Trending Articles

Current Sources

The Private Cloud Has Failed Us

Chuck's Blog - EMC

Perhaps there is no deeper disappointment in life than when a cherished concept fails to produce the desired results. It’s a failed concept. Voila!

Moving Toward a Framework for Resilient Cybersecurity: Expanding to a Hybrid Security Architecture

CTOvision

Dan Cybulski. This post was written by  Cognitio  and sponsored by Verisign. Cyber Security Cyber Threats News Threat Intelligence

Linux vs Unix Hot Patching – Have We Reached The Tipping Point?

Forrester IT

The Background - Linux as a Fast Follower and the Need for Hot Patching. Along the way it gained reliable and highly scalable schedulers, a multiplicity of efficient and scalable file systems, advanced RAS features, its own embedded virtualization and efficient thread support. Analytics. HP-UX. Intel. Linux. Open POWER. Oracle. Red Hat. SPARC.

Linux 89

Corporate IT: How to Stop Digitization Turning Your Firm into a Digital Gulliver

CEB IT

But they also can’t avoid doing this as otherwise they risk being overtaken by competitors, both incumbents and new entrants to the industry.

The Single Greatest Threat To A CIO’s Network Security: Their Children

The Accidental Successful CIO

CIOs always have to be aware of what their children are doing online Image Credit: freeparking. What can a CIO do when the threat is this close?

Cloud security concerns rise as investment grows, report shows

Computer Weekly

Cloud security concerns are evolving with the increasing adoption of cloud computing, but continue to top the list of barriers to adoption, a study reveals

Study 107

More Trending

Top 5 Data Center Stories, Week of May 20

Data Center Knowledge

For your weekend reading, here are some of this week's most popular stories on Data Center Knowledge Read More. DCK Featured

What CIOs Can Learn From An Upgrade Of Inflight Web Services

The Accidental Successful CIO

Airline CIOs are going to have to make some tough in-flight internet decisions Image Credit: Christopher Doyle. What All Of This Means For You.

Theme park company rides with Simplivity hyper-converged

Computer Weekly

International theme park operator Merlin Entertainments dumps servers and storage and replaces them with Simplivity hyper-converged infrastructure at 124 sites worldwide

Join Cognitio, the World Bank and Nlyte 9 June in an Examination of Data Center Optimization Strategies and Best Practices

CTOvision

Bob Gourley. On 9 June 2016 Cognitio and Nlyte are hosting a data center optimization leadership breakfast that will feature a moderated exchange of real world lessons learned and best practices. Joining this panel discussion will be Dan Pomeroy of the GSA (General Services Administration of US Government). Big Data CTO Events

Mobilize The Internet Of Things

Forrester IT

Businesses can obtain major benefits -- including better customer experiences and operational excellence -- from the internet of things (IoT) by extracting insights from connected objects and delivering feature-rich connected products. This means that: Mobile technologies are central to most IoT solutions. Read more Categories: Industrie 4.0.

Kansas Heart Hospital hit with ransomware, paid, but attackers demanded 2nd ransom

Network World

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital. small amount was made.” Yes, the hospital paid the ransom. Instead, the attackers asked for another ransom.

Video 79

Inside the Facebook Data Center in Sweden (Video)

Data Center Knowledge

Bloomberg’s Ashlee Vance tours Facebook’s huge Luleå facility Read More. Europe Facebook Video

Video 55

HPE adds support for Microsoft, VMware and Docker to Cloud28+ marketplace

Computer Weekly

Hewlett Packard Enterprise (HPE) softens its stance on OpenStack compatibility by introducing support for Azure, VMware and Docker too

Nlyte: For Data Center Infrastructure Management

CTOvision

Research Team. With this post we are initiating coverage of Nlyte. The modern data center is key to so many enterprise missions. For more see:  [link].

Video 38

Facebook, LinkedIn, Twitter: The New Cyberweapons Of Choice

Forrester IT

But social media cybersecurity issues are far from a laughing matter, and it's time we all take notice. Read more Categories: Brand Hijacking. Twitter.

There’s finally reason to hope in the war against ransomware

Network World

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do. These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security BSides Boston conference was told.

This IoT Startup Wants to Break Down Data Center Silos

Data Center Knowledge

Scott Noteboom’s LitBit aims to get all networked devices – and humans who use them – on the same page Read More.

