The 2014 Report on the State of Data Backup for SMBs reveals key insights around data backup, security and recovery as a result of a survey conducted during the first quarter of 2014 by Carbonite, Inc. Discover the 5 key themes to improve your SMB’s data backup, security and recovery in 2014 and beyond!
Making the Leap: Exploring the Push for Cloud AdoptionGov BizCouncil
For a growing number of public and private sector organizations, cloud is the future — a game-changer for mitigating risk, enhancing effectiveness, and initiating new capabilities. To learn more about ongoing progress and challenges associated with cloud adoption, Government Business Council and Salesforce launched an in-depth research study in May 2017.
IDENTIFY THE VALUE, RISK AND COST OF YOUR DATA
A new and largely ignored set of risks are threatening
our organisations. The effects of today’s exploding data
volumes have gone overlooked by most business leaders.
They may be forgiven for this oversight. Previous leaders did not expect their
organisations to cope with data levels growing this fast. Such a data deluge
never previously existed.
We all need to pay close attention because the data deluge is not only set
to continue but to rapidly accelerate, with important consequences for
organisations whose behaviour is stuck in the pre-Databerg Age.
The Databerg concept helps explain how we have got here. Databergs are
caused by adding enormous ‘dark data’ volumes to poorly understood corporate
data. They conceal a threat ‘below the waterline’ that adds significant levels of
risk and cost to organisations. And this risk is rising.
DATABERGS ARE NOT ALL BAD.
WHEN THEY ARE WELL MANAGED,
BUSINESS CRITICAL DATA IS
SAFEGUARDED AND WASTE
IS MINIMISED. WE CAN ONLY
MANAGE WHAT WE SEE.
Shutting down fraud, waste, and abuse: Moving from rhetoric to real solutions...Deloitte United States
Fraud, waste, and abuse in government benefits programs drain billions of taxpayer dollars. Now, new tools and techniques such as predictive analytics, behavioral economics, and collective intelligence offer agencies innovative ways to address the problem. Learn more about fraud, waste and abuse in government in our latest report: http://deloi.tt/2fkKEV0
In-house vs. Outsourced Payroll Processing: Separating Fact from FictionAdrian Boucek
By linking payroll, HR, talent, benefits and time & labor management, an integrated HCM solution can deliver all the perceived benefits of in-house processing with significant added advantages — including superior economies of scale, improved visibility, real-time processing, world-class security and protection against compliance risk.
The 2014 Report on the State of Data Backup for SMBs reveals key insights around data backup, security and recovery as a result of a survey conducted during the first quarter of 2014 by Carbonite, Inc. Discover the 5 key themes to improve your SMB’s data backup, security and recovery in 2014 and beyond!
Making the Leap: Exploring the Push for Cloud AdoptionGov BizCouncil
For a growing number of public and private sector organizations, cloud is the future — a game-changer for mitigating risk, enhancing effectiveness, and initiating new capabilities. To learn more about ongoing progress and challenges associated with cloud adoption, Government Business Council and Salesforce launched an in-depth research study in May 2017.
IDENTIFY THE VALUE, RISK AND COST OF YOUR DATA
A new and largely ignored set of risks are threatening
our organisations. The effects of today’s exploding data
volumes have gone overlooked by most business leaders.
They may be forgiven for this oversight. Previous leaders did not expect their
organisations to cope with data levels growing this fast. Such a data deluge
never previously existed.
We all need to pay close attention because the data deluge is not only set
to continue but to rapidly accelerate, with important consequences for
organisations whose behaviour is stuck in the pre-Databerg Age.
The Databerg concept helps explain how we have got here. Databergs are
caused by adding enormous ‘dark data’ volumes to poorly understood corporate
data. They conceal a threat ‘below the waterline’ that adds significant levels of
risk and cost to organisations. And this risk is rising.
DATABERGS ARE NOT ALL BAD.
WHEN THEY ARE WELL MANAGED,
BUSINESS CRITICAL DATA IS
SAFEGUARDED AND WASTE
IS MINIMISED. WE CAN ONLY
MANAGE WHAT WE SEE.
