Sat.Mar 14, 2015 - Fri.Mar 20, 2015

article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

'By Matt Southmayd. Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness. Available data suggest that 84% of corporations have malware on their networks.

Insurance 319
article thumbnail

Private Versus Public Cloud: No Longer an Either/Or Debate

Data Center Knowledge

'When it comes to private versus public cloud, we are no longer living in an either/or world, writes Peter Cutts of EMC. Businesses that harness the power of both are finding significant advantages over their peers. Read More.

Cloud 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

how to be a good open source community member

SPF13

'A friend of mine who is a very talented writer recently became intrigued with open source and asked me to help her to understand how to be a good open source community member. Open source is one of the most unusual things in the world. Is there any other profession where highly skilled professionals donate their free time to give their work away for free?

article thumbnail

How the CIO Can Lead Digital Transformation

Social, Agile and Transformation

'Is Digital Transformation an important business priority, or is the latest buzz word and attempt to get businesses to invest more in their technology programs? In the ''90s businesses were told to invest in their web sites and digital advertising. In the early part of the century they were told that web 2.0, user generated content, and social networking was going to create a new paradigm and.

Agile 162
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity: Too Often Overlooked is the Impact to the Individual

CTOvision

'By Matt Southmayd. Recently, there have been questions raised as to why corporations have been slow to be more vigilant about Cybersecurity. In the scheme of a large organization, it is often deprioritized because the minimal impact to the bottom line is a risk that is deemed acceptable to the business. For example, Target’s high profile breach cost the company $264 million dollars which may seem like a significant financial loss.

Insurance 272
article thumbnail

How CIOs Become Hybrid Cloud Heroes

Data Center Knowledge

'A CIO who takes a step forward into the hybrid cloud does so while dealing with the same budgetary and complexity obstacles he has always faced, writes Oded Haner of HotLink. Read More.

Cloud 204

More Trending

article thumbnail

Women leading us to the cloud

Cloud Musings

'By Jodi Kohut Government Cloud Computing Professional By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as compelling agents of change in such a time as this in the IT industry.

Cloud 128
article thumbnail

Influential National Association of Insurance Commissioners (NAIC) Moves On Cyber

CTOvision

'By Bob Gourley. Cybersecurity practitioners and policymakers have long been discussing the potential positive benefits of smart insurance policy and standards to reduce risk. Of the many actions and activities we see in the insurance world today, the news of NAIC involvement is seen as particularly interesting. What is the NAIC? The National Association of Insurance Commissioners (NAIC) is the U.S. standard-setting and regulatory support organization created and governed by the chief insurance

Insurance 246
article thumbnail

Missouri Taking Another Stab At Data Center Tax Incentives

Data Center Knowledge

'Data center tax exemptions have passed the House and Senate, and now land on the desk of Missouri Governor Jay Nixon. Will the second time be the charm? Read More. colocation St.

article thumbnail

CIOs Need Learn How To Defend Against The Bad Guys

The Accidental Successful CIO

'CIOs have to learn how to defend against the bad guys Image Credit: Alyse & Remi. The person with the CIO job needs to understand that his or her company is under constant attack. Yes, some of the attacks come from hostile hackers who are always probing your company’s IT defenses trying to find a way in; however, we must not forget the impact that severe weather can have on the operations of both our IT departments and our company.

How To 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cloud Acquisition Strategy, Customized to the Right Cloud Model

Cloud Musings

'by Melvin Greer Managing Director , Greer Institute This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing may be the biggest and most overhyped term in Government information technology today. It is also the most discussed topic in agency strategy, cyber security forums and mission / program reviews.

Strategy 120
article thumbnail

Attribute-Based Access Control (ABAC) Best of Breed March 24 at International Spy Museum

CTOvision

'By Katie Kennedy. On Tuesday March 24, the DC identity community is hosting the annual Attribute-Based Access Control (ABAC) event at the International Spy Museum. Could there be a better venue for discussing multiple identities and hidden individual attributes? Attribute Based Access Control is the key to protecting data and ensuring it can be utilized only by those that should have access.

CTO 241
article thumbnail

China Has Hacked Every Major US Corporation, Former NSA Head Says

Data Center Knowledge

'Former NSA director says malware used by Chinese hackers allows them to access information at will and steal critical information including business plans and blueprints Read More.

Malware 183
article thumbnail

How To Be A Good Open Source Community Member

SPF13

A friend of mine who is a very talented writer recently became intrigued with open source and asked me to help her to understand how to be a good open source community member. Open source is one of the most unusual things in the world. Is there any other profession where highly skilled professionals donate their free time to give their work away for free?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Women in tech: Meet the trailblazers of STEM equality

Cloud Musings

'By Sandra K. Johnson CEO, SKJ Visioneering, LLC Science, technology, engineering and mathematics (STEM) professionals are drivers of innovation,creativity and invention. STEM disciplines are significant drivers of economies worldwide, and STEM careers are rewarding and fulfilling. The promise of STEM is therefore important for economies and individuals; however, in most countries around the world, we do not have STEM professionals that reflect the gender makeup of our population.

