Corretora de criptomoedas tenta formalizar bitcoin, ligado a usos ilegais
By Maria Eduarda Cury Ainda que a transparência e a segurança do bitcoin sejam seus pontos fortes, uma vez que transações ficam registradas em um livro-razão digital público, a moeda é mais utilizada...
View ArticleSam Hinkie to keynote at Cleo Connect 2019
By Christian Hargrave Cleo is pleased to announce that Sam Hinkie, former president and general manager of the Philadelphia 76ers basketball team, and Charles Araujo, principal analyst at Intellyx and...
View ArticleHow to find the best low-code development platform: Ask these 9 questions
By Joe Stangarone 2. What kinds of apps will you be building? As I touched on above, not all low-code platforms are created equal. Some have a very specific focus, while others let you create a wide...
View ArticleWith Zowe, open source and DevOps are democratizing the mainframe computer
The venerable mainframe computer is experiencing a surprising but well-deserved resurgence, as the organizations that depend on these systems realize how important they are for digital initiatives and...
View ArticleIT Operations Crisis Management Lessons from Notre Dame
I was on a conference call when the news flashed across my screen: “Notre Dame Cathedral is on fire.” The news was shocking — and heartbreaking. As the tragedy unfolded, I remember thinking, “How did...
View ArticleText IQ: Using AI to Help Enterprises Find and Secure Sensitive Information
An Intellyx BrainCandy Brief In the modern era of GDPR, heightened compliance demands, and broad privacy concerns, enterprises must now navigate a veritable minefield of risks associated with sensitive...
View ArticleUnauthorized Change: The Devil You Don’t Know
Intellyx BrainBlog by Jason English for Evolven Why do IT governance and configuration management processes fail to catch these unauthorized changes? Everything’s locked down to get ready to stream...
View ArticleCorent: SaaS Enablement as-a-Service to ‘SaaSify’ any App
An Intellyx Brain Candy Brief To turn a traditional, on-premises app into a cloud-based Software-as-a-Service (SaaS) app, simply lift and shift it into a VM and you’re done, right? If only it were that...
View ArticleBPM & Process Mining – Intellyx
By laura.balp As enterprises’ view of business processes evolve from static, rote sequences of tasks to a dynamic, customer-focused context, the business process management (BPM) platforms that help...
View ArticleThe Three Essential Elements to Getting Value Stream Management Right
By Plutora Value Stream Management (VSM) is one of the hottest emerging topics in the world of software delivery. But breakthrough the buzzword static and it may also be the most misunderstood idea...
View Article5 outdated technology practices that doom digital transformations
By Isaac Sacolick Bimodal IT might have been a necessary transition for large IT organizations to better deliver new customer experiences and begin the adoption of agile practices. But it didn’t take...
View ArticleThe Curse of BPMN: Process Modeling for the Digital Era
By Jason Bloomberg If you’re an old consultant like me, when you hear the phrase ‘process modeling,’ you probably think of a group of people in a stuffy conference room, arguing over how the business...
View ArticleWhy are We Still Talking about IBM i?
There’s an old IT joke that the definition of ‘legacy’ is ‘anything that works.’ The applications running on the venerable IBM i midrange operating system are a case in point. The original AS/400. Even...
View ArticleThe crypto black list
By AJ Reardon Jason Bloomberg “We must make all cryptocurrency as we know it today illegal.” We Need To Shut Bitcoin And All Other Cryptocurrencies Down. Here’s Why. (2018) Read the entire article here.
View Article14 Best Business Intelligence LinkedIn and Facebook Groups
By Geoff Hoppe Business Intelligence Groups on LinkedIn Business Intelligence and Analytics Best Practices Full disclosure: IBM’s the group sponsor. That said, BIABP is useful whether you use IBM for...
View ArticleYellowfin: Helping Organizations Find Insights, Tell Stories, and Make...
An Intellyx BrainCandy Brief Organizations have been collecting data for decades. Entire industry sectors have sprung up to help them manage and present it. Despite these efforts, however, most...
View ArticleWhite Paper: How to Bring Cloud-Native Computing to the Enterprise
As the complexity of modern IT continues to explode with no limits in sight, organizations are increasingly leveraging cloud-native computing to bring the best practices of the cloud to their entire IT...
View ArticleLuminati: A Global, Peer-to-Peer Intelligence Network for the Enterprise
An Intellyx BrainCandy Brief In a fast-moving, complex world, enterprise leaders often struggle to navigate the difficult challenges and decisions they must make because they lack one critical...
View ArticleCentripetal Networks: Threat Intelligence Gateway that Leverages Thousands of...
An Intellyx Brain Candy Brief Researchers, administrators, government agencies, and security personnel uncover malicious online behavior on a continual basis, in the form of URLs, IP addresses, and...
View ArticleVectra: AI-Driven Threat Detection and Response in the Cloud
An Intellyx Brain Candy Brief Vectra captures and normalizes network metadata at scale and enriches them with machine learning-derived security information. It then uses this information to detect...
View Article