recentpopularlog in

jonerp : concepts   144

« earlier  
10 Ways To Own Your Cybersecurity In 2020
"Vault away passwords to critical systems and data. In the privileged access world of Cybersecurity operations in any organization, password vaults have become commonplace. Password vaults are similar to password managers many people use for their personal devices, web applications, and sites they regularly visit. In the case of a password vault, privileged credentials are checked in and out by admins, with each password automatically rotating to ensure greater randomization."
business  featured  posts  technology  software  trends  &  concepts  amazon  echo  bring-your-own-device  centrify  zero  trust  privilege.  cybersecurity  dashlane  google  home  lastpass 
22 days ago by jonerp
10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
"Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  platform  resilience  software’s  2019  endpoint  security  report  asset  intelligence 
28 days ago by jonerp
If they sold enterprise software on television …
"It was either the late night spicy burrito or falling asleep while the television was still on but I could have sworn I saw an infomercial pitching enterprise software. Worse, I could have sworn it was colleague Jon Reed and I selling that stuff! Here’s my recollection of what that interminable, obnoxious ad contained"
trends  &  concepts  humor  satire 
5 weeks ago by jonerp
Shadow IT Is The Cybersecurity Threat That Keeps Giving All Year Long
"Shadow personal IoT voice assistants, Amazon Kindles, smartphone, and tablet devices are proliferating across enterprise networks today, accelerated by last-minute shopping everyone is trying to get done before the end of December. 82% of organizations have introduced security policies governing the use of these devices but just 24% of employees are aware of them. Meanwhile, the majority of IT senior management, 88%, believe their policies are effective. These and many other fascinating insights are from a recent study completed by Infoblox titled, What is Lurking on Your Network, Exposing the threat of shadow devices (PDF, 7 pp., no opt-in)."
business  featured  posts  technology  software  trends  &  concepts  byod  chief  information  officer  christmas  amazon  shopping  sales  ciso  cybercrime 
8 weeks ago by jonerp
Outward-Facing Corporate Culture
"In Tech, the most scarce and valuable input is talented people. Attracting and retaining these talented people is harder than any other industry except perhaps Finance, but in Tech compensation is driven by the long term incentive alignment of stock options. Ownership. As software is eating the world, and software is made of people, the effective norms for talent will extend from and beyond Tech.

The Google Walkout and other visible Tech employee activism are a cultural revolution against inward-facing corporate cultures that failed them. The employees-as-stakeholder had bought into Google’s Don’t Be Evil values that were part of it’s founding. But this value was astonishingly repealed. In Google’s case employees revolted against creating products that were being sold for evil."
featured  posts  trends  &  concepts  corporate  culture  change  hr  techlash  values 
9 weeks ago by jonerp
Why Cybersecurity Needs To Focus More On Customer Endpoints
"There are over thirty vendors competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications."
business  featured  posts  technology  software  trends  &  concepts  absolute  persistence  resilience  (tse:  abt)  asset  management  christy  wyatt  ceo  of  cloud-based  endpoint  protection  platforms  (epp) 
10 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
11 weeks ago by jonerp
What’s New On The Zero Trust Security Landscape In 2019
"The latest Forrester Wave adds in and places high importance on Zero Trust eXtended (ZTX) ecosystem advocacy, allocating 25% of the weight associated with the Strategy section on the scorecard. Forrester sees Zero Trust as a journey, with vendors who provide the greatest assistance and breadth of benefits on a unified platform being the most valuable. The Wave makes it clear that Zero Trust doesn’t refer to a specific technology but rather the orchestration of several technologies to enable and strengthen their Zero Trust framework. Key insights from what’s new this year in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 include the following.."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  forrester  wave™:  zero  trust  extended  ecosystem  platform  providers  louis  columbus'  blog  mobile  security  mobileiron  mobility  q4  2019 
12 weeks ago by jonerp
10 Charts That Will Change Your Perspective Of AI In Security
"AI’s greatest benefit is the increase in the speed of analyzing threats (69%) followed by an acceleration in the containment of infected endpoints/devices and hosts (64%). Because AI reduces the time to respond to cyber exploits organizations can potentially save an average of more than $2.5 million in operating costs. Source: The Value of Artificial Intelligence in Cybersecurity – Sponsored by IBM Security Independently conducted by Ponemon Institute LLC, July 2018."
