March, 2016

article thumbnail

From Role-Based Access Control to Access Governance

CTOvision

Robert Doswell. Role-based access control (RBAC) and access governance are two terms that are used interchangeably. Is one then simply synonymous with the other? Or not? What are the differences, and how do you get from RBAC to access governance? Let’s consider the subject in detail. Role-based access control is a term that has been in use for some time and is considered an effective method of setting up authorization management in an organization.

article thumbnail

Equinix Tops in Market Share, Digital Realty Space

Data Center Knowledge

It comes as no surprise that out of 1,200 firms, Equinix led all retail and wholesale colocation providers in fourth quarter 2015 revenue, and finished the year by capturing 8.1 percent of the $27 billion market total, according to a new report from 451 Research.

Retail 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stop! Don't Let Your Business Fall off the Digital Disruption Cliff

Social, Agile and Transformation

Have you ever seen the industry you're working in walk off a digital cliff? I have, and let me tell you it isn't pretty and it happens fast. Once an industry begins transforming to a digital business with digital only competitors, incumbents have to move early, quickly and intelligently through a digital transformation. These businesses have to bring in new talent, invest in digital.

Industry 169
article thumbnail

5 Things That CIOs Need To Be Doing In Order To Protect Their Networks

The Accidental Successful CIO

CIOs had better be doing all five of these network protection actions Image Credit: svenwerk. By now I think that we all realize that we are living in dangerous and challenging times. The bad guys know about the importance of information technology and so they spend their time trying to break into our networks and we keep trying to find ways to keep them out.

Network 126
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Will marketing continue to grow their share of the technology budget?

Eric D. Brown

If you are involved with marketing and/or technology in any large organization, you most likely are hearing a lot about marketing technology (MarTech) and the ‘explosion’ of MarTech people, technology, projects… and budgets. There are some folks out there who claim that within a few years, marketing will be spending more on IT than the CIO but many IT professionals I speak with just have a hard time accepting that marketing will ever drive more spend on tech than IT does/will.

Budget 100
article thumbnail

Alexa voice commands can now be spoken into Amazon's smaller Echo Dot

ComputerWorld Consumerization IT

Amazon on Thursday announced a sleek new hockey-puck shaped, Alexa voice-controlled device called Echo Dot, a smaller $89.99 version of the larger, more expensive Echo tower. The tower was first introduced in November 2014. Both the Echo and the Echo Dot are promoted as being able to easily control lights, music and other functions in a home or small office via Alexa voice commands.

111
111

More Trending

article thumbnail

A Roundup from Data Center World Global 2016

Data Center Knowledge

More than 1,000 IT professionals across all industries converged on Las Vegas March 14-18 as Data Center World Global 2016 presented a plethora of educational sessions related to the industry and a trade show with best-in-class exhibitors and state-of-the-art technology. In case you weren’t.

article thumbnail

Is Your Data Ready for Digital Transformation?

Social, Agile and Transformation

Three really good reads this week if data or marketing transformations are elements of your overall digital transformation. Enough Marketing Technology, not Sufficient Integration Chiefmartec produced his annual state of marketing technologies showing an explosive growth in the number of vendors. I blogged about this last year to illustrate that the CMO and CIO should partner to help.

Data 100
article thumbnail

The Problem With Healthcare Records

The Accidental Successful CIO

Turning paper into electronic records is turning out to be harder then expected Image Credit: benben. In the U.S., the government is investing a great deal of money into transforming the country’s medical system. A key part of this transformation is the conversion of medical records from paper to electronic records. On paper, this sounds like a great idea.

article thumbnail

Get the basics first, then go big

Eric D. Brown

I’m not a basketball fan so I wouldn’t normally have caught a great quote from the Golden State Warriors head coach Steve Kerr after a recent loss. Thanks to Todd Hoff on High Scalability and his paraphrasing of a press conference by Kerr , I was able to run across this quote (paraphrased by Hoff): What we have to get back to is simple, simple, simple.

Big Data 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Apple cloud future: Amazon, Google, Microsoft living on borrowed time?

ComputerWorld Consumerization IT

Apple boots out Amazon AWS -- it's migrating most of its S3 storage to Google's Cloud Platform. Should Jeff Bezos be worried? Apple's are more high-profile bytes moving away from Amazon Web Services, so soon after recent news of the Dropbox mostly-defection. Newly-minted Google SVP Diane Greene is, we think, super excited though. And what is Apple up to, anyway?

Apple 108
article thumbnail

Tech News Roundup March 30

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Behind the scenes of the world’s longest floating bridge: How engineers made Seattle’s new Lake Washington span bigger, better and safer. The Apple-FBI Battle Is Over, But the Crypto Wars Have Just Begun - WIRED. INRIX updates navigation app to learn from your driving habits, taking direct aim at Waze.

Apple 150
article thumbnail

Survey: Containers and Microservices Now Entering Production Environments

Data Center Knowledge

Containers -- the data center technology you've heard all about, but probably not seen often in production -- are finally making their way into the real world. That's according to a survey out this week from NGINX.

Survey 123
article thumbnail

10 Best Practices in Configuring your Agile Project Management Tools

Social, Agile and Transformation

If you are serious about agile development then you most likely selected a tool to enable team collaboration and manage the backlog, sprints, and releases. While I have heard of some teams and even organizations staying low tech and using stickies, cards, or spreadsheets, it's really hard to scale to multiple teams, manage distributed teams, or develop metrics to support process improvements.

Agile 130
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Bloomberg Terminal Outage Creates CIO Headache

The Accidental Successful CIO

A Bloomberg Terminal outage can be very expensive indeed Image Credit: E.W. Scripps School of Journalism. The job of a CIO is to make sure that everything works “just right” If we have a nightmare it’s that the systems that we are responsible for suddenly just stop working just when everyone realizes the importance of information technology.

