www.idgconnect.com
Open in
urlscan Pro
151.101.66.165
Public Scan
Submitted URL: http://edt.idgconnect.com/c/1pe1BtZib0wxDKObHqrTPaMJyahGL
Effective URL: https://www.idgconnect.com/?utm_source=Adestra&utm_medium=email&utm_content=Header%20logo%20link&utm_campaign=IDG%20Connect...
Submission: On July 14 via api from SG — Scanned from DE
Effective URL: https://www.idgconnect.com/?utm_source=Adestra&utm_medium=email&utm_content=Header%20logo%20link&utm_campaign=IDG%20Connect...
Submission: On July 14 via api from SG — Scanned from DE
Form analysis
1 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
IDG CONNECT * Opinion * Interviews * Analysis/Review * White Papers Welcome! Here are the latest Insider stories. * WS02 CEO templates transformation for CIOs and Sri Lanka * Human vigilance vital in tackling enterprise vulnerability * Pegasystems CTO: No silver bullets, low-code software dos & don’ts * Stack Overflow CEO sets sights on a billion-user opportunity More Insider Sign Out Sign In Register × search Sign Out Sign In Register NEW Insider PRO Learn More Latest Insider * Escaping operational black holes with unified ‘full-fidelity’ observability * Tech start-ups are the solution to boosting economic growth in Africa * CIOs take a business approach to technical debt * Calling time on enterprise scale real-time services NEW FROM IDG Learn More Business * Careers * Digital Transformation * IT Leadership * IT Skills technology * Artificial Intelligence * Cloud Computing * Data Privacy * Security * Internet of Things in-depth * Analysis * Features * Interviews * Opinion region * Africa * Asia-Pacific * Europe * Middle East * North America * South America Regular features * CIO Spotlight * C-suite career advice * CTO Sessions * Secret CSO Resource Library Welcome! Check out the latest Insider stories here. Sign Out Sign In Register More from the Foundry Network The voice of IT leadership Analytics Careers CIO Role Digital Transformation Leadership Government Project Management Security at the speed of business Application Security Cloud Security Identity Management Information Security Network Security Risk Management Security Software Making technology work for business Blockchain Collaboration Mobile Office Software Security Systems Management Windows From the data center to the edge Data Center Internet of Things Linux Networking SD-WAN Servers Storage Wi-Fi Building the next-gen enterprise Analytics Cloud Computing Databases Devops Machine Learning Open Source Software Development * About Us | * Contact | * Privacy Policy | * Cookie Policy | * Member Preferences | * Tax Strategy | * California: Do Not Sell My Personal Info | * Follow Us * * * × Close DATA MESH VS DATA FABRIC: UNDERSTANDING THE POPULAR DATA ARCHITECTURES HACKING THE CLOUD: WHY APIS ARE NOW A TOP THREAT WS02 CEO TEMPLATES TRANSFORMATION FOR CIOS AND SRI LANKA * Don't Miss: * The biggest security threat of 2022 * Cloud computing trends for 2022 * Understanding greenfield, brownfield & bluefield technology Latest Profiles View All * CTO Sessions: Thomas Benjamin, NI * C-suite career advice: Randall Ward, Appfire * CIO Spotlight: Darren Person, The NPD Group * Secret CSO: Martin Jartelius, Outpost24 CTO SESSIONS: THOMAS BENJAMIN, NI DO YOU HAVE ANY TROUBLE MATCHING PRODUCT/SERVICE STRATEGY WITH TECH STRATEGY? “I BELIEVE IN THIS SIMPLE FORMULA: CUSTOMER VALUE =(BLEND) PEOPLE + PROCESS + REUSABLE SERVICES (PLATFORM) + APPLICATIONS.” -------------------------------------------------------------------------------- IDG Connect | * * DATA MESH VS DATA FABRIC: UNDERSTANDING THE POPULAR DATA ARCHITECTURES THIS ARTICLE HIGHLIGHTS KEY DIFFERENCES AND SIMILARITIES BETWEEN DATA MESH AND DATA FABRIC ARCHITECTURE. LEARN HOW THE COMBINATION OF BOTH APPROACHES CAN BUILD A VERSATILE DATA PRODUCT PLATFORM FOR YOUR ENTERPRISE. -------------------------------------------------------------------------------- Yash Mehta | * * C-SUITE CAREER ADVICE: RANDALL WARD, APPFIRE HOW IMPORTANT ARE SPECIFIC CERTIFICATIONS? “WE LOOK TO HIRE THOSE WITH STRONG CHARACTER AND HANDS-ON EXPERIENCE. THAT REAL EXPERIENCE WINS OVER EDUCATION, BECAUSE WE CAN TEACH CERTIFICATIONS, BUT WE CAN’T TEACH CHARACTER AND... -------------------------------------------------------------------------------- IDG Connect | * * HACKING THE CLOUD: WHY APIS ARE NOW A TOP THREAT THE