December, 2016

article thumbnail

Do More With Less: Predictive Analytics For I&O

Forrester IT

Moore's Law was bound to catch up with us. Loosely applied, it says that technology grows more complex every year. Human brains do not. People can't keep up with monitoring, debugging, and managing today's technology. Users' rising expectations make it even worse: they want features and fixes in minutes, not days or weeks. Technology has gotten away from us.

Resources 299
article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense

CTOvision

Marty Meehan. Historically, the public sector has focused on a narrow set of cyber threats. Espionage and insider threat were among the primary focus areas given limited public-facing services and air-gapped infrastructure. However, as recent high-profile breaches have illustrated, the infrastructure at federal agencies today is far more integrated than ever before, and transparency initiatives have increased the amount of public-facing data and services.

Security 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Three Innovation Hints - Millennial Style

CIO Musings

“If you want something new, you have to stop doing something old” Peter F. Drucker Innovation has been the focus of our conversations recently on my job. How to innovate. What it means to have an innovative culture. How to define the value of innovation. Innovation is one part of my vision for the department. My deputy CIO recently gave an award for innovation within his area, and it went to one of our rockstar millennial employees, Christopher Long (@Chris_Long_VT).

article thumbnail

IBM and Credit Mutuel Arkea beat banking legacy with blockchain

Computer Weekly

French bank explains what working with IBM on blockchain ledger technology means for customer identification

IBM 222
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What 2016’s Top Data Center Stories Say About the Industry

Data Center Knowledge

Here’s how some of the macro-level industry trends are playing themselves out in the market Read More.

Industry 217
article thumbnail

US-CERT: Stop using your remotely exploitable Netgear routers

Network World

Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection. Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable.

165
165

More Trending

article thumbnail

Addressing HIPAA Compliance in the Healthcare Cloud

CTOvision

Rick Delgado. The growth of cloud technology has certainly been felt in the healthcare space, as large amounts of medical records are now being moved to the cloud. The technology makes it more convenient and cost effective for healthcare providers to share information, but it also brings concerns regarding privacy and legal considerations, particularly where HIPAA is concerned.

article thumbnail

Hot Twitter Hashtags for CIO [DataViz]

Social, Agile and Transformation

We're tweeting about key technologies like blockchain, artificial intelligence, IoT, big data and analytics.Transformation topics on digital transformation, agile, social business, and smart cities are also top of our tweets. Click here to use the data visualization on CIO Influencer Hashtags. Click on the image to use the dashboard.

article thumbnail

IT Priorities 2017: More than half of Middle East organisations will reduce spending on IT staff

Computer Weekly

Organisations in the Middle East face the challenge of gaining new IT skills despite IT staff budget cuts

Budget 225
article thumbnail

Here are the Top Data Center Stories of 2016

Data Center Knowledge

These are the 10 most widely read and shared stories we covered on Data Center Knowledge this year. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IDG Contributor Network: Will networks and security converge in 2017?

Network World

Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017: Security shall networking become. What did that really mean? Our Yoda translator was of no help.

Network 132
article thumbnail

DevOps The Code To Delivering With Velocity, Quality And Agility

Forrester IT

Every business today is under pressure from a startup that is disrupting their traditional market. We have seen this in the taxi industry with Uber [i] , ATOM Bank is revolutionizing banking [ii] and Airbnb the hotel industry. [iii] The overused statement that today every business is a software business, is resonating in every industry and we are all under pressure to not only deliver faster, we must do so with quality and add value to our respective businesses.

Devops 298
article thumbnail

Happy New Year: Here Are Five Suggestions To Reduce Your Digital Risk

CTOvision

Bob Gourley. This is the time of year when we think about change and make lists of resolutions to keep in the new year. As you think of your resolution list we have five topics for you to consider: Use a managed DNS service at home and office: This can help prevent accidental navigation to websites that have been taken over by malicious actors and contain bad code.

article thumbnail

How to install malware detection and antivirus on CentOS 7

Tech Republic Security

If you serve up files with a Linux machine, you should watch for malicious code. Follow this tutorial on how to add Linux Malware Detector and ClamAV for this very purpose.

