Sat.Feb 21, 2015 - Fri.Feb 27, 2015

article thumbnail

The President Speaks At Hadoop World: Introduces DJ Patil as Nation’s First Chief Data Scientist

CTOvision

'By Bob Gourley. Data science history was made on 19 Feb 2015. For the first time in the history of Hadoop World, the President of the United States gave a keynote. Dwell on that for a bit. This is huge. No matter what your politics is, you really have to agree, this is huge. After the President''s address also see the overview provided by DJ Patil, the new Chief Data Scientist for the federal government.

Data 290
article thumbnail

Ten Ways To Improve IT Culture with Agile, DevOps, Data, and Collaboration

Social, Agile and Transformation

'Over the last decade I''ve had the privilege of working with several IT teams that transformed themselves from minimal credibility with the business to delivering award winning customer facing products while improving other IT business services. Different groups with different issues and opportunities, but what stands out with all of them is their willingness to change and improve their own.

Devops 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding CloudStack, OpenStack, and the Cloud API

Data Center Knowledge

'Creating a powerful cloud services layer requires a good platform capable of integration with a variety of resources. Check out the good and the bad in two leading open source clouds Read More.

Cloud 204
article thumbnail

The IT Group as Cost Center – Or Innovation Center?

Eric D. Brown

'Mark Thiele published a post recently titled “ Why we Value IT Incorrectly – Innovation vs Cost Center. ” You should go read it. If you don’t follow Mark’s writing on his blog or twitter , you should…he has some great insights into IT , IT leadership, the data center and many other aspects of the IT group. While Mark’s entire post is great, I wanted to point out one particular paragraph from Mark’s post and make a few comments about it.

Groups 147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ThreatConnect In The News: Washington Post Examines Link Between China and Anthem Attack

CTOvision

'By Bob Gourley. I just got off the phone with Adam Vincent of ThreatConnect. What a great leader and technologist. I have watched as he and a team of very smart, mission focused technologists turned his company into a provider of capabilities in demand by a growing number of Fortune 500 companies. ThreatConnect provides a product of note, a platform for cyber intelligence.

Malware 235
article thumbnail

Finding The Time To Be Strategic

The Accidental Successful CIO

'CIOs know that they need to be strategic, but where is the time? Image Credit: catd_mitchell. Pick up any IT trade journal and you’ll probably find an article that is telling CIOs that because of the importance of information technology they need to get a seat at the company’s planning table. In order to do this, they need to become more strategic.

Meeting 143

More Trending

article thumbnail

The Emerging Science of Digital Forensics

Cloud Musings

'By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adoption of cloud, mobile and social media by enterprise organizations is opening a new threat landscape and new threat vectors.

Dell 108
article thumbnail

Now Updated for 2015: The Cyber Threat and the Role of Cyber Intelligence in Defending Your Organization

CTOvision

'By Bob Gourley. The Cyber Threat is a booklet published to succinctly articulate the nature of the cyber threat in ways designed to help business leaders come to terms with the nature of this phenomenon. The book is available on Amazon (and is free to Kindle Unlimited subscribers). The book provides a high level overview of cyber threats to business interests, discusses the important lessons history can teach us regarding the threat, and then provides actionable suggestions on ways to enhanc

CTO 233
article thumbnail

Back-to-Basics Weekend Reading - Distributed Snapshots: Determining Global States of a Distributed System

All Things Distributed

'Several problems in Distributed Systems can be seen as the challenge to determine a global state. In the classical " Time, Clocks and the Ordering of Events in a Distributed System " Lamport had laid out the principles and mechanisms to solve such problems, and the Distributed Snapshots algorithm, popularly know as the Chandy-Lamport algorithm, is an application of that work.

System 107
article thumbnail

Your 2015 Cloud Security Update

Data Center Knowledge

'Some quick tips and cool technologies to help your cloud security architecture and to keep your environment a bit safer! Read More.

