Medium 9f8d5181 f373 45c2 a207 07d66db09fdc

How Safe Are Your Data in a Software-Defined Storage Solution?

Software-defined storage (SDS)  hits all the right enterprise storage trends, but it’s still an emerging technology for the average organization. Therefore, outsourcing SDS to a hyperscale or other CSP is probably the best option for maintaining your data safety. With all of its appeal, some people and enterprises are wondering how safe their data are in an SDS solution. Here are some things to consider if you’re trying to answer that question for your own data.

Medium ed723aa1 b431 4c2f 9217 45a7135ed730

Steps to Building a Data-Driven Team

There are lots of ways for data to inform and streamline business today. But the real potential isn’t evident until you dive into your teams’ daily responsibilities and learn more about how they work and how data can help them do a better version of it. Let’s look at what a data-driven team can look like in multiple contexts as well as some of the steps required to build that kind of environment.

Medium e3fc559a cdaa 4957 aad3 3be155da1720

What is Governed, Self-Service Business Intelligence and Why is it Important?

Companies are increasingly leaning towards well-governed, self-service BI models that combine the necessary speed and flexibility. Both the self-service model and governed models are distinct entities. In the self-service model, the organization gets direct access to complex technical tools and datasets on-premise. They use these tools to extract data, creating reports and gleaning information from them. With the governed model, the data is fed to an IT team where they construct data pipelines from the data source and put it all into a central data warehouse.

Medium cd3e63cf 6f97 4820 a902 39bd3a45d312

Go Big or Go Home: Total DevOps Guarantees Results

While DevOps implemented using the Total DevOps approach provides a strong foundation for long-term enterprise business improvements, it is important to understand DevOps is not an island. Enterprises implementing DevOps should be aware that DevOps interoperates with other IT systems and practices. Enterprises are well-advised to choose tool-agnostic IT partners that can provide solutions that best suit the needs of each unique enterprise and can integrate and evolve DevOps together with all their IT systems.

Medium e77ee04d 6285 4299 b1e5 a7a87920429a

No one-size-fits-all competencies for project management

Project management is a relatively new profession, there is no consistent picture of what a project manager is, and what competencies individuals filling a project management role should have. There are no one-size-fits-all competencies required for operational project management (OPM) in today's era of digital disruption. Nevertheless, there are certain important behavioural and personal competencies that should always be taken into consideration when appointing a new project manager, or looking at the competencies an already-employed project manager would require in order advancing his or her career prospects.

Medium 15ec76bb f449 4c56 bec4 dd9bf887fd39

SQL Case Study: Helping a Startup CEO Manage His Data

If you know some SQL, I hope you find this article useful as well and see some other things might add to your knowledge. You can mostly write queries with SQL. This is almost right because SQL is very intuitive. In this tutorial, you will learn how to create a table, insert values into it, use and understand some data types, use SELECT statements, UPDATE records, use some aggregate functions and more.

Medium da0e4dfb faee 4aac 8603 8dec5b053da1

Measuring without labels: a different approach to information extraction

Information extraction is a major problem in the fields of natural language processing and web mining, in particular when it comes to evaluating domains where language cannot be taken at face value. In modern artificial intelligence (AI) community, information extraction is done using machine learning. Supervised machine learning methods take training set of webpages, with gold standard extractions, and learn an IE function based on statistical models like conditional random fields and even deep neural nets.

Medium 91c676cf f65d 4b07 94ff 135a379a9c08

Value Based Prioritisation - The Building Block of Any Agile Methodology

Value based prioritisation should be at the centre of any organisation and form the building block of any agile methodology. Companies that prioritise their strategy by value adapt quicker and work iteratively to continuously deliver a more valuable product to their customer, and at a much faster rate than their competitors. Working this way ensures that every team member is directing their energies for the same goal to unlock the full potential of the business.