Malware 125
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Top 10 virtualisation and storage stories of 2016

Computer Weekly

Flash storage has held onto the headlines in 2016, but hyper-converged infrastructure, containerisation, software-defined storage and VMware’s plans for the hybrid cloud are rising themes

Storage 169
article thumbnail

GI Partners Buys Seattle’s KOMO Plaza, Including Data Center Hub

Data Center Knowledge

Former Fisher Plaza houses data center providers, carriers, broadcast stations Read More.

article thumbnail

What is Your 2017 Business Strategy?

Cloud Musings

Photo credit: Shutterstock End of year predictions in December are as predictable as tomorrow’s sunrise, but a recent video on 2017 Technology Trends helped me really understand how important a digital transformation strategy is to just about any business executive. The CSC Town Hall conversation actually identified some of the specific tasks that today’s corporate executive really need to address in the coming year.

Strategy 101
article thumbnail

Using big data for security only provides insight, not protection

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Cybersecurity experts are excited about big data because it is the “crime scene investigator” of data science. If your organization is hacked and customer information compromised, your use of big data to collect massive amounts of information on your systems, users and customers makes it possible for data analysts to provide insig

Big Data 104
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The First Quantum Revolution: Foundational information for the enterprise CTO

CTOvision

Bob Gourley. Our report on Naturally Better Security dove deep into ways quantum effects can be leveraged to enhance real world cybersecurity. It was our most popular post in November 2016 and the feedback we received was taken as a signal that we should produce more on what CTOs should know about the quantum world. With this post we are kicking off a series of five pieces that will dive into quantum effects.

CTO 164
article thumbnail

Progress in ransomware battle remains murky despite industry efforts

Tech Republic Security

Ransomware is as bad as ever, with companies continuing to pay for their data even though defensive measures are improving, finds a recent IBM security study.

Industry 130
article thumbnail

Could blockchain revolutionise the Middle East?

Computer Weekly

The Middle East could pioneer the use of blockchain, transforming the processes used by organisations in the region

210
210
article thumbnail

Have You Been a Naughty or Nice Data Center Manager?

Data Center Knowledge

Are you naughty and keeping company with one of the 10 million zombie servers, which, by one estimate, consume energy equivalent to eight large power plants worldwide? Read More.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to install the Ansible server management system on Ubuntu

Tech Republic Data Center

If you're looking for a cost-effective centralized server management system, find out how to get the open source Ansible up and running. It's a must have for large data centers.

System 102
article thumbnail

4 information security threats that will dominate 2017

Network World

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. "2016 certainly lived up to expectations," says Steve Durbin, managing director of the ISF.

article thumbnail

Improving the Performance and Security of Mission Applications with Enhanced Networking

CTOvision

Bob Gourley. Latency breeds contempt, this is especially true in the defense and intelligence communities where seconds can be the difference between life and death. Applications supporting national security missions must work and they must work fast. In order to keep pace with rapidly evolving mission demands, agencies are constantly advancing their capabilities in the areas of distributed analytics and private cloud.

article thumbnail

Can deterrence counter the threat of cyberweapons?

Tech Republic Security

A professor from the Naval Postgraduate School suggests that deterrence is cybersecurity's next phase.

152
152
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Top 10 desktop, tablet, smartphone and mobile device stories of 2016

Computer Weekly

2016 was the year Microsoft pushed out a major Windows update, Linux celebrated its 25th anniversary and female personae took over AI

Linux 175
article thumbnail

San Francisco Software Startup AppDynamics Files for US IPO

Data Center Knowledge

(Bloomberg) — AppDynamics Inc., which develops software for businesses to monitor applications, filed for an initial public offering. The San Francisco-based company filed with an initial offering amount of $100 million, a placeholder used to calculate fees that will probably change. Morgan.

Software 113
article thumbnail

How to add a cloud-based document app on Nextcloud

Tech Republic Cloud

If you want to add document editing capabilities to your Nextcloud server, learn how to do so with the help of the Documents app.

How To 121
article thumbnail

How to populate an LDAP server with users and groups via phpLDAPadmin

Tech Republic Data Center

If you're unsure how to add groups and users to LDAP, learn how simple the process is with the help of phpLDAPadmin.

Groups 123
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.