business  featured  posts  technology  software  trends  &  concepts  ai  cybersecurity  artificial  intelligence  cyberattacks  fraud  detection  louis  columbus'  blog 
12 weeks ago by jonerp
5 Proven Ways Manufacturers Can Get Started With Analytics
" I believe they’re in a tough situation with customers wanting short-notice production time while supply chains often needing to be redesigned to reduce or eliminate tariffs. They’re turning to analytics to gain the insights they need to take on these challenges and more. The graphic below is from Gartner’s latest survey of heavy manufacturing CIOs, it indicates the technology areas where heavy manufacturing CIOs’ organizations will be spending the largest amount of new or additional funding in 2019 as well as the technology areas where their organizations will be reducing funding by the highest amount in 2019 compared with 2018"
business  featured  posts  technology  software  trends  &  concepts  2019  analytics  spending  manufacturing  cio  agenda  heavy  insights  intelligence  crm  gartner  louis  columbus’  blog  cycle  time 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
Improving Endpoint Security Needs To Be A Top Goal In 2020
"Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organizations’ endpoints with increasing frequency. Endpoint attacks and their levels of complexity will accelerate as cybercriminals gain greater mastery of these techniques."
business  featured  posts  technology  software  trends  &  concepts  absolute  absolute’s  2019  endpoint  security  report  cyberattacks  cybersecurity 
november 2019 by jonerp
What’s New In Gartner’s Hype Cycle For CRM, 2019
"Four new technologies are on the Hype Cycle for CRM, reflecting enterprises’ need for greater integration of diverse systems and the demand for more predictive and prescriptive analytics-based insights. The four technologies include the following."
business  featured  posts  technology  software  trends  &  concepts  2019  gartner  hype  cycle  for  crm  sales  louis  columbus’  blog  partner  relationship  management  configure  price  quote  cpq  customer 
october 2019 by jonerp
How To Make Complex CPQ Selling Simple With Visual Configurators
"Visual configurators are capable of so much more than they are delivering today. It’s time to graduate beyond the shock-and-awe stage, which has been very successful in driving leads, generating MQLs, and closing deals. It’s time to get down to the hard work of making all those impressive models buildable at scale and profitable. And that comes by doubling down efforts at shortening cycle times from product concept to completed product. That’s the true north of this market and the secret to succeeding. Getting engineering, manufacturing, and sales collaborating using product models as a single source of truth is the best place to start."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
october 2019 by jonerp
How To Improve Your CPQ Pricing Strategies
"The typical manufacturer who has over $100M in sales generates 40% or more of their sales through indirect channels. The channel partners they recruit and sell through are also reselling 12 other competitive products on average. Which factors most influence a distributor or channel partner’s decision to steer a sale to one manufacturer versus another? The following are the steps manufacturers can take now to improve price management and drive more channel sales."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  engineer-to-order  louis  columbus'  blog  price  and  quote  pricing  management  product  configuration 
october 2019 by jonerp
What’s New In Gartner’s Hype Cycle For AI, 2019
"
Between 2018 and 2019, organizations that have deployed artificial intelligence (AI) grew from 4% to 14%, according to Gartner’s 2019 CIO Agenda survey.
Conversational AI remains at the top of corporate agendas spurred by the worldwide success of Amazon Alexa, Google Assistant, and others.
Enterprises are making progress with AI as it grows more widespread, and they’re also making more mistakes that contribute to their accelerating learning curve."
