Many organisations are launching a ‘DevOps’ effort with insufficient consideration of business outcomes and risk failure as staff do not connect with the underpinning tools and approaches, Gartner said.
Government CIOs face a litany of unique challenges — transient and inconsistent leadership, financial austerity, shifting citizen expectations, chronic IT underinvestment, scarce digital leadership, to name a few.
When a bad CEO goes down, the CIO often goes down with him. The way to save yourself, and your company, is to invest in the analytics technology that gives the CEO the data necessary to make smart business decisions. It doesn't hurt that it also shows why the CIO is more valuable to the CEO than other C-level executives.
1.The concept is still quite new. The term data lake, credited to Pentaho CTO James Dixon, has been bandied about for several years. But the idea of data lakes as corporate resources is still in its infancy, according to IDC analyst Ashish Nadkarni. A data lake is defined as a massive--and relatively cheap--storage repository, such as Hadoop, that can hold all types of data until it is needed for business analytics or data mining. A data lake holds data in its rawest form, unprocessed and ungoverned.
Microsoft's Windows 10 will not have a fragmentation problem, analysts argued, even though its rapid development tempo and a host of update cadences will spin off so many versions that not everyone will be running the same code, or even have the same features, at any one time.
Cybersecurity firm <a href="http://www.fortinet.com/press_releases/2015/fortinet-announces-agreement-to-acquire-meru-networks.html">Fortinet's purchase last week of wireless network manufacturer Meru Networks</a> for $44 million is the second major acquisition of a Wi-Fi hardware vendor in three months and, potentially, the start of a broader pattern.
Vulnerabilities and their exploitation are still the root cause of most breaches. IT security leaders should refocus their attention on how vulnerabilities are being managed and should track this metric to provide visibility as to how to reduce the biggest risks of being breached.