Network 109
article thumbnail

How to sync your Google Cloud on Linux with Grive2

Tech Republic Cloud

If Linux is your operating system of choice, and Google Drive is your cloud storage solution, you'll be happy to know there's an easy way to keep them in sync from the command line. Jack Wallen shows you how.

Linux 104
article thumbnail

8 Compelling Reasons To Adopt E-Learning Tools And Technology

Kitaboo

Here are 8 Compelling Reasons To Adopt E-Learning Tools And Technology. E-learning has redefined the knowledge and skill acquisition landscape. Studies reveal that over 41.7% percent of global Fortune 500 companies are today using e-learning technology to instruct employees and this figure is likely to rise steadily in the near future. A report by IBM states that companies who incorporate e-learning tools and strategies can potentially boost productivity by up to 50% and that for every $1 a comp

Tools 78
article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Katie Kennedy. Women in Cybersecurity (WiCyS) is hosting its third annual Women in Cybersecurity event on March 31 through April 2 at the Hyatt Regency DFW International Airport. WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry. This event is designed as a forum for speakers and guests to exchange knowledge, experience, networking, and mentoring, with the ultimate goal of raising interest in the important, fascinatin

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What Enterprise Data Center Managers Can Learn from Web Giants

Data Center Knowledge

This month, we focus on the open source data center. From innovation at every physical layer of the data center coming out of Facebook’s Open Compute Project to the revolution in the way developers treat IT infrastructure that’s being driven by application containers, open source is changing the.

article thumbnail

"Vader, release him" - Do Your Executive Meetings Resemble This Classic Star Wars Scene?

Social, Agile and Transformation

Many problems illustrated in this one 2-minute scene Meeting power moves - A key influencer (Vader and the General) arrive late and take over the meeting Managing business units - "The imperial center will no longer be of any concern to us" - We "quieted" the remote business units and the rank/file so that we can deploy our corporate mission without resistance.

Meeting 100
article thumbnail

The Combination of Cloud & Mobile and its Grip on B2B Automation – Part 2

The Investing Edge

We’ve established that the synergy between Cloud and mobile is both powerful and undeniable (as outlined in Part 1). We are not alone in this assertion. Earlier this month at Mobile World Congress in Barcelona, technology behemoths Samsung and Oracle announced a partnership to help companies make use of their existing systems in the cloud. The goal is to enable enterprises to take full advantage of mobile and cloud to create better mobile user enterprise software, mobile cloud and device feature

Mobile 70
article thumbnail

ZipBooks offers feature-rich cloud-based accounting software for free

Tech Republic Cloud

If you're looking for an accounting package for your small business, Jack Wallen might have found that solution in ZipBooks.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators. At CXOTALK, we bring together leaders who embody the qualities of leadership, innovation, and positive disruption. To develop this list of 20 Influential Chief Information Officers, we relied on Little Bird , a marketing platform that uses social network analysis to iden

CTO 70
article thumbnail

The Cyber Threat Is Changing: Here is what you can do to track it

CTOvision

Bob Gourley. One of the greatest mistakes executives make in the modern age is assuming that the cyber threat is static. Your greatest adversaries are dynamic, well resourced organizations led by thinking, creative people. They will change. There are steps you can take to track cyber threat actors. One important one is to sign up for the daily Threat Brief.

Resources 150
article thumbnail

How Can the Software-Defined Data Center Reach its True Potential?

Data Center Knowledge

In a world that requires near instant response times and increasingly faster access to business-critical data, the needs of tier 1 enterprise applications such as SQL, Oracle and SAP databases have been largely unmet. Read More.

article thumbnail

Review: Consider VPN services for hotspot protection

Network World

Virtual private networks have many uses. Typically, businesses deploy VPNs so employees can securely access the corporate network from outside the office. However, we’ve seen a rise in third-party VPN services that use the same underlying technology, the encrypted tunnel, to simply provide a secure Internet connection. Why would you ever need to do this?

Travel 64
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

RSA 2016: Key Takeaways

The Investing Edge

This year’s RSA conference was bigger than ever with more than 40,000 attendees. San Francisco buzzed with security vendors, buyers and investors as they crowded the lobbies of hotels and coffee shops with endless meetings. Being immersed in the atmosphere at RSA was both invigorating and overwhelming. It proved that while the need for cybersecurity solutions has never been more intense, so has the competition among providers.

Hotels 70
article thumbnail

Docker Machine, OpenStack, and SSH Keys

Scott Lowe

I wanted to provide readers a quick “heads up” about some unexpected behavior regarding Docker Machine and OpenStack. It’s not a huge deal, but it could catch someone off-guard if they aren’t aware of what’s happening. This post builds on the earlier post I published on using Docker Machine with OpenStack ; specifically, the section about using Docker Machine’s native OpenStack driver to provision instances on an OpenStack cloud.

.Net 60
article thumbnail

Crowdsourcing analytics: How to find the wisdom in the crowd

Tech Republic Big Data

Crowdsourcing platforms use machine learning and advanced algorithms to identify who are the wise voices amongst the online crowd, and then turn that input into insights.

How To 67
article thumbnail

Can You Imagine Processing Classified Government Data In The Cloud? DOD Releases Cloud Security Requirements Guide Update

CTOvision

Bob Gourley. DoD technologists continue their pioneering work in leveraging cloud computing in support of national security missions. Cloud Computing for DoD is hard for many reasons, including the fact that like many other organizations the tendency is to keep things in motion that are already in motion. The fact that the old things never stop makes starting anything new just harder.

Cloud 151
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.