SlideShare a Scribd company logo
IT Technology Future 2020
Technology and Impacts
Copyright © 2017, All Rights Reserved
Russ Finney
Advisory Partner & Researcher
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
IT Imperatives
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Digital Maturity Drivers
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Digital Disruption & Commerce
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Digital Disruption & Commerce
Digital Disruption & Commerce
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
What does this mean for IT?
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
IT vendors are racing to provide solutions
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Microsoft is Getting Aggressive in the Cloud
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
IoT Platforms are Showing up Everywhere
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
RFA, ML, and AI are Creeping In
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
RFA, ML, and AI are Creeping In
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Modern Day Advanced Counter Measures: Enough?
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
Leveraging Communications
Formal Board & Business & Staff Board Risk
Informal Peers & Staff Operations Speed
Elevator Pitch Everyone Finance Cost
itmWEB Group LLC
Advisory Partner | Researcher
Russ@itmWEB.com
Twitter: @rfinney
Cell: 512-751-6454
Phone: 512-349-2445
Russ Finney
Requests Welcome
Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney

More Related Content

Similar to IT Technology Future 2020

A New Class of Buyers for Industry 4.0
A New Class of Buyers for Industry 4.0A New Class of Buyers for Industry 4.0
A New Class of Buyers for Industry 4.0
Godfrey
 
Social Research by Joe Martin
Social Research by Joe MartinSocial Research by Joe Martin
Social Research by Joe Martin
Utah Digital Marketing Collective
 
Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018
R-Style Lab
 
HR in disruptive world
HR in disruptive worldHR in disruptive world
HR in disruptive world
Tas Chantree
 
Digital marketing master class session 1
Digital marketing master class session 1Digital marketing master class session 1
Digital marketing master class session 1
Kenny Soto
 
CWIN17 telford architecting for the new digital - david rutter
CWIN17 telford   architecting for the new digital - david rutterCWIN17 telford   architecting for the new digital - david rutter
CWIN17 telford architecting for the new digital - david rutter
Capgemini
 
Digital Marketing Master Class Session 3
Digital Marketing Master Class Session 3Digital Marketing Master Class Session 3
Digital Marketing Master Class Session 3
Kenny Soto
 
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
Amazon Web Services
 
Department of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and BeyondDepartment of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and Beyond
immixGroup
 
The Internet Report: Episode 7 Week of May 4 - May 10
The Internet Report: Episode 7 Week of May 4 - May 10The Internet Report: Episode 7 Week of May 4 - May 10
The Internet Report: Episode 7 Week of May 4 - May 10
ThousandEyes
 
Leveraging Location-Based Insights to Maximize Mobile Advertising Revenue
Leveraging Location-Based Insights to Maximize Mobile Advertising RevenueLeveraging Location-Based Insights to Maximize Mobile Advertising Revenue
Leveraging Location-Based Insights to Maximize Mobile Advertising Revenue
MediaPost
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
Alex Ortiz
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
How should startups embrace the trend of IoT and Big Data
How should startups embrace the trend of IoT and Big DataHow should startups embrace the trend of IoT and Big Data
How should startups embrace the trend of IoT and Big Data
Ruvento Ventures
 
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
Hector Del Castillo, CPM, CPMM
 
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile HubMBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
Amazon Web Services
 
Achieving digital maturity: Adapting your company to a changing world
Achieving digital maturity: Adapting your company to a changing worldAchieving digital maturity: Adapting your company to a changing world
Achieving digital maturity: Adapting your company to a changing world
Deloitte United States
 
WPT202_Bridging the Racial Digital Divide
WPT202_Bridging the Racial Digital DivideWPT202_Bridging the Racial Digital Divide
WPT202_Bridging the Racial Digital Divide
Amazon Web Services
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?
Amazon Web Services
 
8 Tasks for Digital Journalists
8 Tasks for Digital Journalists8 Tasks for Digital Journalists

Similar to IT Technology Future 2020 (20)

A New Class of Buyers for Industry 4.0
A New Class of Buyers for Industry 4.0A New Class of Buyers for Industry 4.0
A New Class of Buyers for Industry 4.0
 
Social Research by Joe Martin
Social Research by Joe MartinSocial Research by Joe Martin
Social Research by Joe Martin
 
Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018Web Development Trends to Watch in 2018
Web Development Trends to Watch in 2018
 
HR in disruptive world
HR in disruptive worldHR in disruptive world
HR in disruptive world
 
Digital marketing master class session 1
Digital marketing master class session 1Digital marketing master class session 1
Digital marketing master class session 1
 
CWIN17 telford architecting for the new digital - david rutter
CWIN17 telford   architecting for the new digital - david rutterCWIN17 telford   architecting for the new digital - david rutter
CWIN17 telford architecting for the new digital - david rutter
 
Digital Marketing Master Class Session 3
Digital Marketing Master Class Session 3Digital Marketing Master Class Session 3
Digital Marketing Master Class Session 3
 
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
ABD218_How Euroleague Basketball Uses IoT Analytics to Engage Fans- ABD218
 
Department of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and BeyondDepartment of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and Beyond
 
The Internet Report: Episode 7 Week of May 4 - May 10
The Internet Report: Episode 7 Week of May 4 - May 10The Internet Report: Episode 7 Week of May 4 - May 10
The Internet Report: Episode 7 Week of May 4 - May 10
 