Cloud 196
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

PowerShell: Import and Local GPOs

Mick's IT Blog

'This script will import and apply a local GPO using the local GPO utility, ImportRegPol.exe, located here. The script is a wrapper that makes implementing this utility a snap. All that has to be done is to use the Microsoft Security Compliance Manager to export the desired local GPO. I wrote this script for use mainly in the MDT build. I realize there is the GPO Pack built into MDT, but what happens when you want to deploy a local GPO to machines already built or multiple local GPOs at differen

article thumbnail

Cognitio Is Sponsoring The CTOvision Synergy Conference

CTOvision

'By Katie Kennedy. Please SAVE THE DATE for the 1st Annual Cognitio/ CTOvision Synergy Conference. EVENT: The CTOvision Synergy Conference. WHEN: 30 Apr 2015. WHERE: Ritz Carlton, Tysons Corner. The 2015 Synergy Forum will bring together government and industry practitioners driving our collective technology futures. This is a multi-disciplinary event examining the emerging mashup of physical and digital worlds.

article thumbnail

[Video] Changing IP address of a vCSA

Virtualized Greek

'Continuing my video series on installing a vSphere 5.5 lab (yeah I know 6.0 is out) we change the IP address of our vCSA and deal with the fallout of broken SSL certificates.

Video 61
article thumbnail

Modern Collaboration is Double-Edged Sword

Data Center Knowledge

'As sharing data gets easier, users subject themselves to greater information security risks, writes Vijay Krishna of SysCloud. So, when do the risks of sharing information over the Web outweigh the costs? Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

PowerShell: Cleaning up old systems in Active Directory, SCCM, and Antivirus

Mick's IT Blog

'Every place I have worked, there has been the issue of systems being in SCCM, AD, and antivirus that no longer existed. The is often caused by systems being overlooked when a user departs the company, a laptop that gets put in a desk and not turned on forever, and a lot of other similar scenarios. While I was in the process of upgrading SCCM 2007 to 2012, I finally became fed up over it and wrote this script.

System 93
article thumbnail

A Brief Explanation of Superfish

CTOvision

'By Shannon Perry. Sometimes big threats to consumers’ digital security and privacy come in the form of pre-installed programs, software built into consumer products that creates vulnerabilities that hackers can exploit. Last week, Reuters reported that the Department of Homeland Security issued an alert that a harmful pre-installed program exists on Lenovo laptops.

article thumbnail

February 2015 Server StorageIO Update Newsletter

Storage IO Blog

'Hello and welcome to this February 2015 Server and StorageIO update newsletter. The new year is off and running with many events already underway including the recent USENIX FAST conference and others on the docket over the next few months.

Vmware 58
article thumbnail

Optimizing Entire Data Center Without Breaking Budget

Data Center Knowledge

'New technologies can help you get everything you can out of your data center without going broke Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Learning agility

Future of CIO

Learning agility will directly impact the speed of digital transformation, the effectiveness of digital leadership, the creativity of the workforce, and the overall organizational maturity. Today’s workforce is more global, flexible and virtual as the world becomes so hyper-connected and over complex, especially the speed of change is accelerating in the digital era, learning agility is not only the very quality of digital leaders but also the fundamental requirement for all digital professional

Agile 60
article thumbnail

Blind Man Can Now See With A New Bionic Eye

CTOvision

'By Katie Kennedy. 68-year-old Allen Zderad lost his career as a chemist due to a degenerative eye disease. This week he was able to see again with a "bionic eye" implant. [The] “bionic eye” implant , [is] a chip with electrodes implanted in [Zderad''s] retina that interacts with a camera in Zderad’s glasses. The camera and wearable computer pack sends information to the electrodes, which then send the information on to the optic nerve.

Network 231
article thumbnail

Digital Leadership and the Cloud: Video Highlights

Lundberg Media

I just had my first highlights reel made and I'm pretty excited. I delivered the opening keynote at the Oracle Cloud World conference in Boston in December 2014. Oracle did a great job filming it in the first place, and my friend the very talented videographer Craig Kimberley at Skyprop Media did a great job editing it down to a couple of minutes. This shows both my onstage work and the kinds of (very visual) slides that I create.