Shutting down fraud, waste, and abuse: Moving from rhetoric to real solutions...Deloitte United States
Fraud, waste, and abuse in government benefits programs drain billions of taxpayer dollars. Now, new tools and techniques such as predictive analytics, behavioral economics, and collective intelligence offer agencies innovative ways to address the problem. Learn more about fraud, waste and abuse in government in our latest report: http://deloi.tt/2fkKEV0
In-house vs. Outsourced Payroll Processing: Separating Fact from FictionAdrian Boucek
By linking payroll, HR, talent, benefits and time & labor management, an integrated HCM solution can deliver all the perceived benefits of in-house processing with significant added advantages — including superior economies of scale, improved visibility, real-time processing, world-class security and protection against compliance risk.
Why Should Consultants and Systems Integrators Become Certified Information P...John Mancini
How can AIIM's Certified Information Professional program help make your organization more effective? How can you use it to differentiate your firm in a very crowded IT solutions marketplace?
Are You Ready for the Era of Big Data and Extreme Information Management?John Mancini
This is the first part of a 5-part series on the Information Challenges facing organizations. A white paper describing these challenges can be found here - http://pages2.aiim.org/CIPWebPage_InfoProWP.html
Is IT Really the Villain? - Future of Technology in the EnterpriseJohn Mancini
Is IT the Villain? - The Future of Technology in the Enterprise -- A summary of my keynote presentation at the CITE Conference and Expo in San Francisco. How do organizations deal with the advantages of social, mobile, and consumer technologies without losing control?
What does it take to engage employees and customers?John Mancini
A discussion of 1) how the nature of work is changing due to massive technology change; 2) why employee and customer engagement needs to be a key strategy in leveraging this technology change; and 3) why organizations need to take seriously the work assumptions of the Facebook generation and radically more demanding expectations of customers.
From Microfilm to Big Data - How Can One Brain Handle This Much Change Withou...John Mancini
How is Digital Disruption changing the role of Information in our organizations? How do we shift the focus from the "T"(technology) in IT to the "I" (information)?
Focus is on understanding Information Professionals and how they connect with solution providers.
This was presented at the Document Management Solution Providers Executive Forum (http://www.aiim.org/dmspef).
Australia Facebook Performance Report_June2013_Online Circle Digital Lucio Ribeiro
This is our second report for 2013 which provides success benchmarks to increase
your understanding of the strategies and tactics behind some of Australia’s most successful Facebook brand pages.
The Facebook report uses data provided by SocialPulse™ (www.socialpulse.co) with
mathematical and statistical foundations produced in consultation with 95th Percentile Pty Ltd. (John Ward) and information analysed by the Online Circle Data team.
The full report can be downloaded at www.theonlinecircle.com
Internet Marketing Explained - Internet Marketing Academy AustraliaLucio Ribeiro
Internet Marketing Explained by Lucio Ribeiro and Jeff Richardson from www.theonlinecircle.com and www.internetmarketingacademy.com.au and their Melbourne session training.
Australia Facebook Performance Report_October2013_SocialPulse.CoLucio Ribeiro
This is our third report for 2013 which provides success benchmarks to increase
your understanding of the strategies and tactics behind some of Australia’s most successful Facebook brand pages.
The Facebook report uses data provided by SocialPulse™ (www.socialpulse.co) with
mathematical and statistical foundations produced in consultation with 95th Percentile Pty Ltd. (John Ward) and information analysed by the Online Circle Data team.
The full report can be downloaded at www.theonlinecircle.com
Don Draper's 3 Rules of Content MarketingJohn Mancini
A focus on how marketing has changed -- but also on how some elements have stayed the same -- using Don's perspectives as a frame. The presentation describes how the role of content has changed, and the increasing challenges facing organizations to deliver content that is targeted at the role, buying stage, and preferred delivery of prospects and leads.
