Sat.Apr 16, 2016 - Fri.Apr 22, 2016

article thumbnail

If You Are In Business Or Government You Need To Understand The Facebook Vision In This Video

CTOvision

Bob Gourley. Mark Zuckerberg walked through Facebook's 10 year plan during the keynote of the F8 conference on 12 April 2016. This roadmap is grounded in reality but very exciting. And it starts with a great articulation of Facebook's mission. Facebook is focused clearly on connecting all people and allowing anyone to share anything with anyone. If you are a decision-maker in business or government I recommend you watch the entire presentation for many reasons (businesses especially need to see

article thumbnail

Intel: World Will Switch to “Scale” Data Centers by 2025

Data Center Knowledge

Computing infrastructure is changing, and Intel is fighting to remain at the forefront of the change Read More.

Intel 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Good data science isn’t about finding answers to questions

Eric D. Brown

I just finished reading an article over on Fast Company titled “ How Designers Are Helping HIV Researchers Find A Vaccine.” The story related in this article is a perfect example of what ‘good’ data science looks like. The data scientists and designers worked together to build a platform that made it easy for anyone to dive into data sets, find answers – and more importantly – find more questions.

Data 122
article thumbnail

CIOs Need To Learn To Play HEAD Games

The Accidental Successful CIO

CIOs need to learn how to use the HEAD decision making technique Image Credit: Ten Aku. As the person with the CIO job you have access to a great deal of information. In fact, some would say that you have access to too much information. Making a decision about the importance of information technology can be a very difficult thing to do. You have a great deal of information sitting at your disposal, but a lot of it may be contradictory.

How To 122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Join Cognitio and Verisign In An Examination Of Cyber Defense Strategies For Public Sector Agencies

CTOvision

Bob Gourley. Verisign and Cognitio are hosting an action-oriented Cyber Strategy Seminar focused on establishing a framework for resilient cybersecurity in the public sector on Tuesday, May 3, 2016. The seminar will include a facilitated dialog in which we will explore the need to expand the security framework from the ground up and design for the changing computing landscape.

Strategy 155
article thumbnail

The Future of Computing – Moore’s Law, but Not as We Know it

Data Center Knowledge

Moore’s Law may be coming to an end in terms of microprocessors, but it is only moving along the supply chain, and the future of computing will continue to improve. Read More.

Industry 122

More Trending

article thumbnail

Apple QuickTime Uninstaller

Mick's IT Blog

As we have all seen recently, it is time we get rid of Apple QuickTime from PCs as they are no longer going to update the software. I had a few ask me to publish a blanket uninstaller for QuickTime. With the help of Sapien's PowerShell Studio , I wrote this script to uninstall it from all of the machines in my firm. This uninstaller will query the Add/Remove programs for any applications named quicktime.

Apple 94
article thumbnail

Protecting Data with Quantum Technology

CTOvision

Katie Kennedy. We live in an age where our lives are increasingly embedded in the digital world. From mobile to cloud, our data is everywhere, feeding seemingly endless and varied security attacks, from the recent Panama Papers leak to repeated ransomware attacks on hospitals. People need new ways to protect and secure their data wherever it is. Traditional methods such as firewalls are no longer effective by themselves; as the advent of quantum computing draws closer other security measures suc

Data 155
article thumbnail

Microsoft: Bigger Underwater Data Center in the Works

Data Center Knowledge

Encouraged by initial Project Natick results, team prepares to go bigger and deeper Read More.

article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

Strategy 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NIC Power Management Porperties

Mick's IT Blog

I wrote and published a script that enabled wake on lan two years ago. Since then, I have needed to write new scripts to modify the advanced tab of the NIC properties. I began by looking at my old script to see about adding the new settings to it and I decided to update the old one and republish it here. Thanks to Sapien Technology's PowerShell Studio , I have updated the script with much documentation.

LAN 88
article thumbnail

How to be More Productive as a Data Scientist

CTOvision

Rick Delgado. Many data scientists find themselves in an interesting position within their organizations. For many businesses, big data is new territory and hiring data scientists is a new endeavor, usually in an area where managers and business leaders have little to no experience. All they know is that big data analytics can prove beneficial both in the short and long term.

Data 153
article thumbnail

Microsoft Moves Away from Data Center Containers

Data Center Knowledge

Finds ITPACS aren’t the best way to scale its cloud globally Read More.

article thumbnail

How to save images and web pages to your Google cloud account with one click

Tech Republic Cloud

Save To Google is the Chrome extension you've been looking for, says Jack Wallen. Here's how to use this must-have Google tool.