business  featured  posts  technology  software  trends  &  concepts  ai  cloud  computing  gartner  hype  cycle  for  artificial  intelligence  2019  louis  columbus'  blog 
october 2019 by jonerp
Three Reasons Why Killing Passwords Improves Your Cloud Security
"The Twitter CEO’s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices. Verizon’s Mobile Security Index 2019 revealed that the majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device. Mobile devices are one of the most porous threat surfaces a business has. They’re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID. IDG’s recent survey completed in collaboration with MobileIron, titled Say Goodbye to Passwords found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  hackers  jack  dorsey  louis  columbus'  blog  mobileiron  twitter  hack  zero  trust  networks 
september 2019 by jonerp
State Of AI And Machine Learning In 2019
"Data mining, advanced algorithms, and predictive analytics are among the highest-priority projects for enterprises adopting AI and machine learning in 2019. Reporting, dashboards, data integration, and advanced visualization are the leading technologies and initiatives strategic to Business Intelligence (BI) today. Cognitive BI (artificial-intelligence-based BI) ranks comparatively lower at 27th among priorities. The following graphic prioritizes the 27 technologies and initiatives strategic to business intelligence."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  louis  columbus'  blog  machine  learning  ml  state  of  2019  and  in 
september 2019 by jonerp
5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report
"Endpoint security controls and their associated agents degrade and lose effectiveness over time. Over 42% of endpoints experience encryption failures, leaving entire networks at risk from a breach. They’re most commonly disabled by users, malfunction or have error conditions or have never been installed correctly in the first place. Absolute found that endpoints often failed due to the fragile nature of their encryption agents’ configurations. 2% of encryption agents fail every week, and over half of all encryption failures occurred within two weeks, fueling a constant 8% rate of decay every 30 days. 100% of all devices experiencing encryption failures within one year.'
business  featured  posts  technology  software  trends  &  concepts  absolute  security  cybersecurity  endpoint  louis  columbus'  blog 
september 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
Mobile Identity Is The New Security Perimeter
"89% of security leaders believe that mobile devices will serve as your digital ID to access enterprise services and data in the near future according to a recent survey by IDG completed in conjunction with MobileIron, titled Say Goodbye to Passwords. You can download a copy of the study here. Mobile devices are increasingly becoming the IDs enterprises rely on to create and scale a mobile-centric zero trust security network throughout their organizations."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  mobileiron  smartphones  zero  trust  network  security 
september 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
What Needs To Be On Your CPQ Channel Roadmap In 2019
"Manufacturers can realize greater revenue potential through their channels by combining machine learning insights to find those aftermarket customers most ready to buy while accelerating sales closing cycles with CPQ. Manufacturers want to make sure they are getting their fair share of the aftermarket. Using a machine learning-based application, they can help their resellers increase average deal sizes by knowing which products and services to offer when. They’ll also know when to present upsell and cross-sell offers into an account at a specific point in time when they will be most likely to lead to additional sales, all based on machine learning-based insights. Combining machine learning-based insights to guide resellers to the most valuable and highest probability customer accounts ready to buy with an intuitive CPQ system increases sales efficiency leading to higher revenues."
business  featured  posts  technology  software  trends  &  concepts  configure  cpq  elogic  engineer-to-order  louis  columbus'  blog  price  and  quote  product  configuration 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
Want to survive the AI era? YOU have a simple choice to make…
"When it comes to staying relevant in today’s workforce, let’s get to the heart of the matter – YOU have a simple choice to make:

Do nothing and be part of the “Frozen Middle”. Decide you can’t be bothered to learn anything new, so make sure your firm has the same attitude (or has a thin veneer of innovation masking a cesspool of lethargy and love of perpetuating legacy processes and business practices). And ride this next wave of hype out for a few years before you can quietly ride off into a comfortable sunset, or…
Become a change-driver. Decide you have to get ahead of emerging technologies and their massive impact on business ecosystems and make sure your firm has what it takes to sponsor your burning ambition to drive cultural changes, new learning and ability to rethink how business processes and practices are wired."
featured  posts  trends  &  concepts 
july 2019 by jonerp
Salesforce Now Has Over 19% Of The CRM Market
"72.9% of CRM spending was on software as a service (SaaS) in 2018, which is expected to grow to 75% of total CRM software spending in 2019.