Third-party Governance and Risk Management - 2018Deloitte UK
This report shows how Third-party Risk Management had continued to benefit from greater executive awareness in 2017 which have allowed organisations to tackle the topic with a renewed focus and investment. This is even more important due to amid prevalent threats of high profile business failure, illegal third-party actions, or regulatory action with punitive fines.
Why Should Consultants and Systems Integrators Become Certified Information P...John Mancini
How can AIIM's Certified Information Professional program help make your organization more effective? How can you use it to differentiate your firm in a very crowded IT solutions marketplace?
Are You Ready for the Era of Big Data and Extreme Information Management?John Mancini
This is the first part of a 5-part series on the Information Challenges facing organizations. A white paper describing these challenges can be found here - http://pages2.aiim.org/CIPWebPage_InfoProWP.html
Is IT Really the Villain? - Future of Technology in the EnterpriseJohn Mancini
Is IT the Villain? - The Future of Technology in the Enterprise -- A summary of my keynote presentation at the CITE Conference and Expo in San Francisco. How do organizations deal with the advantages of social, mobile, and consumer technologies without losing control?
What does it take to engage employees and customers?John Mancini
A discussion of 1) how the nature of work is changing due to massive technology change; 2) why employee and customer engagement needs to be a key strategy in leveraging this technology change; and 3) why organizations need to take seriously the work assumptions of the Facebook generation and radically more demanding expectations of customers.
From Microfilm to Big Data - How Can One Brain Handle This Much Change Withou...John Mancini
How is Digital Disruption changing the role of Information in our organizations? How do we shift the focus from the "T"(technology) in IT to the "I" (information)?
Focus is on understanding Information Professionals and how they connect with solution providers.
This was presented at the Document Management Solution Providers Executive Forum (http://www.aiim.org/dmspef).
Australia Facebook Performance Report_June2013_Online Circle Digital Lucio Ribeiro
This is our second report for 2013 which provides success benchmarks to increase
your understanding of the strategies and tactics behind some of Australia’s most successful Facebook brand pages.
The Facebook report uses data provided by SocialPulse™ (www.socialpulse.co) with
mathematical and statistical foundations produced in consultation with 95th Percentile Pty Ltd. (John Ward) and information analysed by the Online Circle Data team.
The full report can be downloaded at www.theonlinecircle.com
Internet Marketing Explained - Internet Marketing Academy AustraliaLucio Ribeiro
Internet Marketing Explained by Lucio Ribeiro and Jeff Richardson from www.theonlinecircle.com and www.internetmarketingacademy.com.au and their Melbourne session training.
Australia Facebook Performance Report_October2013_SocialPulse.CoLucio Ribeiro
This is our third report for 2013 which provides success benchmarks to increase
your understanding of the strategies and tactics behind some of Australia’s most successful Facebook brand pages.
The Facebook report uses data provided by SocialPulse™ (www.socialpulse.co) with
mathematical and statistical foundations produced in consultation with 95th Percentile Pty Ltd. (John Ward) and information analysed by the Online Circle Data team.
The full report can be downloaded at www.theonlinecircle.com
Don Draper's 3 Rules of Content MarketingJohn Mancini
A focus on how marketing has changed -- but also on how some elements have stayed the same -- using Don's perspectives as a frame. The presentation describes how the role of content has changed, and the increasing challenges facing organizations to deliver content that is targeted at the role, buying stage, and preferred delivery of prospects and leads.
Third-party Governance and Risk Management - 2018Deloitte UK
This report shows how Third-party Risk Management had continued to benefit from greater executive awareness in 2017 which have allowed organisations to tackle the topic with a renewed focus and investment. This is even more important due to amid prevalent threats of high profile business failure, illegal third-party actions, or regulatory action with punitive fines.
Across Health Multichannel Maturometer 2018Across Health
Across Health is pleased to present you with the state of the multichannel landscape in life sciences in Europe, US and emerging markets – now in its tenth year. Results show that digitally trained staff numbers are still at historically low levels, and the same goes for other key enablers for digital transformation. Also, while we see budgets keep on growing, satisfaction remains low.