Three Ireland sets out to become an omnichannel operator

Computer Weekly

Mobile network Three Ireland chooses Amdocs to support a ground-up rebuild of its systems and processes after acquiring O2’s Irish business in 2014

Cray Targets Enterprise Big Data with New Open Agile Analytics System

CTOvision

Katie Kennedy. Today, global supercomputer leader Cray Inc. has announced the launch of  the Cray® Urika®-GX system -- the first agile analytics platform that fuses supercomputing technologies with an open, enterprise-ready software framework for big data analytics. The Cray Urika-GX system is designed to eliminate challenges of big data analytics.

My Mobile Mind Shift Acceleration

Forrester IT

My Mobile Mind Shift (MMS) happened this year! What's interesting about this revelation is that I've been working in the smartphone industry for more than 10 years now. If that's how long it took me, and I work in the industry, how long is it going to take the rest of the world? Not much longer, I expect. So, what happened? mobile apps.

DARPA extreme DDOS project transforming network attack mitigation

Network World

Researchers with the Defense Advanced Research Projects Agency (DARPA) have quickly moved to alter the way the military, public and private enterprises protect their networks from high-and low-speed distributed denial-of-service attacks with a program called Extreme DDoS Defense (XD3). One more contract is expected under the program.

What’s Driving (and Inhibiting) DCIM Software Adoption?

Data Center Knowledge

Analysts forecast steady but slowing DCIM market growth for next four years Read More. DCIM News Featured Infrastructure Management

Copenhagen creates marketplace for trading data

Computer Weekly

Organisations in Copenhagen can buy and sell previously unavailable data on a data marketplace set up by the city government

RiskIQ: Providing actionable data to map your digital attack surface

CTOvision

Research Team. With this post we are initiating coverage of RiskIQ. However, their full features go far beyond this analyst portal.

5 CRM Statistics Every Entrepreneur Should Understand

IT Toolbox

Customer relationship management (CRM) has become a necessity for organizations of all sizes. The tools in these software suites make it easier to offer amazing customer service, implement targeted marketing strategies and provide a host of other benefits.

Cloud security: A mismatch for existing security processes and technology

Network World

To use a long-forgotten metaphor, cloud deployment is moving forward at internet speed at many enterprise organizations. Now, no one would argue the fact that cloud computing represents a different compute model, but it is really based upon the use of server virtualization for the most part.

CSC to Merge With HPE’s Services Unit

Data Center Knowledge

Deal to create business with $26 billion in annual revenue, led by CSC's chief executive Mike Lawrie Read More. Deals Hewlett-Packard

69

DDoS attacks openly on offer for $5 an hour, researchers discover

Computer Weekly

DDoS attacks have become a commodity, and are available openly on professional services online marketplaces for as little as $5 an hour, say security researchers

A Case Study and Webinar: ASU and Hortonworks Genomics and Precision Medicine Solutions

CTOvision

Katie Kennedy. Hortonworks has partnered with Arizona State University (ASU) to design and develop a platform to discover genomic links to cancer. Cancer is bot ha complicated and complex disease. Cancer is complex because it is a living system that behaves in a systematic way beyond the sum of its component parts. Arizona Dr. Kenneth Buetow.

Print Management: Centralized vs Regular

Galido

Hardly anyone disputes the necessity to manage printing. The need for this has been long clear. Instant cost reductions when removing print servers.

Why CISO is the hardest tech role to fill

Network World

Companies are under constant threat from cyberattacks and the situation is only getting worse with the rise of ransomware and whaling scams as a variant of phishing, according to recent cybersecurity reports. To read this article in full or to leave a comment, please click here

Google: AlphaGo Powered by Custom AI Chip

Data Center Knowledge

Claims custom ASIC's performance "orders of magnitude" higher than any commercially available CPU or GPU Read More.

Lessons from LinkedIn data breach revelations

Computer Weekly

There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts

Using Big Data to Build Brand Evangelists Within Your Company

CTOvision

Brigg Patten. Any organization, whether big or small, will always struggle with getting public recognition. Marketers want to improve brand awareness, brand equity, and brand humanization to give it a positive impact. The most powerful, loyal and vibrant brand evangelist are the most important people in making a business voice heard. Big Data

Pacific Steel and Recycling Case Study

IT Toolbox

Pacific implemented Magic xpi Integration Platform to improve efficiencies between manufacturing and enterprise resource planning (ERP) systems