4 tips to help CEOs find their CIO soulmate
Businesses can't be successful without a strategy, and neither can a CIO. When finding the right CIO for your company, you should spend time discussing the overall strategy of your company to make sure your ultimate goals align. Exceeding expectations as a CIO five years ago, might qualify as simply meeting expectations today. As Sagalov puts it, "a CIO is someone who does more than just keep the Wi-Fi on -- he is responsible for strategically growing a company's information capabilities." A CIO needs to have a strategy that will allow the company to thrive and adapt. A strategic CIO is a proactive CIO, and it is important to ensure that the person you hire is willing to plan for the future, rather than react as it happens.
Security breaches a monthly headache for firms
Virus attacks were the most common type of security issue, reported by 81 percent of large companies. But over half (57 percent) had been targeted by phishing attempts, a third (37 percent) had seen a denial of service attack, and nearly one in four (24 percent) said their networks had been breached by hackers. "Considering all breaches, there was a noticeable 38 percent year-on-year increase of unauthorised outsider attacks on large organisations, which included activities such as penetration of networks, denial of service, phishing and identity theft," the report noted. Businesses are pessimistic about their abilities to keep crooks out: over half expected to see more breaches in future.
Empower Your Application Teams
Application teams are the backbone of the revenue generating capabilities of all companies. These creative people spend their off-hours working with the latest tools to keep their skills sharp. Increasingly, these teams are going into the public cloud to develop their applications. Why? Developers need resources in days. Procurement and IT quote resource delivery in weeks. As the pace of business increases, developers need tools that help them accelerate the design and deployment of applications. They want resources quickly, on-demand. Watch this video to learn how Cisco meets the need for on-demand resources.
7012 Regs and Cyber insurance on collision course with small business
The 7012 regulations also require immediate reporting of any incident or threat to UCTI that is carried on or held in an IT system. The NIST is the cognizant agency for Classified standards and operational regulations. The regulations themselves are a part of, and a driver to, a set of complex problems for industry — presently, with risk being transferred away from DoD to its contractors who will find risk rebounding to them via their “cyber” insurance policies. This two-part article isn’t intended to fan the flames, but rather to give the context behind the regs, provide meaningful definitions for practical use, offer probable implications for industry, and set out why the seemingly most reasonable solution for businesses may be the most dangerous to them.
The drivers and inhibitors of cyber security evolution
Businesses can't be successful without a strategy, and neither can a CIO. When finding the right CIO for your company, you should spend time discussing the overall strategy of your company to make sure your ultimate goals align. Exceeding expectations as a CIO five years ago, might qualify as simply meeting expectations today. As Sagalov puts it, "a CIO is someone who does more than just keep the Wi-Fi on -- he is responsible for strategically growing a company's information capabilities." A CIO needs to have a strategy that will allow the company to thrive and adapt. A strategic CIO is a proactive CIO, and it is important to ensure that the person you hire is willing to plan for the future, rather than react as it happens.
Security breaches a monthly headache for firms
Virus attacks were the most common type of security issue, reported by 81 percent of large companies. But over half (57 percent) had been targeted by phishing attempts, a third (37 percent) had seen a denial of service attack, and nearly one in four (24 percent) said their networks had been breached by hackers. "Considering all breaches, there was a noticeable 38 percent year-on-year increase of unauthorised outsider attacks on large organisations, which included activities such as penetration of networks, denial of service, phishing and identity theft," the report noted. Businesses are pessimistic about their abilities to keep crooks out: over half expected to see more breaches in future.
Empower Your Application Teams
Application teams are the backbone of the revenue generating capabilities of all companies. These creative people spend their off-hours working with the latest tools to keep their skills sharp. Increasingly, these teams are going into the public cloud to develop their applications. Why? Developers need resources in days. Procurement and IT quote resource delivery in weeks. As the pace of business increases, developers need tools that help them accelerate the design and deployment of applications. They want resources quickly, on-demand. Watch this video to learn how Cisco meets the need for on-demand resources.
7012 Regs and Cyber insurance on collision course with small business
The 7012 regulations also require immediate reporting of any incident or threat to UCTI that is carried on or held in an IT system. The NIST is the cognizant agency for Classified standards and operational regulations. The regulations themselves are a part of, and a driver to, a set of complex problems for industry — presently, with risk being transferred away from DoD to its contractors who will find risk rebounding to them via their “cyber” insurance policies. This two-part article isn’t intended to fan the flames, but rather to give the context behind the regs, provide meaningful definitions for practical use, offer probable implications for industry, and set out why the seemingly most reasonable solution for businesses may be the most dangerous to them.
The drivers and inhibitors of cyber security evolution
“Coupled with the coming regulations that will require mandatory breach notification, it is surprising that many are still prioritising the same things they have always done, rather than evolving to ensure they can respond to threats that get through their current defences,” says FireEye European vice-president and chief technology officer (CTO) Greg Day. “Many organisations talk the talk, but want to walk the walk at a very slow and steady pace, while the most enlightened organisations are already spending more than 50% of their security budgets on progressive detection and response capabilities,” he says. The study found organisations are, on average, spending only 23% of their IT security budgets on detection and response, although this expected to increase to 39% in the next two years.
MongoDB Gets SQL-Reporting Capability
MongoDB engineers have built a connector that takes a standard SQL query from Business Objects, Tableau, Cognos, or other SQL-based analysis systems, and translate it into a query that MongoDB understands. MongoDB is popular as a JSON document database, capable of storing email, reports, comments, and other forms of text as objects in a database. It has used its own query and reporting methods that in the past have been incompatible with SQL reporting systems, the ones that most data managers were familiar with, explained Kelly Stirman, vice president of strategy at MongoDB.