APPLICATION PROGRAMMING INTERFACE (API) IS NOW INTEGRAL TO MANY SERVICES BUT IT’S ALSO A KEY TARGET FOR ATTACKERS. JASON KENT, HACKER IN RESIDENCE AT CEQUENCE SECURITY, LOOKS AT WHY INSECURE APIS ARE NOW TOPPING THREAT CHARTS. -------------------------------------------------------------------------------- Jason Kent | * * CIO SPOTLIGHT: DARREN PERSON, THE NPD GROUP WHAT ADVICE WOULD YOU GIVE TO ASPIRING IT LEADERS? “FIRST AND FOREMOST, MAKE SURE THAT TECHNOLOGY IS SOMETHING THAT EXCITES YOU…. BE WILLING TO CONTINUALLY RE-EVALUATE YOUR WORK.” -------------------------------------------------------------------------------- IDG Connect | * * WS02 CEO TEMPLATES TRANSFORMATION FOR CIOS AND SRI LANKA WS02 DANCES TO DEMAND FOR DIGITAL TRANSFORMATION DESPITE LOCAL AND INTERNATIONAL CHALLENGES. -------------------------------------------------------------------------------- Mark Chillingworth | * * BUILDING CONTINUOUS DATA PROTECTION AGAINST RANSOMWARE ATTACKS THE LARGEST RANSOMWARE ATTACK IN HISTORY - WANNACRY - TORE ACROSS THE GLOBE IN 2017, INFECTING A QUARTER MILLION MACHINES IN MORE THAN 150 COUNTRIES. SINCE THEN A LOT HAS CHANGED IN THE WORLD OF RANSOMWARE, BUT HAVE WE LEARNT ANYTHING?... -------------------------------------------------------------------------------- Christopher Rogers | * * IT'S TIME TO RE-EDUCATE OUR APPROACH TO EDUCATION & TRAINING ALL FORMS OF EDUCATION AND TRAINING ADD TO THE DIVERSITY OF SKILLS AND CAPABILITIES THAT MAKE UP A TECHNOLOGY OR LEADERSHIP TEAM -------------------------------------------------------------------------------- Mark Chillingworth | * * SECRET CSO: MARTIN JARTELIUS, OUTPOST24 LOOKING BACK WITH 20:20 HINDSIGHT, WHAT WOULD YOU HAVE DONE DIFFERENTLY? “IF I GOT TO GO BACK IN TIME, I WOULD TELL YOUNG ME THAT WHAT I THOUGHT WERE TECHNICAL PROBLEMS IN ALMOST 9 OUT OF 10 CASES WERE HUMAN PROBLEMS.” -------------------------------------------------------------------------------- IDG Connect | * * CTO SESSIONS: VENKAT RANGAN, CLARI WHAT PREDICTIONS DO YOU HAVE FOR THE ROLE OF THE CTO IN THE FUTURE? “CTOS WILL NEED TO ADAPT TO THE NEEDS OF “DIGITAL-NATIVE” PEOPLE COMING INTO THE WORKFORCE IN LARGE NUMBERS. THIS GENERATION OF WORKERS DEMAND DIGITAL AGILITY,... -------------------------------------------------------------------------------- IDG Connect | * * HUMAN VIGILANCE VITAL IN TACKLING ENTERPRISE VULNERABILITY SOPHOS SENIOR VICE PRESIDENT ASIA PACIFIC JAPAN GAVIN STRUTHERS DISCUSSES REGIONAL RANSOMWARE TRENDS AND THE NEED FOR HEIGHTENED GLOBAL VIGILANCE. -------------------------------------------------------------------------------- Shilpa Pai Mizar | * * C-SUITE CAREER ADVICE: JOHAN SALENSTEDT, CONFIGIT WHAT TIPS WOULD YOU GIVE TO SOMEONE AIMING FOR A C-LEVEL POSITION? “EMBRACE UNANTICIPATED DISRUPTIONS.” -------------------------------------------------------------------------------- IDG Connect | * * CONTEXTUAL AI HOLDS THE KEY TO ITS BUSINESS VALUE THROUGH PATTERN DETECTION, MACHINE LEARNING IS ALREADY TRANSFORMING BUSINESS PROCESSES BY MAKING SENSE OF AND AUTOMATICALLY CAPTURING AND FILING INCOMING CONTENT. YET IT IS ONLY WHEN INTELLIGENT PROCESS AUTOMATION IS APPLIED WITH... -------------------------------------------------------------------------------- John Bates | * * CIO SPOTLIGHT: FELIX QUINTANA, MX TECHNOLOGIES DO YOU HAVE KPIS TO QUANTIFY THE VALUE OF IT? “WE ARE A DATA-DRIVEN COMPANY, SO WE ARE CONSTANTLY MONITORING AND ANALYSING OUR OBJECTIVES… THIS INVOLVES MEASURING THINGS LIKE CUSTOMER SATISFACTION, NET PROMOTER SCORE, AND ROI ON THE... -------------------------------------------------------------------------------- IDG Connect | * * PEGASYSTEMS CTO: NO SILVER BULLETS, LOW-CODE SOFTWARE DOS & DON’TS WE’VE KNOWN LOW-CODE SOFTWARE SHORTCUTS IN ONE FORM OR ANOTHER FOR MANY YEARS BEFORE THE CURRENT REVOLUTION. PEGASYSTEMS CTO DON SCHUERMAN REFLECTS BACK ON THIS TECHNOLOGY’S CURRENT GUISE AND HELPS TO PROVIDE A FEW LOW-CODE DOS AND... -------------------------------------------------------------------------------- Adrian Bridgwater | * * IDG Connect Follow us * * * * About Us * Contact * Privacy Policy * Cookie Policy * Member Preferences * Tax Strategy * California: Do Not Sell My Personal Info Copyright © 2022 IDG Communications, Inc. Explore the Foundry Network descend * CIO * Computerworld * CSO Online * InfoWorld * Network World