Cloud 40
article thumbnail

Look Ma, No Fans!

Data Center Knowledge

'Using fans to cool your data center is inefficient and adds to the heat load that must be dissipated, writes Herb Zien of LiquidCool Solutions. Data center owners and operators should want to get rid of the fans in order to increase efficiencies in their facility. Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Make Strategy Work under Uncertainty

Future of CIO

The challenge is in finding the appropriate balance between stability and adaptability. VUCA (volatility, uncertainty, complexity, and ambiguity) is digital new normal, as complexity and uncertainty increasing, the connection between any single individual organization’s strategy, and their tactical plans and actions can become diluted and disconnected.

article thumbnail

Matt Southmayd Named Vice President Commercial Markets for Cognitio Corp

CTOvision

'By Bob Gourley. Editor''s note: It has been a real pleasure to be able to work with Matt Southmayd at Cognitio. The press release below captures some of what he brings to our organization, our clients and the business community. - bg. Matt Southmayd Named Vice President Commercial Markets for Cognitio Corp. MCLEAN, Va. , Feb. 19, 2015 /PRNewswire/ -- Cognitio Corp announced today that Matt Southmayd has been appointed as a member of the leadership team as Vice President of Commercial Markets.

article thumbnail

Delivering Secure and Scalable Desktop as a Service

Nutanix

Security and flexibility don’t often end up in the same sentence, especially when it comes to delivering IT as a service.

article thumbnail

Using Optical Fiber Solutions for 10G to 40/100G Migrations

Data Center Knowledge

'Let''s examine and consider both how and why an optical fiber ribbon cabling solution should be deployed for new 40Gbs/100Gbs installations and upgrades of existing 1Gbs/10Gbs infrastructures. Read More.

165
165
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Trustful Mind

Future of CIO

TRUST is a collective mind - the corporate culture. You can't build and nourish trust without creating a conducive environment of trust. The progressive business relationship and society are built on mutual trust and respect, not power and ownership. We do not own others and, therefore, should not believe we have power over them. Is trust more as a mindset or a behavior?

article thumbnail

Seeking To Serve The Department of Defense With Technology? This Is A Must Read

CTOvision

'By ChrisScott. If you are in a company that seeks to serve the Department of Defense (DoD) with technology or services you absolutely need to track the mission needs of the department. If you don''t you will have a very hard time expressing to decision-makers why they should consider your offering at all. Tracking mission needs also helps you as you join teams and compete for traditional procurements.

CTO 230
article thumbnail

Barracuda, ReversingLabs, Telefonica and Zscaler Join Cyber Threat Alliance

CTOvision

'By Bob Gourley. Barracuda, ReversingLabs, Telefonica and Zscaler have joined the Cyber Threat Alliance to help drive a coordinated industry effort against cyber adversaries through deep collaboration on threat intelligence and sharing of indicators of compromise. The following is from a joint press release: BARRACUDA, REVERSINGLABS, TELEFÓNICA AND ZSCALER JOIN CYBER THREAT ALLIANCE AS CONTRIBUTING MEMBERS.

Symantec 227
article thumbnail

Best of Breed: How to Achieve ABAC Today!

CTOvision

'By Katie Kennedy. CTOvision''s Bob Gourley is the keynote speaker at the event: "Best of Breed: How to Achieve ABAC Today!" The event is on March 24 at the Spy Museum in Washington, D.C. from 7:30 am to 1:45 pm. Explore how to achieve Attribute Based Access Control (ABAC) from the best of breed access management vendors and industry experts Bob Gourley ( Cognitio ), Art Friedman (NSA) and Eugene Yu (DHS) at this unique event at the Spy Museum in Washington DC on March 14th.

How To 226
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.