Sat.Jul 25, 2015 - Fri.Jul 31, 2015

article thumbnail

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

CTOvision

Marc Goodman's Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It is a fantastic examination of good and evil in cyberspace. Marc really knows his material and on top of that writes incredibly well. I've been in and around the cybersecurity community for so long I find myself getting numbed by the constant news and really valued Marc placing so much threat information into a context anyone can understand.

article thumbnail

Avoid the “Cookie-Cutter” Data Center Services Mistake

Data Center Knowledge

The last thing you want to do is lock yourself down. Find out how to avoid the cookie-cutter mistakes and create best practices around your data center. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data is only as good as you make it

Eric D. Brown

I’m currently working with a client who is very immature when it comes to data analysis. This particular client has no history of analyzing data and barely any history of reporting. Their idea of analysis is looking at a few finance reports to see how the business is doing. Now, if this particular client was a small business, I’d have no problem with this approach… but they aren’t.

Data 145
article thumbnail

How Should A CIO Deal With An Employee Mutiny?

The Accidental Successful CIO

CIOs need to be aware that a mutiny may be happening right now! Image Credit: HoJo Anaheim. The CIO runs the show when it comes to all things having to do with IT because of importance of information technology, right? Well, it turns out that this is not always the case. Even as you are reading this, in your IT department a mutiny may be brewing. What has caused this to happen and what should you be doing to prepare for it?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tamr: Connect and enrich all your data for analytics and decision making

CTOvision

With this post we are initiating coverage of Tamr. Tamr was founded in 2013 by a distinguished cadre of database industry veterans including Andy Palmer and Turing award winner Mike Stonebreaker. Tamr enables enterprises to make use of 100% of available data by unifying and enriching data holdings. Tamr's data unification platform catalogues, connects and curates internal and external data sources at scale through a combination of machine learning algorithms and human expert guidance, radically

Data 253
article thumbnail

Brocade CEO: Specialized Data Center Network Gear on Its Way Out

Data Center Knowledge

As software replaces physical network hardware, vendor sees opportunity to grow market share Read More.

Network 218

More Trending

article thumbnail

Can Your Culture Help People Become WHO They Are?

Future of CIO

Being humans, we should have one big advantage - knowing about our own nature. There are many different perspectives of culture presented along with diverse ways and means of dealing with it. At high-mature digital organizations, culture management, talent management, and performance management have been integrated into a holistic people management approach.

article thumbnail

CipherCloud: New approaches to cloud security

CTOvision

CipherCloud has a very unique approach to enhancing security of enterprise data in the cloud. CipherCloud is a pioneer in delivering cloud information protection and enabling you to overcome risks to data privacy, residency, security, and regulatory compliance and deliver better business results. Using ground breaking technology they protect the entire lifecycle of data including discovery, encryption ( FIPS 140-2 validated ), tokenization, data loss prevention, malware detection, and ongoing mo

Cloud 250
article thumbnail

SoftLayer Founder Crosby Shares Lessons of Success

Data Center Knowledge

Story by TC Doyle for The WHIR Chairman and CEO of “To Be Announced.” A lot of business practitioners would have a hard time listing that as their current position in their LinkedIn profile. But not Lance Crosby. Crosby, of course, is the founder and former CEO of SoftLayer. In… Read More.

Course 169
article thumbnail

Intel and Micron unveil new 3D XPoint Non Volatie Memory (NVM) for servers and storage

Storage IO Blog

In a webcast the other day, Intel and Micron announced new 3D XPoint non-volatile memory (NVM) that can be used for both primary main memory (e.g. what’s in computers, serves, laptops, tablets and many other things) in place of Dynamic Random Access Memory (DRAM), for persistent storage faster than today’s NAND flash-based solid state devices (SSD), not to mention future hybrid usage scenarios.

3D 63
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Data Scientist vs. Data Algorithm

Future of CIO

Analytical algorithms and data scientists are not mutually exclusive, but they are absolutely complimentary. An algorithm is a procedure or formula for solving a problem. An algorithm is a model of the real world. A data scientist is a job title for an employee or business intelligence (BI) consultant who excels at analyzing data, particularly large amounts of data, to help a business gain a competitive edge (whatis.com).

Data 49
article thumbnail

Vricon: The world in 3D

CTOvision

Defense and security company Saab and DigitalGlobe Inc., a leading global provider of high-resolution earth imagery solutions, launch the joint venture – Vricon Inc. – to produce photo-realistic 3D products and digital elevation models globally for enterprise and government geospatial markets with unmatched coverage and delivery timelines. The Viricon capabilities are incredible to interact with.

3D 250
article thumbnail

Time to Get Serious About Data Security in the Data Center

Data Center Knowledge

As IT budgets get tighter and attack surface gets bigger, encryption should be routine, and security decisions shouldn’t be delegated to IT admins alone Read More.

article thumbnail

Part III – 3D XPoint new server storage memory from Intel and Micron

Storage IO Blog

The initial die or basic chip building block 3D XPoint implementation is a layer 128 Gbit device which if using 8 bits would yield 16GB raw. Over time increased densities should become available as the bit density improves with more cells and further scaling of the technology, combined with packaging. For example while a current die could hold up to 16 GBytes of data, multiple dies could be packaged together to create a 32GB, 64GB, 128GB etc. or larger actual product.