Worldwide enterprise application software revenue totaled more than $193.6B in 2018, a 12.5% increase from 2017 revenue of $172.1B. CRM made up nearly 25% of the entire enterprise software revenue market."
business  featured  posts  technology  software  trends  &  concepts  adobe  marketing  crm  customer  relationship  management  hubspot  louis  columbus'  blog  oracle  salesforce 
july 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
Smart Machines Are The Future Of Manufacturing
"Capturing IIoT’s full value potential will require more sophisticated integrated approaches than current automation protocols provide. IIoT manufacturing systems are quickly becoming digital manufacturing platforms that integrate ERP, MES, PLM and CRM systems to provide a single unified view of product configurations and support the design-to-manufacturing process."
business  featured  posts  technology  software  trends  &  concepts  design-to-manufacture  iiot  industrial  internet  of  things  louis  columbus'  blog  manufacturing  intelligence 
june 2019 by jonerp
What Matters Most In Business Intelligence, 2019
"Improving revenues using BI is now the most popular objective in 2019, despite BI initially being positioned as a solution for compliance and risk management. Executive Management, Marketing/Sales, and Operations are driving the focus on improving revenues this year. Nearly 50% of enterprises now expect BI to deliver better decision making, making the areas of reporting, and dashboards must-have features. Interestingly, enterprises aren’t looking to BI as much for improving operational efficiencies and cost reductions or competitive advantages."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  intelligence  dashboards  data  integration  dresner  advisory  associates  louis  columbus’  blog  manufacturing 
june 2019 by jonerp
The State Of 3D Printing, 2019
"Proof of concepts and prototyping dominate 3D printing applications in 2019. Manufacturers are increasing their reliance on 3D printing as part of their broader manufacturing strategies, with production use up to 51% of all respondents from 38.7% in 2018. The following compares 2019’s purpose of 3D prints versus the last five years of survey data."
business  featured  posts  technology  software  trends  &  concepts  3d  modeling  printing  forecast  in  manufacturing  prototyping  design-to-manufacture  louis  columbus'  blog 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
Seven Things You Need To Know About IIoT In Manufacturing
"IIoT platforms are beginning to replace MES and related applications, including production maintenance, quality, and inventory management, which are a mix of Information Technology (IT) and Operations Technology (OT) technologies. IoT Analytics is seeing IIoT platforms begin to replace existing industrial software systems that had been created to bridge the IT and OT gaps in manufacturing environments. Their research teams are finding that IIoT Platforms are an adjacent technology to these typical industrial software solutions but are now starting to replace some of them in smart connected factory settings. The following graphic explains how IoT Analytics sees the IIoT influence across the broader industrial landscape."
business  featured  posts  technology  software  trends  &  concepts  ai  artificial  intelligence  iiot  industrial  internet  of  things  iot  analytics  louis  columbus'  blog  machine  learning 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
Industry 4.0’s Potential Needs To Be Proven On The Shop Floor
"In the many conversations I’ve had with mid-tier manufacturers located in North America this year, I’ve learned the following:

Their top investment priorities are upgrading existing machinery, replacing fully depreciated machines with next-generation smart, connected production equipment, and adopting real-time monitoring including Manufacturing Execution Systems (MES).
Manufacturers growing 10% or more this year over 2018 excel at integrating technologies that improve scheduling to enable more short-notice production runs, reduce order cycle times, and improve supplier quality."
business  featured  posts  technology  software  trends  &  concepts  artificial  intelligence  erp  industry  4.0  machine  learning  manufacturing  execution  system  mes 
may 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
Reframing the Digital Transformation conversation in 5 steps
"Unless you are a digital native startup, your digital transformation will most likely be a complex series of incremental and strategic initiatives that fundamentally change the company over time. To get employees, customers, and investors on board, leadership needs to communicate the big idea—the “why” of what you are trying to achieve by reinventing your business. Start thinking about the principles of story telling. Start thinking in terms of the visual tools and communication processes you are going to use get the whole company as well as your partner and supplier ecosystem on board."
trends  &  concepts  #techerati  digital  disruption  transformation  strategy  events  leadership  storytelling 
april 2019 by jonerp
The State Of Cloud Business Intelligence, 2019
"An all-time high 48% of organizations say cloud BI is either “critical” or “very important” to their operations in 2019. Organizations have more confidence in cloud BI than ever before, according to the study’s results. 2019 is seeing a sharp upturn in cloud BI’s importance, driven by the trust and credibility organizations have for accessing, analyzing and storing sensitive company data on cloud platforms running BI applications."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  analytics  aws  intelligence  cloud  bi  analysis  forecast  for  2019  computing  louis  columbus 
april 2019 by jonerp
Sustainability might not be sexy, but life depends on it
"That’s 5 million units a year, all which generate data, and all of which need energy and resources in their creation. Chris suggests that by 2030 most people will have 15 devices, all generating data because “everything computes at the edge and everywhere”. He’s seen research that suggests we will run out of gold by 2030. Yikes!"