Medium 060f73ef 44f4 4b17 ad59 ba13a9030bbd

The list of graph visualization libraries

By helping surface information, visualization tools create a bridge between graph data and viewers. Graph libraries are an important layer of the graph technology landscape. They let you build custom visualization application for network data and you can pick from a large catalog depending on your favorite language, license requirement, budget or project needs. These are mainly JavaScript libraries but you’ll also find other languages. This post lists libraries of various ‘depth’, some offering basic layouts and interaction, other more advanced customization and integration options.

Medium 77ee62e7 c479 4270 b90f bc42241a04ce

Five Business Benefits When DevOps Is Done Right

When done well, DevOps can remove inefficiencies by improving process and performance but only when clear outcomes are established. These improvements are transferable across a wide range of industries, with consistent benefits achievable for organisations of all sizes. So if you are looking for reasons why you should introduce DevOps,here are five benefits that  help you make that decision. However, these benefits are all intrinsically linked, so there's little chance that all will immediately appear once your DevOps journey has begun. 

Medium 25c340a5 d0b6 4412 9e10 449c922488e7

Ten Years Of DevOps - Five Ways Businesses Are Still Getting It Wrong

DevOps has come a long way in the last 10 years. From its humble beginnings, the mash-up between development and operations has grown into a major focus for businesses all over the world. Today, more than 70 per cent of companies claim to have adopted DevOps, and it's easy to see why. Sadly, most organisations are failing to hit numbers. Here's five key ways businesses are still getting it wrong - and what they can do about it.

Medium 37792b24 ecab 4184 88bf 1d326271e51c

Unnatural DevOps Delivers Supernatural Results

While DevOps is not natural, a supernatural result is achievable with the right cultural transformation supported by good tools that drive collaboration and automated flow between people and tools in the application delivery workflow. Implementing DevOps properly is challenging. DevOps depends on collaboration; smooth process flow from conception through deployment; and feedback between people, processes and technologies. It’s more natural for people and departments to hoard information and centralize control—traits that are contrary to DevOps best practices. 

Medium 8cbd3915 92ad 4833 bb1e c1e12b292f60

Ten Data Privacy and Encryption Laws Every Business Needs to Know

Every business needs to stay up to date on and comply with the latest encryption and privacy laws. Failure to comply will result in fines that can range upwards of tens of millions of dollars. But which laws do you need to comply with, and what do you have to do? For the sake of this article, we’re just going to focus on the regulations and laws that require encryption or reference the protection of encrypted data. These regulations and laws are sometimes called data encryption laws, data privacy laws or data protection laws. 

Medium 8f848296 f923 46f6 b6cb 6e2c4158a2b3

Cyber security is becoming a matter of good corporate governance, good ethics, and quite simply – good business.

As every enterprise is becoming more and more data-driven, it is key for the Board to realize that cyber security is becoming a central tenet both of its core business and of its social impact and governance strategies. This should the basis on which the cyber security imperative is cemented at Board level. Right where it always belonged. Here are Key factors for boards and executive management to consider in 2019 around cyber security and privacy.

Medium 5166d40d 92d6 461e bb6a 59bbd03e2f7d

Most Organizations Lack Cyber Resilience

Cyberattacks to disrupt the business are now ranked as the third-biggest threat, after phishing and malware. This comes as no surprise because distributed denial-of-service (DDoS) attacks, for instance, can trigger a major service interruption that will bring the business to a standstill. Outages have always been painful but given the trend toward moving workloads and applications off-premises, and operating revenue-critical platforms, business operations virtually come to a stop if the IP network collapses.

Medium 0e484dbf 39c2 4499 b30d e88e50ba4377

An Introduction to Big Data: Clustering

Clustering is a Machine Learning technique that involves the grouping of data points. Given a set of data points, we can use a clustering algorithm to classify each data point into a specific group. In theory, data points that are in the same group should have similar properties and/or features, while data points in different groups should have highly dissimilar properties and/or features. Clustering is a method of unsupervised learning and is a common technique for statistical data analysis used in many fields.

