April, 2016

article thumbnail

Tech News Roundup April 1

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. UCF partners with MIT in major federal high-tech research - Orlando Sentinel. Annual Race for Tech Visas Is Under Way - Wall Street Journal. Memo: RealNetworks reorganizes, names new CTO. ‘Affordable’ Tesla Model 3 electric car gets a five-star reveal from Elon Musk.

CTO Hire 151
article thumbnail

Fun Linux Things

CIO Musings

Unix has always fascinated me. I was hired to be a Unix communications programmer in 1986. I taught myself C, learned the X.25 protocol, HDLC, the seven layer ISO model and started struggling with the bourne shell. By this time I had been coding for 11 years, having started with BASIC in 7th grade. What stuck with me through all the years and versions and languages and floppy disks is the incredible versatility of Unix.

Linux 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Slack: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers the common use cases of Slack, its technical benefits and limitations, and what to know before adopting the cloud-based collaboration tool.

Tools 150
article thumbnail

How Technology is Changing Warehouses and Distribution Centers

Data Center Knowledge

With new technology comes new procedures and ultimately changes industry-wide. Distribution centers and warehouses will feel the impact of these changes as they adapt. Read More.

Industry 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Can you really win if you aren’t the best?

Eric D. Brown

People often say that if you work hard and apply yourself, you’ll succeed. But lets be realistic… that isn’t always true, especially because everybody has a different definition of ‘succeed.’ Sure, you can work hard and apply yourself and become better than you were, but it doesn’t mean you’ll become the ‘best’ at something.

Analysis 136
article thumbnail

What A CIO Needs To Know About Encryption

The Accidental Successful CIO

CIOs need to know when to make use of encryption Image Credit: Yuri Samoilov. Due to the importance of information technology, the person with the CIO job has been handed the responsibility of keeping the company’s information assets safe. This involves a number of different things including preventing the wrong people from gaining access to the company’s networks, etc.

Company 122

More Trending

article thumbnail

10 Practices of Strong Agile Product Owners

Social, Agile and Transformation

I've worked with some excellent agile product owners that have developed new products, delighted customers, grown revenue, and collaborated well with their agile teams. I've also worked with other product owners that have some very bad behaviors reflecting in poor under performing products and angry team members. So I thought to share some of the behaviors and practices that make product owners.

Agile 155
article thumbnail

How to expand the Facebook Messenger app with Dropbox

Tech Republic Cloud

If you're a Facebook Messenger and Dropbox user, you'll be glad to know that the apps have been integrated so you can add files to Messenger threads from Dropbox with ease.

How To 111
article thumbnail

Server and Application Management in the Hybrid IT Era

Data Center Knowledge

One of the most important things to remember in the hybrid IT era is that the cloud is not for everything. Too many companies begin implementing hybrid IT environments without first considering which workloads make most sense for which environments. Read More.

article thumbnail

Good data science isn’t about finding answers to questions

Eric D. Brown

I just finished reading an article over on Fast Company titled “ How Designers Are Helping HIV Researchers Find A Vaccine.” The story related in this article is a perfect example of what ‘good’ data science looks like. The data scientists and designers worked together to build a platform that made it easy for anyone to dive into data sets, find answers – and more importantly – find more questions.

Data 122
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIOs Need To Learn To Play HEAD Games

The Accidental Successful CIO

CIOs need to learn how to use the HEAD decision making technique Image Credit: Ten Aku. As the person with the CIO job you have access to a great deal of information. In fact, some would say that you have access to too much information. Making a decision about the importance of information technology can be a very difficult thing to do. You have a great deal of information sitting at your disposal, but a lot of it may be contradictory.

How To 122
article thumbnail

Big Data is Here and Getting Bigger

CTOvision

Katie Kennedy. As a supercomputer maker, Cray has been delivering the massive analytic processing power required by scientists and engineers for the last 40 years. Today, they've harnessed those decades of know-how in their data analytics and data discovery solutions. Urika ® -GD Graph Discovery Appliance. Addresses the most complex problems in advanced analytics — interactive data discovery with graphs.

Big Data 151
article thumbnail

Where are you Implementing your Big Data Algorithms?

Social, Agile and Transformation

It sounds like a simple question. You have to load several data sets, implement some data cleansing, perform some matching to third party data, compute several aggregates, develop some rankings, group several dimensions, benchmark against another data set, analyze for trends and then normalize the data for multiple data visualizations. In all likelihood, the algorithms that perform these.

Big Data 140
article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

Strategy 110
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Channel Partners Can Provide Strategic Value with the Cloud

Data Center Knowledge

Cloud is not a destination or singular path, but a transformation that places IT and its partners squarely at the center of the enterprise as both a leader and enabler of value creation. Read More.