As organizations continue to undergo digital transformation in every aspect of
business, is the separation between business and technology disappearing? How
tech-savvy are business leaders today, and do tech decision makers believe they will
need to be in the future?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Data collection: October 26, 2021 - February 26, 2022
Respondents: 341 IT, engineering and information security professionals
For over four decades, IT strategy has been about the alignment of technology with the needs of the “customer,” be it an organization, business, end user, or device. The most important part of system acquisition is deciding what to build or buy, as it is better to deliver no solution at all than it is to deliver the wrong solution. But there are two distinct dimensions to getting requirements and ensuring that they, and the IT solution that results, not only aligns with the business as it is, but is built in such a way that it can sustain that alignment in a cost-effective and time-efficient manner. Specifically, (1) narrow requirements, which focus on the short-term needs for specific parts, functions, or processes of the business; and, (2) broad requirements, which focus on a comprehensive, enterprise-wide approach with holistic and longer-range objectives like simplicity, suppleness, and total cost of ownership. We typically call these “Systems Analysis and Design” and “Enterprise Architecture” respectively. Ideally, organizations should be able to do both well, and effectively balance the inevitable tradeoffs between them. Sadly, in the vast majority of organizations, that is not yet the case.
Professor Kappelman will present the results of a ground-breaking study from the Society for Information Management (SIM) Enterprise Architecture Working Group that developed and validated measures for these two distinct types of requirements capabilities. Findings include:
• Empirical validation that there is, in fact, a difference between requirement capabilities in a narrow or individual system context (i.e., Systems Analysis and Design within the bounds of a specific development project), and requirements capabilities in a broad or enterprise context (i.e., Enterprise Architecture regarding how those individual systems fit together in an enterprise-wide strategic design).
• Strong evidence that requirements capabilities overall are immature, with narrow activities more mature than the corresponding broad enterprise capabilities.
• Solid evidence, based on fifteen years of studies, that software development capabilities are generally maturing, but are still fairly immature.
This research provides requirements engineers, software designers, software developers, and other IT practitioners with tools to assess their own requirements engineering and software development capabilities. and compare them with those of their peers. Suggestions for improvements are made.
This third annual survey by TECNA, a non-profit trade association of regional technology organizations which serves as a leading voice in growing the North American technology economy, provides current and future technology trends locally, regionally and nationally. The survey was conducted in partnership with CompTIA, the non-profit association for the IT industry.
Federal IT networks are under more pressure than ever before. Do federal managers have the IT services they need to effectively do their jobs? If not, how can agencies bring their IT infrastructure up to speed?
EMA Research Director Valerie O’Connell provides insights into the current, practical, and desired states of incident response and management, including:
- The roles of AI and automation in incident management
- Practical use cases for gen AI
- Business metrics and results
- Near-term investments and anticipated changes
- How organizations are changing to exploit technology advances
Given the breadth and pace of innovation, all signs point to a widening skills gap. This will put further pressure on organizations of all sizes to rethink their workforce strategies. While the notion of a skills gap is a seemingly straightforward concept, below the surface, there are many nuances to the story. This CompTIA research report explores these issues, setting the stage for approaches to tackling the IT skills gap.
