Sat.Sep 19, 2015 - Fri.Sep 25, 2015

article thumbnail

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a hacker already knows how to exploit the tech in every way possible.

Network 308
article thumbnail

Data Center World: Stanley Cup Winner Bill Clement on Successful Leadership

Data Center Knowledge

Being a successful leader has nothing to do with a job title and everything to do with the choices we make that lead to earning respect and trust from those around us. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs And The Art Of Succession Planning

The Accidental Successful CIO

CIOs Need To Plan For Who Comes Next Image Credit: Xiaojun Deng. Wow – it sure was hard to get the CIO job. Just think for a moment about all of the various positions you had to rise through in order to finally obtain the top spot in IT. You do realize that you are not the last CIO that your company is ever going to have – because of the importance of information technology there will be others who follow behind you.

Social 164
article thumbnail

IBM tackles 'shadow IT' with a new cloud security tool for enterprises

ComputerWorld Consumerization IT

If there's one thing that can strike terror into a CIO's heart, it's the security implications of the cloud. If there's another, it's the "bring your own" technology trend. Combine the two, and you've got the motivation behind IBM's new Cloud Security Enforcer. Thanks to having set up used a private email server while U.S. Secretary of State, Hillary Clinton has become a poster child for "Shadow IT," or the phenomenon by which employees bring their own technologies into the workplace, but there'

IBM 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Big Data Project Management: What’s In & What’s Out?

CTOvision

Here’s something to think about when you're planning a big data project: are you planning a project or a program ? Here's a simple distinction: A project typically has a beginning, middle, and end. A program is something ongoing and relatively permanent. Projects. Relatively self-contained big data projects may be tied to an ongoing process or program that is already developing or delivering a product or service.

article thumbnail

How to Optimize Your Data Center and Save Millions

Data Center Knowledge

Optimizing data can mean the difference between profit and loss, even solvency and insolvency. It's a challenge CIOs are facing across all industries. Read More.

More Trending

article thumbnail

Apple watchOS 2 release date is finally here (it's about time)

ComputerWorld Consumerization IT

The Apple watchOS 2 release date is here. You can finally download the real thing, after the GM build was pulled due to unspecified bugginess. The new update adds native apps, new faces, a sideways "nightstand" mode, and a few other features. Apparently, it also tells the time. But don't be in a hurry, K? Reports from early installers say it's slow to update.

Apple 104
article thumbnail

MIT Has Built a robot with human reflexes and powered by a human brain

CTOvision

Researchers from MIT's Department of Mechanical Engineering have designed an interface that takes advantage of a human's split-second reflexes allowing a humanoid to maintain its balance and complete tasks. Watching the video at this link will immediately bring to mind many disaster recovery/assistance scenarios and use cases that these robots can be controlled in.

article thumbnail

Data Center World Panel Rings Alarm Bells about Electromagnetic Pulse Danger

Data Center Knowledge

Calls on data center managers to use their influence with C suite to protect critical infrastructure from EMP attacks by people or sun Read More.

article thumbnail

A Quick Reference to Adding New Storage with LVM

Scott Lowe

This post walks through the process of adding storage capacity to a Linux server using LVM. There’s nothing new, revolutionary, or cutting-edge about this post—honestly, it’s really more for my own reference than anything else. Adding logical volumes is something that I do so infrequently that it’s hard to remember all the commands, so I’m recording them here for when I need them next time.

Storage 60
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Is a lack of enterprise apps killing BYOD?

ComputerWorld Consumerization IT

As BYOD hangs on as an acceptable way to arm your employees with their own technology, companies need to make sure that employees can work seamlessly on those devices. One way to do that – and give employers some control of where their data goes – is through enterprise apps.

article thumbnail

Important Context On Key Cyber Security Issues From Admiral R

CTOvision

The video at this link and embedded below captures key parts of a a 24 Sep 2015 session of the Senate Select Committee on Intelligence with testimony by NSA Director Admiral Rogers. The exchanges allowed Admiral Rogers to offer expert testimony on a range of key issues including the need to simplify things for corporations in America seeking to coordinate with the government on issues of cybersecurity.

Security 242
article thumbnail

Data Center World: Take Measures to Prevent Data Breaches, Avoid Liability Costs

Data Center Knowledge

When it comes to determining whether an in-house data center, colocation, containers, the cloud or some mix works best for your company, a broad array of factors must be considered when calculating the Total Cost of Ownership for each scenario. However, as Mark Evanko of BRUNS-PAK told attendees at.

article thumbnail

Technology Short Take #54

Scott Lowe

Welcome to Technology Short Take #54! In this episode, I’ve gathered an odd collection of links and articles about key data center technologies. Without further ado, let’s get to the content. Networking. Not sure if this link belongs in Networking or in Virtualization, but we’ll stick it here since it talks about VMware NSX. Here’s a three-part series on running VMware NSX on vSphere on AWS via Ravello Systems ( part 1 , part 2 , and part 3 ).