3D 54
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Five Barriers to Change Management Success

Future of CIO

Managing change is no longer a one-time project, but an ongoing business capability. Change is inevitable, and organizational change becomes a common practice within an organization, but more than two-thirds of change effort fails to achieve the expected results. What’re the barriers to cause the change failures, and how to make Change Management tangible rather than fluffy?

article thumbnail

The Startup Ecosystem Report

CTOvision

Compass , the startup data benchmarking company, has just released their second “ Startup Ecosystem Report ”. It has been three years since their prior report. In their new findings, New York City has risen to second place, leaving Tel Aviv (the previous second place holder) at fifth. At number one is Silicon Valley, which comes at no surprise. . Tel Aviv was not the only location to fall, Vancouver, Toronto and Sydney also fell, while Santiago, Melbourne and Waterloo dropped out of the top 20 e

Report 246
article thumbnail

Report: Utah Cops Get $1M a Year to Park at NSA Data Center

Data Center Knowledge

NSA contracts with state highway patrol to maintain "perimeter presence" at controversial Bluffdale facility Read More.

article thumbnail

Part II – Intel and Micron new 3D XPoint server and storage NVM

Storage IO Blog

3D XPoint is not NAND flash, it is also not NVRAM or DRAM, it’s a new class of NVM that can be used for server class main memory with persistency, or as persistent data storage among other uses (cell phones, automobiles, appliances and other electronics). In addition, 3D XPoint is more durable with a longer useful life for writing and storing data vs.

3D 51
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

What’s your Favorite Terminology for “Performance Management”

Future of CIO

Performance development is to focus on positive, rather than negative aspects. The core of "Performance Management" is to creating goals that are aligned with organizational strategic objectives, and to provide reflective feedback to the person moving the particular project along. Goal alignment and performance feedback, are the heart of the approach.

article thumbnail

Hackers Taking Over Your Car

CTOvision

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers. Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, when all of a sudden, your brakes give out and your speed increases.

Security 242
article thumbnail

AT&T’s Eddie Schutter Takes Helm as eBay Data Center Chief

Data Center Knowledge

Will report to Dean Nelson after 20 years in AT&T’s massive data center org Read More.

article thumbnail

MSI Analysis Reporting Tool

Mick's IT Blog

Here is a tool I have written that generates a report on all of the variables used for each entry during an MSI installation. I wrote this script to make customizing the installation of MSI files much easier and quicker. The way this script works is that it will install the MSI file and then come back and uninstall it. It will produce a verbose text file which the script will read from to produce the report.

Analysis 125
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Innovation from Systems Thinking Perspective

Future of CIO

The foundation for innovation has to be grounded in the “vision” which is linked to “hope” and seeking justice or "truth." For many organizations, innovations are still serendipitous. However, serendipity can be planned into a management discipline. Serendipity is not a lucky accident, and it can be planned and worked upon. Creativity is about connecting the dots, and Systems Thinking is about to discover the patterns underlying these dots.

System 40
article thumbnail

DataGravity: Data aware storage

CTOvision

The DataGravity Discovery Series allows IT professionals and business users to unlock the value of their data through data aware storage. For an introduction see the video at this link and embedded below: For more see: datagravity.com. The post DataGravity: Data aware storage appeared first on CTOvision.com.

Storage 241
article thumbnail

Storing All That Data: Web-Scale Solutions for a Connected World

Data Center Knowledge

Mobile data traffic is expected to grow ten-fold by 2019, and one way data centers are handling the increase is by adopting web-scale architecture and distributed storage. Read More.

Data 165
article thumbnail

Cloud Computing + Things = ‘Information Excellence,’ Not IoT

Cloud Musings

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is also feared as the real- life instantiation of The Terminator’s Skynet , where sentient robot team with an omnipresent and all-knowing entity that uses technology to control, and ultimately destroy, all of humanity.

Cloud 125
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to Learn Systems Thinking in Understanding the Holism

Future of CIO

Systems Thinking is a sensibility, with the subtle interconnectedness that gives living systems their unique character. Ordinarily people do not inquire into the matters, they are too much a slave to the conventional way of thinking or follow the mainstream thinking, they just accept what is instilled into their minds, mainly even through the indirect experiences, one side of story or unverified information; for to accept is more convenient and practical, and life is to a certain extent, though

System 40
article thumbnail

Paxata: Adaptive Data Preparation

CTOvision

Paxata developed the first Adaptive Data Preparation™ platform built for the business analyst. The company’s technology dramatically reduces the most painful and manual steps of any analytic exercise, turning raw data into ready data for analytics, and empowering analysts to drive greater value for the business. With seamless connections to BI tools like Tableau, QlikView, and Excel, users can combine data on their own or work with peers in a shared, transparent environment as they shape data fo

Data 237
article thumbnail

Five Tips for Eliminating Migration Migraines

Data Center Knowledge

While failed migrations happen fairly often, they don't have to be inevitable. Here are five ways to achieve migration success and avoid downtime. Read More.

Industry 170
article thumbnail

OASIS Advances Automated Cyber Threat Intelligence Sharing with STIX, TAXII, CybOX

CTOvision

Editor's note: We saw the press release below from OASIS and wanted to share it with you since it covers some of the most important information sharing standards in the community today, STIX, TAXII and Cybox. These standards are now being advanced through the open standards process of OASIS. From PRweb. OASIS Advances Automated Cyber Threat Intelligence Sharing with STIX, TAXII, CybOX.

Security 237
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.