Leveraging Location-Based Insights to Maximize Mobile Advertising Revenue
Leveraging Location-Based Insights to Maximize Mobile Advertising RevenueLeveraging Location-Based Insights to Maximize Mobile Advertising Revenue
Leveraging Location-Based Insights to Maximize Mobile Advertising Revenue
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
How should startups embrace the trend of IoT and Big Data
How should startups embrace the trend of IoT and Big DataHow should startups embrace the trend of IoT and Big Data
How should startups embrace the trend of IoT and Big Data
 
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
7 Strategies To Increase IoT Security - IoT Slam 2017 Conference
 
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile HubMBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
MBL206_Building Conversational Bot Interfaces with Amazon Lex and AWS Mobile Hub
 
Achieving digital maturity: Adapting your company to a changing world
Achieving digital maturity: Adapting your company to a changing worldAchieving digital maturity: Adapting your company to a changing world
Achieving digital maturity: Adapting your company to a changing world
 
WPT202_Bridging the Racial Digital Divide
WPT202_Bridging the Racial Digital DivideWPT202_Bridging the Racial Digital Divide
WPT202_Bridging the Racial Digital Divide
 
SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?SEC305 Where do you find your next 20 cloud security experts?
SEC305 Where do you find your next 20 cloud security experts?
 
8 Tasks for Digital Journalists
8 Tasks for Digital Journalists8 Tasks for Digital Journalists
8 Tasks for Digital Journalists
 

More from JoAnna Cheshire

The Future of Work
The Future of WorkThe Future of Work
The Future of Work
JoAnna Cheshire
 
Catching the Next Train
Catching the Next TrainCatching the Next Train
Catching the Next Train
JoAnna Cheshire
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
JoAnna Cheshire
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
JoAnna Cheshire
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's Guide
JoAnna Cheshire
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs Perspective
JoAnna Cheshire
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management
JoAnna Cheshire
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search
JoAnna Cheshire
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groups
JoAnna Cheshire
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flow
JoAnna Cheshire
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flow
JoAnna Cheshire
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition Dilemma
JoAnna Cheshire
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
JoAnna Cheshire
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about it
JoAnna Cheshire
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
JoAnna Cheshire
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
JoAnna Cheshire
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
JoAnna Cheshire
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's Brand
JoAnna Cheshire
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 

More from JoAnna Cheshire (20)

The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
Catching the Next Train
Catching the Next TrainCatching the Next Train
Catching the Next Train
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
 
PowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's GuidePowerShell + SharePoint Online - An Admin's Guide
PowerShell + SharePoint Online - An Admin's Guide
 
Artificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs PerspectiveArtificial Intelligence & Machine Learning - A CIOs Perspective
Artificial Intelligence & Machine Learning - A CIOs Perspective
 
Modernizing Data Management
Modernizing Data Management Modernizing Data Management
Modernizing Data Management
 
Microsoft and Enterprise Search
Microsoft and Enterprise Search Microsoft and Enterprise Search
Microsoft and Enterprise Search
 
Introduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groupsIntroduction to Microsoft Teams and Office 365 groups
Introduction to Microsoft Teams and Office 365 groups
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Accelerate your business with flow
Accelerate your business with flowAccelerate your business with flow
Accelerate your business with flow
 
Building applications for your business using power apps and flow
Building applications for your business using power apps and flowBuilding applications for your business using power apps and flow
Building applications for your business using power apps and flow
 
The Decomposition Dilemma
The Decomposition DilemmaThe Decomposition Dilemma
The Decomposition Dilemma
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Defending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about itDefending against Ransomware and what you can do about it
Defending against Ransomware and what you can do about it
 
The New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business AdvantageThe New Convergence of Data; the Next Strategic Business Advantage
The New Convergence of Data; the Next Strategic Business Advantage
 
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStoreHealthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
 
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
 
Define Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's BrandDefine Yourself! Crafting a Wonder Woman's Brand
Define Yourself! Crafting a Wonder Woman's Brand
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

IT Technology Future 2020

  • 1. IT Technology Future 2020 Technology and Impacts Copyright © 2017, All Rights Reserved Russ Finney Advisory Partner & Researcher
  • 2. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney IT Imperatives
  • 3. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Digital Maturity Drivers
  • 4. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Digital Disruption & Commerce
  • 5. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Digital Disruption & Commerce
  • 6. Digital Disruption & Commerce Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
  • 7. What does this mean for IT? Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney
  • 8. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney IT vendors are racing to provide solutions
  • 9. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Microsoft is Getting Aggressive in the Cloud
  • 10. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney IoT Platforms are Showing up Everywhere
  • 11. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney RFA, ML, and AI are Creeping In
  • 12. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney RFA, ML, and AI are Creeping In
  • 13. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Modern Day Advanced Counter Measures: Enough?
  • 14. Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney Leveraging Communications Formal Board & Business & Staff Board Risk Informal Peers & Staff Operations Speed Elevator Pitch Everyone Finance Cost
  • 15. itmWEB Group LLC Advisory Partner | Researcher Russ@itmWEB.com Twitter: @rfinney Cell: 512-751-6454 Phone: 512-349-2445 Russ Finney Requests Welcome Copyright © 2017, All Rights Reserved Russ@itmWEB.com Twitter: @rfinney