Vmware 60
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Opposite of Critical Thinking

Future of CIO

The opposite of critical thinking is mindless thinking. There are many types of thinking. Many of them overlap with each other. They are all happening in the same sphere of influence of an individual human or groups of humans, or humans interacting with knowledge of the past, or connection with some "super-conscious" field. Critical Thinking is the mental process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and evaluating information to reach an answer or conclu

Trends 67
article thumbnail

WayIn Success At Real-Time Digital Marketing Technology Generating More Buzz And More Funding

CTOvision

Editor's note: We have been tracking WayIn since their founding and are very proud to close to the founders and executives of this very savvy team. We are also proud that WayIn was a founding sponsor of our Synergy Forum, where we could expose them to a wide range of government executives who need to track this trend setting tech. For more on WayIn see the press release below.

article thumbnail

Equinix to Power All California Data Centers with Solar Power

Data Center Knowledge

Signs power purchase agreement with SunEdison for energy generated by future Southern California solar project Read More.

article thumbnail

Spousetivities at VMworld EMEA

Scott Lowe

Spousetivities returns to VMworld EMEA this year with a new set of activities. If you haven’t registered yet, here’s a quick look at the pretty impressive set of tours and activities that are planned. Montserrat and Wine Country: The famous Monastery of Montserrat, one of the black Madonnas of Europe, Santa Cova, a fantastic lunch of local Catalan country cuisine, and wine tasting.

Course 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

PACE your Server Storage I/O decision making, its about application requirements

Storage IO Blog

A theme I mention in the above two articles as well as elsewhere about server, storage I/O and applications is PACE. That is, application Performance Availably Capacity Economics (PACE). Different applications will have various attributes, in general, as well as how they are used. For example database transaction activity vs. reporting or analytics, logs and journals vs. redo logs, indices, tables, indices, import/export, scratch and temp space.

Storage 56
article thumbnail

Watch Drones Build A Rope Bridge In Fight: Think of the use cases for this…

CTOvision

The video at this link and embedded below shows an incredible use of drones to construct a bridge that people can walk across. Doesn't that get your mind thinking about use cases for this technology? Imagine what it will be like when it matures? Here is more from the video description: The video shows quadrocopters autonomously assembling a rope bridge.

article thumbnail

It’s Time to Remove Roadblocks to Full Enterprise Cloud Adoption

Data Center Knowledge

Navneet Singh is Senior Manager of Product Management for Bracket Computing. Today’s enterprise needs to be nimble—prepared to react quickly to changing market conditions.

article thumbnail

Three Aspects in Running Digital IT

Future of CIO

A Digital IT needs to focus on the business priority, and build a competitive set of business capability. IT plays a pivotal role in the organization’s digital transformation, but first things first, IT has to transform itself to increase agility, innovation, and maturity. To be successful, IT leaders must support the existing environment, to keep the light on, provide a reliable secure infrastructure, and maintain the application portfolio, while deploying innovative value generating, such as b

Backup 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fall 2015 Server Storage I/O Cloud Virtual Seminars Going Dutch

Storage IO Blog

It’s that time of the year again where the fall 2015 events and activities are underway which also includes a week of sessions in Holland October 13-16. I will be participating in four days of workshop seminars being organized by Brouwer Storage Consultancy in Nijkerk covering server storage decision-making, converged and bulk storage options, software defined storage management, data center infrastructure management and data protection along with industry trends and update sessions.

Storage 56
article thumbnail

Survey On DoD Cybersecurity Rules: And book on The Cyber Threat for all organizations taking the survey

CTOvision

On 26 August 2015 the DoD promulgated new rules that apply to any contractor or subcontractor that does business with the DoD. These rules are in immediate effect. We are compiling information we will use in future reporting on CTOvision.com and also to provide as feedback to DoD on the new rules. We are looking for inputs from members of the Defense Industrial Base (DIB), which is any company providing anything to the DoD.

Survey 235
article thumbnail

Engineer: Lack of Procedure Plagues Data Center Industry

Data Center Knowledge

Most data center facilities teams neglect to document emergency procedures, exacerbating risk of downtime Read More.

article thumbnail

IT Governance as a Fundamental Business Necessity: How to Get it Right?

Future of CIO

One of the most important aspects of any governance discipline is to optimize decision making. IT plays a pivotal role in leading organization’s digital transformation. IT Governance is like a steer, to ensure IT running with the right speed smoothly. IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Wonderful World of Distributed Systems and the Art of Metadata Management

Nutanix

Nutanix introduced the first Hyperconverged platform to the market in 2011. While other Hyperconverged solutions have since come out, what differentiates Nutanix from the other solutions is the focus on implementing a highly scalable, reliable and performant distributed systems architecture.

System 20
article thumbnail

Empowering Analytics: Detecting Fraud In Hybrid Datasets

CTOvision

Thursday, September 24th from 1pm to 2pm, join Bob Gourley, Cognitio partner, and Steve Egan, Solutions Engineer at Datameer , for their webinar on fraud detection and prevention. The webinar is entitled "Empowering Analytics: Detecting Fraud In Hybrid Datasets". As many are well aware, fraud is pervasive, and is seen in the form of social engineering, phishing attacks, insider threat attacks, and in attempts to extract money using false claims.

Big Data 232
article thumbnail

Video: Alibaba Site Showcase of Cloud Data Center Design Innovation

Data Center Knowledge

Free cooling using lake water, modular deployment, disaggregated racks, PCIe Flash in Chinese e-commerce giant’s latest cloud site in China Read More.

article thumbnail

Conformance vs. Performance: What’s Board’s Priority

Future of CIO

To some degree, conformance is inherent in the value-driven performance. Corporate Board is one of the most important governance bodies to oversee strategy and enforce GRC disciplines. Many directors think that the role of the director is conformance. The underlying question is actually fundamental: What is corporate governance, when is it necessary and how should it work?

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.