The Power of RAML
RAML, or the RESTful API Modeling Language, is a relatively new spec based on the YAML format- making it easily read by both humans and machines. But beyond creating a more easily understood spec (one that could be handed to the documentation team without worry), Uri Sarid, the creator of RAML wanted to push beyond our current understandings and create a way to model our APIs before even writing one line of code. ... All of the RAML tools are open source and freely available at http://RAML.org/projects.... The API Notebook, on the other hand, takes interactivity and exploration a step further by letting developers use JavaScript to call your (and other) APIs. In the API Notebook they are also able to manipulate the data to see how it would work in a real-world use case.
CIOs need to plan and prepare for disruption
Whichever continent, whichever industry and whichever demographic or social group you look at, the signs of disruption are everywhere and it’s accelerating at a frenetic pace driven by a new wave of global 21st century entrepreneurs who last year registered over 100 million new companies and who are all being powered by the same new democracy, .... Today, technology is becoming increasingly ubiquitous and as it does so new social, mobile and cloud based technology platforms are helping people around the world collaborate and communicate easier and faster than ever before, find funding, information and expertise faster than ever before and helping them create, build, distribute and sell new products and services faster than ever before.
Customer-obsessed technology platforms: If you don't know, you're doing IT wrong
Unfortunately this is a terrible way to create applications, regardless if it's on the web, mobile, or any other emerging digital channel. The data is good, but we cannot start with our data in mind -- instead we must start with our customers' needs in mind. But why this change and why now? Our customers (and increasingly our employees) are being presented with so many more options from your competitors, both those known today and tomorrow's digital startups. Simply put, the barrier to creating new software solutions is approaching zero. Making this transformation is central to the BT Agenda -- applying technology to win, serve, and retain customers.
The Secret to Data Lake Success: A Data First Strategy
So why is the data warehouse failing to deliver on these requirements? The organization spent a lot of time and money to create a “slice and dice” environment that should give the business what they need. Unfortunately, in today’s environment, accounting for every question in one model is impossible. New data sources are emerging at a breakneck pace. New questions are sprouting up even faster. A highly engineered environment that only takes the data it needs a upfront is going to have difficulty adapting to rapidly changing requirements. Faced with the complexity of data loading and transformation processes, as well as a highly intricate data model, the average data warehouse change takes nine months and costs over $1 million to complete. When you build a complex system with one purpose in mind, don’t expect agility.
Quote for the day:
“If you cannot do great things, do small things in a great way.” -- Napoleon Hill
MongoDB Gets SQL-Reporting Capability
MongoDB engineers have built a connector that takes a standard SQL query from Business Objects, Tableau, Cognos, or other SQL-based analysis systems, and translate it into a query that MongoDB understands. MongoDB is popular as a JSON document database, capable of storing email, reports, comments, and other forms of text as objects in a database. It has used its own query and reporting methods that in the past have been incompatible with SQL reporting systems, the ones that most data managers were familiar with, explained Kelly Stirman, vice president of strategy at MongoDB.
The Power of RAML
RAML, or the RESTful API Modeling Language, is a relatively new spec based on the YAML format- making it easily read by both humans and machines. But beyond creating a more easily understood spec (one that could be handed to the documentation team without worry), Uri Sarid, the creator of RAML wanted to push beyond our current understandings and create a way to model our APIs before even writing one line of code. ... All of the RAML tools are open source and freely available at http://RAML.org/projects.... The API Notebook, on the other hand, takes interactivity and exploration a step further by letting developers use JavaScript to call your (and other) APIs. In the API Notebook they are also able to manipulate the data to see how it would work in a real-world use case.
CIOs need to plan and prepare for disruption
Whichever continent, whichever industry and whichever demographic or social group you look at, the signs of disruption are everywhere and it’s accelerating at a frenetic pace driven by a new wave of global 21st century entrepreneurs who last year registered over 100 million new companies and who are all being powered by the same new democracy, .... Today, technology is becoming increasingly ubiquitous and as it does so new social, mobile and cloud based technology platforms are helping people around the world collaborate and communicate easier and faster than ever before, find funding, information and expertise faster than ever before and helping them create, build, distribute and sell new products and services faster than ever before.
Customer-obsessed technology platforms: If you don't know, you're doing IT wrong
Unfortunately this is a terrible way to create applications, regardless if it's on the web, mobile, or any other emerging digital channel. The data is good, but we cannot start with our data in mind -- instead we must start with our customers' needs in mind. But why this change and why now? Our customers (and increasingly our employees) are being presented with so many more options from your competitors, both those known today and tomorrow's digital startups. Simply put, the barrier to creating new software solutions is approaching zero. Making this transformation is central to the BT Agenda -- applying technology to win, serve, and retain customers.
The Secret to Data Lake Success: A Data First Strategy
So why is the data warehouse failing to deliver on these requirements? The organization spent a lot of time and money to create a “slice and dice” environment that should give the business what they need. Unfortunately, in today’s environment, accounting for every question in one model is impossible. New data sources are emerging at a breakneck pace. New questions are sprouting up even faster. A highly engineered environment that only takes the data it needs a upfront is going to have difficulty adapting to rapidly changing requirements. Faced with the complexity of data loading and transformation processes, as well as a highly intricate data model, the average data warehouse change takes nine months and costs over $1 million to complete. When you build a complex system with one purpose in mind, don’t expect agility.
Quote for the day:
“If you cannot do great things, do small things in a great way.” -- Napoleon Hill
No comments:
Post a Comment