Google 113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

NIC Advanced Properties

Mick's IT Blog

Recently, we started having issues with our new Dell Latitude E7450 laptops. They would be put to sleep and then they could not restore the network connection once the laptop was docked again. The problem came from the Energy Efficient Ethernet setting in the advanced properties of the NIC. That is what lead me to writing this script so that we could set it during the build process.

Dell 85
article thumbnail

Australian Government Will Reveal More Cyber Attacks: Bob Flores Comments

CTOvision

Katie Kennedy. Australia's Prime Minister Malcom Turnbull has given the Australian cyber security arsenal $230 million, pledging Australia will enhance its defenses to become a world leader in the field. Just prior to this significant pledge, Australia's current Children's eSafety commissioner and newly appointed Special Cyber Security Advisor to the Prime Minister, stated that the government needs to be "more explicit" about its successes and failures in combating cyber crime.

article thumbnail

Backup is Broken – Enterprises Need Availability Instead

Data Center Knowledge

The problem is that CIOs are trying to leverage traditional backup to provide availability, and that’s an impossible task. Read More.

Backup 122
article thumbnail

How to use Signal for encrypted SMS messages

Tech Republic Security

Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.

How To 116
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New storage technologies allow for denser, faster data storage

Tech Republic Data Center

Faster, denser SSDs with new connector types are being released this summer, while traditional platter drives are becoming more dense. Learn more about new and upcoming storage options.

Storage 64
article thumbnail

What Big Data Tells Us About Onboarding

CTOvision

Brigg Patten. An outdated or ineffective onboarding process can impede employee development or contribute to higher levels of turnover. From finding and identifying new talent to assessing changes made to an existing onboarding process, effective data analysis can play a pivotal role in ensuring new employees are able to better acclimate to their new position and working environment.

Big Data 151
article thumbnail

Google to Build and Lease Data Centers in Big Cloud Expansion

Data Center Knowledge

Keeping up with competition means letting go of some control Read More.

article thumbnail

How to connect your Android device to a VPN with VyprVPN

Tech Republic Security

If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

4 ways to apply SLAs to shadow IT

Network World

The risks and costs of shadow IT have been always been a concern for IT organizations. Yet the business clearly values the capability to procure certain IT services to rapidly meet its changing business needs — so much so that these informal IT capabilities are springing up even more often than IT leaders realize. One 2015 report by Cisco indicated that the number of unauthorized cloud applications being used in the enterprise, for example, was 15 to 10 times higher than CIOs estimated.

Meeting 63
article thumbnail

Tech News Roundup April 18

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Amazon takes on Netflix with new monthly Prime membership programs. Privacy wars pit technology firms vs. the feds - Austin American-Statesman. For 911 Operators, Technology Helps, But Job Still Stressful - Emergency Management. Commentary: KPLU’s proposed acquisition by KUOW puts a global online audience at risk.

Journal 151
article thumbnail

Capital One Builds Tool to Cut Its AWS Usage

Data Center Knowledge

Says Cloud Custodian, now open source, enabled it to reduce its cloud resources deployed by 25 percent Read More.

article thumbnail

Exponential growth of R's open source community threatens commercial competitors

Tech Republic Big Data

With more than 2 million users and developers, how can proprietary vendors stand against the R programming language and software environment's open source community?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why the future of a Dell-led VMware hinges on developers

Tech Republic Data Center

The combination of Dell, EMC, VMware and Pivotal is compelling, but only if VMware can figure out the proper relationship with its developers.

Vmware 69
article thumbnail

Tech News Roundup April 22

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Uber drivers remain independent contractors as lawsuit settled . Can the Fed do a better job projecting embargoed economic data? - FCW.com. Job One for Aerojet’s future ion drive: Go out and get a piece of an asteroid. Startup Spotlight: Teenager heads up Beam to help game streamers interact with viewers.

Cloud 150
article thumbnail

Coca-Cola Selling Atlanta Data Center as it Shifts Apps to Cloud

Data Center Knowledge

CIO expects half of corporate computing to run in cloud in next two-three years Read More.

article thumbnail

How to create a strategic analytics culture in your organization

Tech Republic Big Data

At the 2016 SAS Global Forum, Kellogg's Rick Davis and SAS's Jill Dyche explained how you can build a company culture that values analytics.

How To 71
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.