trends  &  concepts  cloud  corporate  culture  edge  computing  future  hm19  hpe  hybrid  innovation  strategy  supply  chain  sustainability 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
The Best Cloud Computing Companies And CEOs To Work For In 2019 Based On Glassdoor
"Indexing the most interesting and fastest growing cloud computing companies by their Glassdoor scores and reputations is a great way to begin defining a long-term career growth strategy. One factor not quantified is how well of a fit an applicant is to company culture. Take every opportunity for in-person interviews, read Glassdoor ratings often and observe as much as possible about daily life in companies of interest to see if they are a good fit for your skills and strengths."
business  featured  posts  technology  software  trends  &  concepts  cloud  computing  jobs  cloudian  computer  reseller  news’  100  coolest  vendors  of  2019  fivetran  glassdoor  kony 
march 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
Vodafone’s 2019 IoT Barometer Reflects Robust Growth In The Enterprise
"
85% of enterprises who develop deep expertise with IoT succeed at driving revenue faster than competitors.
81% of enterprises say Artificial Intelligence streamlines interpreting and taking action on data insights gained from IoT systems and sensors.
68% of enterprises are using IoT to track the security of physical assets, making this use case the most common across enterprises today.
Transport & Logistics and Manufacturing & Industrials saw the most significant increase in adoption between 2018 and 2019."
business  featured  posts  technology  software  trends  &  concepts  5g  artificial  intelligence  iiot  industrial  internet  of  things  iot  enterprise  adoption 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
Top 25 IoT Startups To Watch In 2019
"The most successful IoT startups selling into enterprises excel at orchestrating analytics, Artificial Intelligence (AI), and real-time monitoring to deliver exceptional customer experiences. As a group, these top 25 IoT startups are showing early potential at enabling profitable new business models, revitalizing industries that have experienced single single-digit growth recently. Each of these startups is taking a unique approach to solving some of the enterprises’ most challenging problems, and in so doing creating valuable new patents that further fuel IoT adoption and growth."
business  featured  posts  technology  software  trends  &  concepts  internet  of  things  startups  louis  columbus'  blog  top  25  iot  2019 
february 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains
"One CIO told me recently his company deliberately spins up several POCs at once, adding “they’re our proving grounds, we’re pushing blockchain and IoT’s limits to see if they can solve our most challenging supply chain problems and we’re learning a tremendous amount.”
business  featured  posts  technology  software  trends  &  concepts  blockchain  forecasts  use  cases  ethical  supply  chains  ibm  food  trust  iiot  industrial  internet  of  things 
february 2019 by jonerp
How Machine Learning Improves Manufacturing Inspections, Product Quality & Supply Chain Visibility
"Manufacturers’ most valuable data is generated on shop floors daily, bringing with it the challenge of analyzing it to find prescriptive insights fast – and an ideal problem for machine learning to solve.

Manufacturing is the most data-prolific industry there is, generating on average 1.9 petabytes of data every year according to the McKinsey Global Insititute. Supply chains, sourcing, factory operations, and the phases of compliance and quality management generate the majority of data."
business  featured  posts  technology  software  trends  &  concepts  inspectorio  louis  columbus'  blog  machine  learning  manufacturing  mckinsey  global  institute’  product  inspections  quality 
february 2019 by jonerp
Which Analytics And BI Technologies Will Be The Highest Priority In 2019?
