Instacart testing the waters, but more hope was held out for the first half of this year. However, the IPO window so far in 2024, while slightly ajar, certainly has not seen the barrage of long-private, venture-backed companies go public many expected.

article thumbnail

Why Supercloud Architectures Could Upend Cloud Computing – Or Not

IDC

Supercloud enables seamless app migration and multi-cloud operations across AWS, Azure, and GCP without reconfiguration. Collaboration among providers is key but challenging.

Cloud 120
article thumbnail

How to Configure ServiceNow Knowledge Articles for Microsoft Graph Connector

Perficient

If you use ServiceNow as your knowledge management platform, you might want to make your knowledge articles searchable and accessible from Microsoft Search. Microsoft Search is a unified search experience that helps you find what you need across your organization, including files, sites, people, and more. By connecting your ServiceNow knowledge articles to Microsoft Search, you can enable your users to find and request them directly from the Microsoft 365 apps.

How To 118
article thumbnail

CIOs must reassess cloud concentration risk post-CrowdStrike

CIO

The recovery from last week’s defective content update from CrowdStrike that impacted millions of Microsoft Windows endpoints has been a significant undertaking, to say the least. The outage put enterprises, cloud services providers, and critical infrastructure providers into precarious positions, and has drawn attention to how dominant CrowdStrike’s market share has become, commanding an estimated 24% of the endpoint detection and response (EDR) market.

Cloud 360
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Workplace Communication: Stop Asking “Do You Understand?” (and do this instead)

Let's Grow Leaders

High-performing teams invest in clear workplace communication by ensuring shared understanding. When your organization or team communicates effectively, you’re nimble. You can respond to change quickly. But if your organization doesn’t invest in effective workplace communication, you’ll face a constant series of misunderstandings that waste time, create conflict, and drag down everyone’s performance.

Coaching 203
article thumbnail

Three Gorges Dam Could Break: Potential for large humanitarian crisis

Ooda Loop

The iconic Three Gorges Dam, the world’s largest hydroelectric dam, has been under significant pressure from floods for the last several months and is reaching crisis levels.

145
145
article thumbnail

6 Ways to Bring Strategy into Your Work Every Day

Harvard Business Review

Business leaders are expected to be strategic, and while organizational obstacles can prevent you from translating intent into strategic actions, so can your personal limitations and practices. It doesn’t have to be this way. Even when it feels like the odds are stacked against you, you have more choices than you may realize. Small decisions about where to focus and what to do throughout your day may feel inconsequential, but their impacts accumulate.

Strategy 145
article thumbnail

Netlify + Astro are partnering!

Netlify

Netlify announce sponsorship of Astro as their Official Deployment Partner to help fund the development of the open source project. Additionally, we’ll be announcing several new core primitives from both Netlify and Astro, aimed at making the whole web ecosystem stronger.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Why and How to Go All-In on GitOps 

DevOps.com

When you can manage every cloud native deployment using a GitOps approach, as a consequence, declarative and automated processes become baked into your culture and transform your business.

How To 143
article thumbnail

CrowdStrike incident has CIOs rethinking their cloud strategies

CIO

The widespread disruption caused by the recent CrowdStrike software glitch, which led to a global outage of Windows systems, has sent shockwaves through the IT community. For CIOs, the event serves as a stark reminder of the inherent risks associated with over-reliance on a single vendor, particularly in the cloud. The incident, which saw IT systems crashing and displaying the infamous “ blue screen of death (BSOD) ,” exposed the vulnerabilities of heavily cloud-dependent infrastructures.

article thumbnail

Introducing Apache Kafka® 3.8

Confluent

Apache Kafka 3.8 adds 17 new KIPs (13 for Core, 3 for Streams & 1 for Connect). Highlights include 2 new Docker images, the ability to set task assignors, and more!

131
131
article thumbnail

The Art of Geopolitical Intelligence: Lessons for Informed Decision-Making

Ooda Loop

With this post I reflect on some of the key lessons I have learned in the world of geopolitical intelligence analysis and reporting. My goal in sharing these lessons is to help you optimize your use of the reporting you see in the OODA daily pulse and the long form research and reporting done for our OODA network members.