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...DATAVERSITY
<!-- wp:paragraph -->
<p>Becoming a data-driven organization is something many companies aspire to, but few are able to obtain. Let’s face it: Data is confusing. It is complicated, dirty, and spread out all over a business. While companies are making big investments in Data Management projects, only a few are seeing the payoff. </p>
<!-- /wp:paragraph -->
<!-- wp:paragraph -->
<p>New research from Experian shows that despite many ongoing data initiatives, 69 percent of organizations struggle to be data-driven. The struggles are real. Companies face a large data debt, look at data projects through a siloed lens, and still have a large volume of inaccurate data. In fact, 65 percent report inaccurate data is undermining key initiatives. <br></p>
<!-- /wp:paragraph -->
<!-- wp:paragraph -->
<p>However, the tide is turning. Businesses are starting to adopt data enablement, or a practice of empowering a larger group of individuals within the business to understand and harness the power of data and analytics. Companies that empower wider data usage are better able to comply with regulations, improve decision-making, and, of course, deliver a superior customer experience. Are these the results you’re striving for? </p>
<!-- /wp:paragraph -->
<!-- wp:paragraph -->
<p>Join us to uncover new research from more than 500 Data Management practitioners as we take a deep dive into:</p>
<!-- /wp:paragraph -->
<!-- wp:list -->
<ul><li>The top challenges in becoming a data-driven organization </li><li>Trends and the rise of data enablement </li><li>The profile of a mature organization </li><li>Tips for how you can adopt data enablement practices</li></ul>
<!-- /wp:list -->
Slides: Bridging the Data Disconnect – Trends in Global Data ManagementDATAVERSITY
Maintaining a competitive edge in today’s digital landscape hinges on the ability to leverage accurate and reliable data to make informed and strategic business decisions. But transforming data from liability to strategic asset is far from simply flipping a switch.
New research from Experian shows that while 85 percent of businesses believe data is one of their most valuable assets, a high degree of inaccuracy is hindering critical initiatives. In addition, rising levels of data debt and a data skills shortage are converging to make data insights harder to achieve. To tackle the large degree of distrust in information, a growing number of companies are investing in specialized data talent and data literacy programs.
Join us to uncover new research from more than 1,000 global professionals as we take a deep dive into:
• The top challenges in leveraging trusted data
• How data debt drags down ROI
• Trends around data skills, talent, and the rise of data literacy
• Tips for how you can drive a data-driven culture
A shift in organizational approach to digital over the past five years indicates that companies have become increasingly aware that they must eliminate structural barriers to realize the opportunities
It’s been three years since the General Data Protection Regulation shook up how organizations manage data security and privacy, ushering in a new focus on Data Governance. But what is the state of Data Governance today?
How has it evolved? What’s its role now? Building on prior research, erwin by Quest and ESG have partnered on a new study about what’s driving the practice of Data Governance, program maturity and current challenges. It also examines the connections to data operations and data protection, which is interesting given the fact that improving data security is now the No. 1 driver of Data Governance, according to this year’s survey respondents.
So please join us for this webinar to learn about the:
Other primary drivers for enterprise Data Governance programs
Most common bottlenecks to program maturity and sustainability
Advantages of aligning Data Governance with the other data disciplines
In a post-COVID world, data has the power to be even more transformative, and 84% of business and technology professionals say it represents the best opportunity to develop a competitive advantage during the next 12 to 24 months. Let’s make sure your organization has the intelligence it needs about both data and data systems to empower stakeholders in the front and back office to do what they need to do.
Similar to Document Management in State and Local Government (20)
5 things you didn't know about automating governance and complianceJohn Mancini
Prospectus and presentation for upcoming multi-client research project by AIIM on the intersection between artificial intelligence & machine learning and information governance.
Digital Disruption and the Challenge of Keeping Members EngagedJohn Mancini
Some thoughts about how disruptive technologies impact the value proposition for how associations engage their members. From my keynote at the Aptify User Conference last year.
5 Strategies to Avoid the Digital RiptideJohn Mancini
Keynote presentation at the ABBYY Partner Conference in Tokyo -- How can you turn digital DISRUPTION into digital TRANSFORMATION? I did a broader accompanying blog post on some of these themes here -- http://info.aiim.org/digital-landfill/3-lessons-from-japanese-trains-information-management-and-the-internet-of-things
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
My #AIIM14 keynote -- Mancini's Law --
Organizations are systems of information networks. They only operate effectively when there are clear and predictable information flows within and between these networks.
50% annual growth in the volume of digital information means that these networks – and especially the points of connection between them – will become increasingly unstable.
Without intervention, the resulting #infochaos will threaten the viability of the entire system.
e-book here -- http://www.aiim.org/infochaos
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
Everything You Need to Know About...