Meeting 107
article thumbnail

New Whitepaper: Breaking the Attack Kill Chain

CTOvision

'By Katie Kennedy. This is part of Cognitio''s Sponsored Post Program. Cybercrime is now a trillion dollar industry. Cyber criminals are becoming more sophisticated; therefore, a new solution is needed. The newest white paper added to the CTOvision Research Library highlights cybercrime and how to detect and prevent cyber attacks with the Enterprise Security Platform.

CTO 237
article thumbnail

Strategies for Evaluating Data Center Aisle Containment

Data Center Knowledge

'Data Center Aisle Containment has emerged as an effective strategy for increasing an existing data center’s capacity to support higher density rack loads, writes Todd Boucher of Leading Edge Design Group. Read More.

article thumbnail

CopyData yeah… Long live Data Virtualization

Virtualized Greek

'I got into interesting sets of exchanges over CopyData with the fine folks of Actifio and Catalogic Software. In general, I’m a fan of the concept of CopyData software. Both solutions reduce the amount of production data on storage (which.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cloud conversations: If focused on cost you might miss other cloud storage benefits

Storage IO Blog

'Note that most reputable cloud providers do not hide their fees even though there are myths that all cloud vendors have hidden fees, instead they list what those costs are on their sites. However that means the smart shopper or person procuring cloud services needs to go look for those fee’s and what they mean to avoid surprises. On the other hand if you can not find what extra fee’s would be along with what is or is not included in a cloud service price, to quote Jenny’s line in the movie Fore

Storage 68
article thumbnail

Visual Search by Blippar: The Latest Technology Companies Want

CTOvision

'By Katie Kennedy. Many times the most disruptive technologies are the ones you always needed but didn''t quite know how to say you needed. Here is one that every consumer and enterprise can clearly use, so will very likely have a disruptive impact on the IT world. The latest technology companies are racing to get their hands on is visual search. This technology enables you to discern various information with a quick phone pic.

Company 236
article thumbnail

Fujitsu Opens Third Singapore Data Center

Data Center Knowledge

'Fujitsu adds a third Singapore data center within Equinix in bid to capture growing cloud market Read More.

article thumbnail

The Software Mainframe

Virtualized Greek

'SiliconANGLE.TV had IBM’s CTO Jeffrey Frey on theCube during IBM’s InterConnect2015 conference. Host John Furrier referenced a comment by former VMware CEO Paul Moritz from 2009. Moritz stated the goal of VMware was to create a software mainframe. EMC may.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Data Protection Diaries: Are your restores ready for World Backup Day 2015?

Storage IO Blog

'In case you forgot or did not know, World Backup Day is March 31 2015 (@worldbackupday) so now is a good time to be ready. The only challenge that I have with the World Backup Day (view their site here) that has gone on for a few years know is that it is a good way to call out the importance of backing up or protecting data. However its time to also put more emphasis and focus on being able to make sure those backups or protection copies actually work.

Backup 66
article thumbnail

FCC Releases New Net Neutrality Rules

CTOvision

'By Shannon Perry. Net neutrality became a buzzword in 2014, as many media sources and public figures voiced their opposition to the FCC’s “fast lanes.” In order to accommodate ballooning quantities of web traffic, the FCC proposed that content providers (like Netflix) could pay Internet service providers (like Comcast) in order to access special, faster broadband connections, resulting in high quality media that would quickly outshine other sites with slow connections.

.Net 236
article thumbnail

How to Maximize Primary Storage ROI and Data Protection

Data Center Knowledge

'Storage optimization—matching storage to data’s performance, capacity, security, and accessibility needs. Learn how this maximizes primary storage ROI. Read More.

Storage 176
article thumbnail

Can Critical Thinking be Taught

Future of CIO

Critical thinking as a thinking capability is a balanced mix of genetics and learning. We live in an extremely dynamic and overcomplex world today, however, the majority of people seem not taking enough time to go through the steps needed to generate ideas and create wisdom via critical thinking; there’s information overloading, and critical thinking is more critical than ever for decision making or problems solving; but most people would rather be programmed than do their own thinking.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Collecting Transaction Per Minute from SQL Server and HammerDB

Storage IO Blog

'When using benchmark or workload generation tools such as HammerDB I needed a way to capture and log performance activity metrics such as transactions per minute. For example using HammerDB to simulate an application making database requests performing various transactions as part of testing an overall system solution including server and storage I/O activity.

Storage 65
article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

'By Deepak Kumar. Last year, Enterprise IT was dramatically shaped by the influx of security breaches, data leaks and a new wave of hackers. But optimism came in the form of Microsoft as word began to spread that the company had solved the problems they experienced with Windows 8/8.1 and that Windows 10 was better than the Enterprise could have imagined.

Windows 235
article thumbnail

Report: DISA Cancels $1.6B VMware Cloud Contract Following Protests

Data Center Knowledge

'The contract wasn''t open bid, which led to protests from others and now cancellation. The sizable $1.6 billion contract was across various military branches Read More.

Vmware 173
article thumbnail

Changes

A Screw's Loose

'I was driving to work this past Wednesday and it hit me; I was only going to make this trip 2 more times. Every morning I get in the car, switch to Waze on my phone and it pops up a message asking me if I’m going to work. Of course, I hit yes, and [.

Course 46
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.