Analysis 134
article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

The Limits of GenAI Educators

Harvard Business Review

While generative AI tools have been heralded as the future of education, more than 40 years of academic research suggests that it could also harm learning in realms from online tutoring to employee training for three reasons. First, the best student-teacher relationships are empathetic ones but it is biologically impossible for humans and AI to develop mutual empathy.

Education 144
article thumbnail

Secure by Design Principles Are More Important Than Ever

Ivanti

The concept of Secure by Design, which means designing software with security built in before it leaves the drawing board, is fundamentally changing how software is developed. Software has often been designed with what’s known as “bolt-on security,” added after products are developed. But that means security is not inherent within the solution. Where there's a conjunction between the core product and a bolt-on, that’s an inflection point for an attack.

SDLC 129
article thumbnail

Survey Surfaces Mass Open Source Java Migration

DevOps.com

A global survey of 663 IT professionals with Java expertise finds 86% are migrating some portion of their applications to an open-source edition of the Java platform or have already migrated (25%).

article thumbnail

Germany goes full throttle into the cloud

CIO

Despite digital transformation being a highly effective way to further develop the long-term business model, it can be a very drawn-out and arduous process. But the majority of companies in Germany, in particular, rely on the cloud in its various facets, and have now achieved a certain level of maturity when it comes to migrating workloads. Maturity means, on one hand, that users have not only gained experience with individual dedicated cloud services, but in many cases are now also modernizing

Cloud 350
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Cybersecurity Funding Jumps 144% In Q2

Crunchbase News

Venture funding to cybersecurity startups had its best quarter since Q1 2022 — surging 144% year to year — and seemingly building off a strong start to the year. The increase in venture dollars was mainly due to a significant jump in nine-figure rounds — illustrating that even as investors may be pulling back on investing in young startups, they are willing to double down on more mature companies looking for growth rounds.

article thumbnail

Microsoft’s July 2024 Patch Tuesday Addresses 138 CVEs (CVE-2024-38080, CVE-2024-38112)

Tenable

5 Critical 132 Important 1 Moderate 0 Low Microsoft addresses 138 CVEs in its July 2024 Patch Tuesday release, with five critical vulnerabilities and three zero-day vulnerabilities, two of which were exploited in the wild. Microsoft released 138 CVEs in July 2024 Patch Tuesday release, with five rated critical, 132 rated important and one rated moderate.

Windows 125
article thumbnail

How AI Can Change the Way Your Company Gets Work Done

Harvard Business Review

AI offers many ways to enhance a company’s overall internal capabilities and skills. AI can be used to infer skills from employee profiles and their activity. AI can be used to classify learning content and make it more applicable and accessible for the whole workforce, as well as making learning more personalized to each individual. AI can be used to summarize, recommend, and augment learning content.

Company 145
article thumbnail

The Ultimate Guide to Intune Migrations to Ivanti UEM

Ivanti

If you have purchased Ivanti UEM and are migrating to it from Microsoft Intune, you as an IT administrator must understand and execute several critical steps to make that transition smoothly. In this series of blogs, I will be looking from an Intune admin’s perspective at what it takes to migrate from Intune to Ivanti UEM. I will cover practical elements and best practices, translating terminology used across both products to pave the way for a seamless and successful transition.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Survey Surfaces Lots of Software Supply Chain Insecurity

DevOps.com

A global survey of 900 application security professionals finds nearly two-thirds work for organizations that have had their software supply chains compromised in the past two years.

Survey 137
article thumbnail

10 ways AI can make IT more productive

CIO

When it comes to maximizing productivity, IT leaders can turn to an array of motivators, including regular breaks, free snacks and beverages, workspace upgrades, mini contests, and so on. Yet there’s now another, cutting-edge tool that can significantly spur both team productivity and innovation: artificial intelligence. Any task or activity that’s repetitive and can be standardized on a checklist is ripe for automation using AI, says Jeff Orr, director of research for digital technology at ISG’

article thumbnail

Has The Collapse of the CCP PRC Begun?

Ooda Loop

A comprehensive look at the situation in China paints a picture of a nation in decline. What follows is a situational assessment designed to inform strategic planning for business and government leaders interested in comprehending what may come next.