"82% of enterprises are prioritizing analytics and BI applications and platforms as part of their budgets for new technologies and cloud-based services. 78% of enterprises are prioritizing advanced analytics, and 76% data preparation. 54% say AI, machine learning and Natural Language Processing (NLP) are also a high investment priority. The following graphic ranks enterprises’ investment priorities for acquiring or subscribing to new technologies and cloud-based services by analytics and BI initiatives or strategies. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  analytics  bi  and  in  the  age  of  ai  big  data  intelligence  cloud  computing  lake  louis  columbus'  blog 
january 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
Seven Books Not To Give the Boss for Christmas*
"My reply was simple: I once actually not just recommended but actually bought and gave Death by Meeting to my boss, so I’m not one to be throwing stones."
trends  &  concepts  leadership  management 
december 2018 by jonerp
CPQ Needs To Scale And Support Smarter, More Connected Products
"Industrial Internet of Things (IIoT) platforms has the potential of providing a single, unified data model across an entire manufacturing operation, giving manufacturers a single unified view of product configurations across their lifecycles. Producing smart, connected products at scale also requires a system capable of presenting a unified view of configurations in the linguistics each department can understand. Engineering, production, marketing, sales, and service all need a unique view of product configurations to keep producing new products. Leaders in this field include Configit and their Configuration Lifecycle Management approach to CPQ and product configuration."
business  featured  posts  technology  software  trends  &  concepts  cad  configit  configuration  lifecycle  management  configure  price  quote  cpq  crm  integration 
december 2018 by jonerp
Using Machine Learning To Find Employees Who Can Scale With Your Business
"Betting on solid data and personalization at scale, on the other hand, delivers real results. Real data slices through the probabilities and is the best equalizer there is at eradicating conscious and unconscious biases from hiring decisions."
business  featured  posts  technology  software  trends  &  concepts  ai  applicant  tracking  systems  artificial  intelligence  ats  eightfold  hr  machine  learning  human  resource  management 
december 2018 by jonerp
Where Cloud Computing Jobs Will Be In 2019
"The Hiring Scale is 78 for jobs that require cloud computing skill sets, with the average job post staying open 46 days. The higher the Hiring Scale score, the more difficult it is for employers to find the right applicants for open positions. Nationally an average job posting for an IT professional with cloud computing expertise is open 46 days. Please click on the graphic to expand for easier reading."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cloud  computing  employment  jobs  deloitte 
december 2018 by jonerp
86% Of Enterprises Increasing IoT Spending In 2019
"86% of enterprises expect to increase their spending on IoT in 2019 and beyond. Enterprises increased their investments in IoT by 4% in 2018 over 2017, spending an average of $4.6M this year. Nearly half of enterprises globally (49%) interviewed are aggressively pursuing IoT investments with the goal of digitally transforming their business models this decade. 38% of enterprises have company-wide IoT deployments today, and 55% have an IoT vision and are currently executing their IoT plans."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  f5  idaptive  industrial  internet  of  things  intelligent  enterprise  index 
december 2018 by jonerp
Predicting The Future Of Digital Marketplaces
"Competitive differentiation, buyer retention, buyer acquisition, and social media engagement and the four most common customer-facing challenges marketplaces face today. 39% of marketing execs say that differentiating from competitors is the greatest challenge, followed by buyer retention (32%), buyer acquisition (29%) and effective social media campaigns (29%) Further validation that today’s digital marketplaces are enabling greater digital transformation through personalization is found in just 22% of respondents said customer experience is a challenge."
business  featured  posts  technology  software  trends  &  concepts  altimeter  group  byline=louis  columbus  digital  marketplaces  ecommerce  forrester  google  cloud  platform  kahuna 
november 2018 by jonerp
Which CRM Applications Matter Most In 2018
"Marketing analytics continues to be hot for marketing leaders, who now see it as a key business requirement and a source of competitive differentiation. In my opinion and based on discussions with CMOs, interest in marketing analytics is soaring as they are all looking to quantify their team’s contribution to lead generation, pipeline growth, and revenue. I see analytics- and data-driven clarity as the new normal. I believe that knowing how to quantify marketing contributions and performance requires CMOs and their teams to stay on top of the latest marketing, mobile marketing, and predictive customer analytics apps and technologies constantly. The metrics marketers choose today define who they will be tomorrow and in the future."
business  featured  posts  technology  software  trends  &  concepts  ai  byline=louis  columbus  cloud  computing  cpq  crm  customer  relationship  management  enterprise 
november 2018 by jonerp
The State Of IoT Intelligence, 2018
"Manufacturers see IoT as the most critical to achieving their product quality, production scheduling and supply chain orchestration goals. Insurance industry leaders also view IoT as critical to operations as their business models are now concentrating on automating inventory and safety management. Insurance firms also track vehicles in shipping and logistics fleets to gain greater visibility into how route operations can be optimized at the lowest possible risk of accidents."