Medium d182a4f6 6661 4ae0 ba69 5d9997037a99

Top 10 Digital Transformation Trends for 2020

While the same core technologies that dominated discussions will continue to be foundational to our collective digital transformation journey, 2020 will be defined by a fresh new class of technologies ready to graduate to the sidelines to center stage. Among them: 5G, AI, advanced data analytics, but also some that may surprise you. Without further ado, here are the 10 among them that will be the most significant in 2020, and will both dominate digital transformation discussions and inform the trajectory of successful digital transformation programs.

Medium daef42c8 b4c9 4310 937d 27d23955b0dd

Cybersecurity in the Age of Digital Banking

Online banking is just one of the online services most of us rely on. But it's a huge part of why robust cybersecurity is utterly essential for consumers and banks alike. So let's talk about cybersecurity and staying safe when it comes to digital banking, for both corporations and the average user. There are several other steps banking customers can take, today, to keep their money and their financial lives safe. Find a bank that provides customizable account and card notifications for transactions, and then take the time to set them up.

Medium 190699bd f4a9 4a4b 8a9a 4f2960bb4e7f

Dev vs. Ops Needs for Large-Scale Version Control Systems

Distributed version control systems (DVCS) offer very fast, lightweight and local software change control capabilities that support many parallel code branches across large project code bases. These are compelling benefits for individual developers and development teams. At their heart, DVCS accomplish this by tracking software changes as a series of file system snapshots in local repositories instead of via management of individual file changes in a central database. The DVCS approach is ideal for individuals and small agile teams because it puts control directly in their hands without the need to transact all file changes.

Medium 8f147a7b d33d 4231 9298 090ad7d71368

Work Smarter: The Rise of the Intelligent Office

Businesses around the globe are creating smart offices to improve productivity; save money on utilities; and create a happier, healthier workforce. If you're planning in on building a smart office, start by figuring out how this technology can improve your existing operating procedures. The goal of creating smart offices is to work smarter, not harder. Don't bring in IoT if it's going to make your job harder. Use it as a tool to make things flow more smoothly.

Medium e6d7de8c 6696 455f 840d 2385133b2591

Cybersecurity Essentials: 5 Tips for Protecting Your Small Biz

As businesses and consumers grow more reliant on mobile devices, there’s a 33-percent surge in mobile malware attacks, according to the Symantec 2019 Internet Security Threat Report. The previous year’s study reports that nearly all malicious mobile payloads are delivered by third-party app markets outside of Google Play and Apple iTunes. By 2023, says Symantec, almost half of all cyberattacks will occur in the United States. Here are 5 cybersecurity essential tips for protecting your small biz.

Medium 7888be95 0a8d 4683 ae66 7706ed8ae854

Five ERP Trends You Need to Know for Business in 2019

Enterprise resource planning (ERP) is a process management software used by businesses that merges various aspects of a business, such as manufacturing, financials, and reporting into one fluid system. In the past, separate software systems were needed for the mentioned business aspects to accomplish all business functions. Today, modern ERP software can bring all business processes together to keep up with all your business needs. Here’s our list of top ERP trends and how they will affect business in 2019.

Medium 7caed3a2 7f01 40c8 a998 c18bddda6ed8

What is Shadow IT?

In the IT world, when you ask someone, ‘what is Shadow IT?’ The answers you get are going to vary quite a bit, some in the industry refer to it as a threat, others are far more optimistic and advise organizations to embrace it. When your employees use software or hardware at work that your IT or security team is unaware of – that’s Shadow IT. In the context of digital certificates, Shadow IT can lead to unexpected expirations, operational downtime, loss of revenues and compliance penalties.

Medium 6aae961e 9199 4342 af4f d5914a408292

Creating a Regulatory Compliance Strategy in the Digital Age

When you run a business, maintaining compliance with all governmental rules and regulations including taxation, worker safety, and environmental measures is key to ongoing viability. Compliance issues often arise from changes in adherence to applicable laws, regulations, and guidelines specific to business practices. It forms the basis of many complaints about governmental interference in private business operations. However, leaders must realize the rules exist for a reason, in many cases to increase parity and promote public health and safety.

The Harvard Innovation Lab

Made in Boston @

The Harvard Innovation Lab