...The History of Enterprise IT (1 slide)
...How Enterprise IT Buyers Are Changing (1 slide)
...How to Turn Information Chaos into Business Benefit (1 slide)
Wake up, C-Suite -- #InfoChaos is ApproachingJohn Mancini
Information Governance usually puts the C-Suite to sleep. But unless they start treating it as a strategic priority, organizations run the risk of being overwhelmed by #InfoChaos. A summary of the latest research by AIIM, ARMA, and Cohasset Associates.
Track keynote presentation at #otew2013, Open Text Enterprise World. Why our approach to information governance needs to change -- and focus on the BUSINESS.
How is Big Content Different From Big Data?John Mancini
Moving the Mountain -- Evanta CIO Presentation on Big Data and Big Content -- central premise -- Big Data analysis without a strategy for the Content that usually fulfills the analytics is a waste of time.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
3. Enterprise Content Management (ECM) = the tools and
technologies used to:
• Capture — move content (in any form) into your
repositories for reuse or retirement
• Manage — move it around the enterprise to drive key
applications and processes
• Store — put it in a logical place for easy access
• Preserve — long-term archival and storage
• Deliver — get to the right audience on the right device
…documents and content related to organizational
processes.
4. ECM = The mass of
unmanaged
electronic stuff in
your organization
5. We are the community that
provides education, research, and
best practices to help organizations
control information and maximize
its value.
26. 58%
how confident are you that your
electronic information is accurate,
trustworthy, and accessible?
% “slightly confident” or “not confident
at all”
State and local govt only, N=156
27. Federal Rules of Civil Procedure 26
and 34, which went into effect
December 1, 2006, use the term
“electronically stored information”
rather than the term “data
compilation” and identify it as a
distinctive category of information
subject to discovery obligations on par
with “documents” and “things.”
28. 40%
Imagine you are being sued...how long
would it take to find all the information
related to that person?
% more than one month
State and local govt only, N=156
29. This isn’t about being perfect.
But it is about having a defensible
process.
30. Disagree
25%
My organization takes its RM
obligations seriously. Agree
75%
Agree
My organization’s RM
38%
directives are consistently
Disagree
enforced.
62%
AIIM E-Mail Survey, large organizations only, N=582
31. The more I know
the more worried I
get
33% vs. 10%
“Fair” or “Marginal”
33. 65%
On a scale of 1 (TERRIBLE) to 10
(EXCELLENT) the percentage
evaluating their overall effectiveness in
managing electronic information as 5 or
Less.
34. What do you see as the most important business
driver for document and records management (8
choices)...?
32% improve efficiency
28% compliance
17% better customer service
State and local govt only, N=156
35. Top interests next 12-18 months (14 choices)
RM and archiving = 77%
E-mail management = 62%
Business continuity/risk management = 40%
Statutory and regulatory compliance = 39%
State and local govt only, N=156
36. How would you compare the ROI of your distributed capture
implementation with other IT implementations?
worse much
4% better
8%
better
about the same
40%
49%
State and local govt only, N=75
37. What are the biggest pitfalls in
considering an ECM
implementation?
39. 25%
“I have heard of the term ecm with
regards to information management.”
40. The big three challenges (choose one)
Change management = 30%
Justifying the investment = 28%
Getting employee commitment = 24%
State and local govt only, N=156
41. What kind of planning do you need to
do to be successful?
42. Who has the most important role in determining
whether or not to implement an ERM solution?
31% IT
27% RM
23% Operations and Admin
State and local govt only, N=146
43. 62%
“how well do your it people understand
electronic records?”
1= “they know nothing”
10= “they are completely competent”
% 5 or less
44. Top three problems in managing a records or
document implementation (14 choices)...
41% lack of knowledge and
training
40% underestimated process
and organizational issues
project derailed by
35% internal politics
State and local govt only, N=156
47. PUBLIC SECTOR: How does the effectiveness of your
organization compare to your peers? (% “more effective” or
“much more effective”)
44
# of organizations viewing themselves as
effective = 2.3X more in strategic sample
19
No ECM Strategic ECM
AIIM State of Industry survey