business  featured  posts  technology  software  trends  &  concepts  analytics  and  big  data  dresner  advisory  services  industrial  internet  of  things  (iot)  iot  early  adopters 
november 2018 by jonerp
Reinventing After-Sales Service In A Subscription Economy World
"91% of manufacturers are investing in predictive analytics in the next 12 months, and 50% consider Artificial Intelligence (AI) a major planned investment for 2019 to support their subscription-based business models.
New subscription business models and smart, connected products are freeing manufacturers up from competing for one-time transaction revenues to recurring revenues based on subscriptions.
By 2020, manufacturers are predicting 67% of their product portfolios will be smart, connected products according to an excellent study by Capgemini."
business  featured  posts  technology  software  trends  &  concepts  digital  disruption  internet  of  things  iot  louis  columbus'  blog  manufacturing  services  revenue  subscription  economy 
november 2018 by jonerp
Tech Leaders Look To IoT, AI & Robotics To Fuel Growth Through 2021
"
30% of tech leaders globally predict blockchain will disrupt their businesses by 2021.
IoT, Artificial Intelligence (AI) and Robotics have the greatest potential to digitally transform businesses, making them more customer-centered and efficient.
26% of global tech leaders say e-Commerce apps and platforms will be the most disruptive new business model in their countries by 2021.
IDC predicts worldwide IoT spending will reach $1.1T by 2021."
business  featured  posts  technology  software  trends  &  concepts  analytics  internet  of  things  (iot)  iot  kpmg  louis  columbus'  blog  robotics 
november 2018 by jonerp
How Blockchain Can Improve Manufacturing In 2019
"Blockchain’s greatest potential to deliver business value is in manufacturing. Increasing visibility across every area of manufacturing starting with suppliers, strategic sourcing, procurement, and supplier quality to shop floor operations including machine-level monitoring and service, blockchain can enable entirely new manufacturing business models."
business  featured  posts  technology  software  trends  &  concepts  blockchain  industry  4.0  internet  of  things  (iot)  louis  columbus'  blog  manufacturing  smart  traceability 
november 2018 by jonerp
How To Protect Healthcare IoT Devices In A Zero Trust World
"Healthcare and medical device manufacturers need to start taking action now to secure these devices during the research and development, design and engineering phases of their next generation of IoT products. Specifying and validating that every IoT access point is compatible and can scale to support Zero Trust Security (ZTS) is essential if the network of devices being designed and sold will be secure. ZTS is proving to be very effective at thwarting potential breach attempts across every threat surface an organization has. Its four core pillars include verifying the identity of every user, validating every device, limiting access and privilege, and utilizing machine learning to analyze user behavior and gain greater insights from analytics."
business  featured  posts  technology  software  trends  &  concepts  accenture  capgemini  centrify  healthcare  internet  of  things  (iot)  iot  louis  columbus'  blog 
november 2018 by jonerp
The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust
"
41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts.
Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according to Wipro’s report.
88 records were lost or stolen every second in 2017 according to Wipro’s analysis.
Machine learning & AI are the second highest ranking security competencies for the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  cybersecurity  f5  louis  columbus  palto  alto  networks  wipro 
october 2018 by jonerp
2018 Roundup Of Cloud Computing Forecasts And Market Estimates
"Amazon Web Services (AWS) accounted for 55% of the company’s operating profit in Q2, 2018, despite contributing only 12% to the company’s net sales. In Q1, 2018 services accounted for 40% of Amazon’s revenue, up from 26% three years earlier. Source: Cloud Business Drives Amazon’s Profits, Statista, July 27, 2018."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  bessemer  venture  partners  cloud  computing  landscape  gartner  idc  louis  columbus 
october 2018 by jonerp
Microsoft-Adobe’s amazing partnership: Creating a new category?