Cloud 120
article thumbnail

How to save images and web pages to your Google cloud account with one click

Tech Republic Cloud

Save To Google is the Chrome extension you've been looking for, says Jack Wallen. Here's how to use this must-have Google tool.

Google 113
article thumbnail

3 Ways To Get Your Company To Take Digital Security Seriously

The Accidental Successful CIO

Security only works if people take it seriously Image Credit: Holly Victoria Norval. As the person with the CIO job, you realize the importance of information technology and just how important it is to keep your company’s network secure from all of the bad people out there in the world who are always trying to get in. You make investments in firewalls, intrusion detection devices, and highly paid IT security staff.

Security 126
article thumbnail

The Best Practices are No Longer the “Best” Practices

CTOvision

Katie Kennedy. Editors note: This is a sponsored post provided by Cray. There was a time when information systems security was much simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection, and machines taken off-line. In this day and age, breaches, data theft, and cybercrime are rampant and not abating.

Firewall 150
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AWS vs Microsoft Azure: Understanding the serverless application trend

Tech Republic Data Center

How exactly do you run applications without servers? Keith Townsend explains how AWS' Lambda service and Microsoft's Azure Service Fabric move away from the OS-centric view of computing.

article thumbnail

Workshare Professional Relicensing Script

Mick's IT Blog

Our license keys were expiring for the 2015 year and needed to be updated for 2016. To achieve this, we needed to delete the HKLM features registry key, import the new HKLM features registry key, and then parse through all HKU profiles to delete the subscription key from there. We have both 32-bit and 64-bit machines, so I also had to make the script be able to differentiate between them.

article thumbnail

The Future of Computing – Moore’s Law, but Not as We Know it

Data Center Knowledge

Moore’s Law may be coming to an end in terms of microprocessors, but it is only moving along the supply chain, and the future of computing will continue to improve. Read More.

Industry 122
article thumbnail

Analyzing real WordPress hacking attempts

Network World

In my last few posts I’ve pondered the issue of how insecure WordPress installations have become. Here’s an interesting thing to try if you run a Wordpress site; install the 404 to 301 plugin and in its settings check the “Email notifications” option and enter an email address in the “Email address” field. Now, whenever a nonexistent URL is requested, you’ll get notified and, at least for me, it’s been pretty interesting to see how hackers attempt to enter my WordPress installations.

89
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to quickly find out what's using up your Google Drive space

Tech Republic Cloud

If your Google Drive account is running out of space, discover the quickest way to find out which files are causing the problem and what you can do about it.

Google 92
article thumbnail

Arizona State University Adopts Hortonworks Data Platform to Shed Light on the Genetic Links to Cancer

CTOvision

Katie Kennedy. Recently announced, Arizona State University (ASU) is using Hortonworks Data Platform (HDP™) to further cancer research. With HDP, ASU researchers have the tools they need to store, process, and query more data at a faster pace, allowing researchers to ask better questions and uncover new links between genetics and cancer. ASU has put an emphasis on innovative approaches to research such as with its Complex Adaptive Systems Initiative (CASI).

article thumbnail

How to add more VPN setup options on your Ubuntu Touch device

Tech Republic Security

If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.

How To 97
article thumbnail

NIC Advanced Properties

Mick's IT Blog

Recently, we started having issues with our new Dell Latitude E7450 laptops. They would be put to sleep and then they could not restore the network connection once the laptop was docked again. The problem came from the Energy Efficient Ethernet setting in the advanced properties of the NIC. That is what lead me to writing this script so that we could set it during the build process.

Dell 85
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Microsoft to DOJ: The Cloud Isn’t an Automatic Fourth Amendment Exemption

Data Center Knowledge

Microsoft has filed suit against the DOJ, stating that the federal government is routinely violating the Fourth Amendment rights of its customers by preventing the company from notifying users of government requests for their data. Read More.

Microsoft 109
article thumbnail

Report: Almost half of enterprises have no one in charge of database security

Tech Republic Data Center

A recent research report published by Osterman Research detailed its findings on data and database security. Here's what you can learn from the findings.

Report 90
article thumbnail

With some advanced preparation, you can survive a ransomware attack  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins.

Malware 81
article thumbnail

Tech News Roundup April 27

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Apple's results hit tech shares, dollar dips before Fed - Reuters. Theranos' Lab Problems Go Way Deeper Than Its Secret Tech - WIRED. Whitepages spins out caller ID and spam-blocking app into startup Hiya. Sour Apple results hit tech shares, dollar dips before Fed - Reuters.

Apple 151
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.