article thumbnail

4th Annual SAP NS2 Solutions Summit

CTOvision

Altogether, SAP NS2 will deliver a valuable day of learning and networking to advance the mission and business performance of its customers. The 43rd President of the United States (2001-2009). Extending insight from the analyst workstation to the tactical edge via the cloud. Frances Townsend.

SAP 150
article thumbnail

Blog/Website Relaunch: Under the Hood of craftycto.com

Crafty CTO

Yes, I needed to replatform my blog, but I also needed a web presence for my new fractional CTOing entity. In the end, I found a name that I think works well for both (ask me again in 5 years): Crafty CTO / craftycto.com for the entity, with the blog living at CraftyCTO.com/blog. Ghost and Squarespace are … CMSs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Five Thoughts from the White House Summit on Cybersecurity and Consumer Protection

CTOvision

Yes, there can be a “neighborhood watch-like” network effect in sharing threat intelligence. But all of that sharing will be for naught if it doesn’t lead to some kind of effective action – across people, process, and technology. Analysis CTO Cyber Security endgame' Yes, our security is only as good as the data we have.

Security 150
article thumbnail

Shuffl helps create new social interactions on Slack to spark joy between coworkers

GeekWire

That got him thinking about the ways he could use technology to improve work experiences for others by helping people engage with their colleagues. He perused his professional and personal network and realized that his childhood friend Chris Watts had made a tool that randomly matched people to connect for lunches.

Social 109
article thumbnail

The Sony Hack, It’s Still Not War Or Terrorism

CTOvision

It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Cyberterrorism is the convergence of terrorism and cyberspace. This is absurd.

Meeting 291
article thumbnail

The Back-to-Basics Readings of 2012 - All Things Distributed

All Things Distributed

Aug 11 - " On the Naming and Binding of Network Destinations ", Saltzer, J. In Proceedings of the Eighteenth Symposium on Operating Systems Principles (SOSP-18), Banff, Canada, October, 2001. Nov 9 - Using Encryption for Authentication in Large Networks of Computers , Roger M. CTO - Amazon.com. RFC 1498, August 1993.

article thumbnail

Fountainhead: Egenera PAN now available on Dell blades

Fountainhead

Since about 2001, Egenera has been selling its high-end hardware/software combination that unified re-purposing of physical and virtual servers. PAN stood for Processing Area Network, akin to a SAN in its ability to logically re-allocate CPUs, and its ability to provide ultra-high reliability. Egenera PAN now available on Dell blades.

Dell 100