"I’ve digitally ripped this post up multiple times. Every time I think I’ve got it down, I have to change something. For the most part, I think I now have it under control. And don’t sweat it, my Dreamforce coverage will be coming. I want to get this one out first."
business  featured  posts  trends  &  concepts 
october 2018 by jonerp
How AI & Machine Learning Are Redefining The War For Talent
"Of the five companies Gartner names as Cool Vendors in the field of Human Capital Management for Talent Acquisition, Eightfold is the only one achieving personalization at scale today. Attaining personalization at scale is essential if any growing business is going to succeed in attracting, acquiring and growing talent that can support their growth goals and strategies. Eightfold’s approach makes it possible to scale personalized responses to specific candidates in a company’s candidate community while defining the ideal candidate for each open position."
business  featured  posts  technology  software  trends  &  concepts  artificial  intelligence  human  capital  management  louis  columbus  machine  learning  talent  acquisition 
september 2018 by jonerp
Google Needs To Make Machine Learning Their Growth Fuel
"Google needs new AI- and machine learning-driven businesses that have lower Total Acquisition Costs (TAC) to offset the rising acquisition costs of their ad and search businesses. CB Insights found Google is experiencing rising TAC in their core ad and search businesses. With the strategic shift to mobile, Google will see TAC escalate even further. Their greatest potential for growth is infusing greater contextual intelligence and knowledge across the entire series of companies that comprise Alphabet, shown in the graphic below."
business  featured  posts  technology  software  trends  &  concepts  cb  insights  google  ai  machine  learning  louis  columbus'  blog  patents 
september 2018 by jonerp
Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
IoT Market Predicted To Double By 2021, Reaching $520B
"The combined markets of the Internet of Things (IoT) will grow to about $520B in 2021, more than double the $235B spent in 2017. Data center and analytics will be the fastest growing IoT segment, reaching a 50% Compound Annual Growth Rate (CAGR) from 2017 to 2021. System integration, data center and analytics, network, consumer devices, connectors (or things) and legacy embedded systems are the six core technology and solution areas of the IoT market. The following graphic compares the CAGR of each area in addition to defining the worldwide revenue for each category."
business  featured  posts  technology  software  trends  &  concepts  bain  internet  of  things  forecast  (iot)  iot  louis  columbus 
august 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
What I learned at the conferences
"CRM doesn’t appear to be slowing down. As an industry it’s rated at about $35 billion in revenues up three-fold over where it was at the beginning of the century when I was a tenderfoot. One reason for the growth is the constant diversification led in no small part by Salesforce’s innovative culture. Big vendors like SAP have rededicated to CRM and I wish them well though I have a nagging feeling that’s an uphill path. Still many enterprise vendors seem to have entered CRM as a defensive move to secure their legacy customers. That’s not a recipe for sustained excellence. But what do I know? I’m just an analyst."
featured  posts  trends  &  concepts  crm  jaron  lanier  salesforce  utility 
july 2018 by jonerp
Conference Attendee Tips — Illustrated Journaling, Golden Age mysteries, Boat Shows and More
" Download the conference’s app and learn how to use it. Increasingly, this is the only way to know what’s going on, and the best of these apps support your networking goals, plug you into the best parties, offer suggestions on what sessions may be of greatest interest, etc."
trends  &  concepts  best  practices  hr  tech  conference  ksaocs  life  after  hrtech  naomi's  speaking  engagements  travel  vendor  briefings  demos  workday 
june 2018 by jonerp
Designing the Digital Workplace for the End-to-End Employee Experience
"Thus I still see many too many workers that in their day-to-day jobs still have to focus on spending much of their time feeding their work systems manually, via import/export and numerous other means, cobbling together an ad hoc experience across dozens of apps, just to prepare to begin their jobs for the day, instead of focusing on the more strategic higher-order knowledge work at hand."
featured  posts  trends  &  concepts  digital  experience  transformation  workplace  the  enterprise  future  of  work 
may 2018 by jonerp
Transitive Data Privacy: Behind Golden State Killer DNA and Cambridge Analytica
"A similar thing happened when data was mis-used by Cambridge Analytica. Even if you never used the quiz app on Facebook platform but your friends did, they essentially revealed private information about you without your consent or knowlege."
trends  &  concepts  facebook  privacy 
may 2018 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read