Sun.Jan 29, 2017

article thumbnail

Miracle on Ice: Business, Technology and National Security Leadership Lessons from the 1980 Olympics USA Hockey Team

CTOvision

Bob Gourley. I've previously posted the below, but it is a favorite story, one of leadership, vision, experience and mastery of art and science and my hope is that even of you have thought these lessons through in the past you might want to check them out again. The lessons probably apply to many enterprise teams (your Security Operations Center, Incident Response/Hunt Team etc), but seemed most relevant, to me, to teams formed from existing/legacy enterprises that have to now work as one.

Security 184
article thumbnail

Artificial intelligence will increase productivity by sharpening human mind

Computer Weekly

The combination of AI and humans will triple productivity if businesses get the balance right for different roles

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 Gadgets That Make Driving a Car So Easier

IT Toolbox

Some modern vehicles incorporate truly amazing technology, but still, the best cars are not available to everyone and some time will have to pass before we can all afford them.

136
136
article thumbnail

A survival strategy for the digital transformation

All Things Distributed

This article titled " Überlebensstrategie für die digitale Transformation " appeared in German last week in the "Die Zukunft beginnt heute (the future starts today)" section of Wirtschaftwoche. Smaller companies have a lot to gain in the digital era – provided they adopt the right mindset. The winners will be those that view their business from the eyes of their customers and understand that fast-paced innovation is the key to long-term growth.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IP: Choosing a Source Address for an ICMP Packet

IT Toolbox

formal documents are called Implementation Agreements (IAs). The FRF IAs heavily reference ITU-T standards. Currently available IAs are as follows: Standard Description FREI The User-Network Interface (UNI) FRE2 The Network-to-Network Interface (NNI) FRF.3 Multiprotocol encapsulation FRF.

Network 122
article thumbnail

Ransomware locked hotel out of its electronic key lock system

Network World

A 4-star hotel in the Austrian Alps, the Romantik Seehotel Jaegerwirt , admitted to bowing to extortion after ransomware locked up the computer running the hotel’s electronic key lock system. This was not the first time that cyber thugs attacked the hotel. During one of the attacks, the hackers reportedly left a backdoor into the system. The third attack occurred during the opening weekend of the winter season.

Hotels 92

More Trending

article thumbnail

How to remove malware

Network World

If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC.

Malware 69
article thumbnail

IP: Handling Incoming ICMP Messages

IT Toolbox

In all cases, even for ICMP messages that it does not handle, icmp_in accumulates a count of incoming messages. As upcoming posts will show, SNMP uses these counts.

116
116
article thumbnail

Review: Dell Latitude E7370

Scott Lowe

As part of my Linux migration (see my initial progress report ), late this past week I started setting up my first non-Apple laptop since 2003. In this post, I’d like to share my thoughts on my new laptop, a Dell Latitude E7370. First, let’s get the specs—the “speeds and feeds”—out of the way: Intel Core m7 CPU. 16 GB of RAM. 512 GB NVMe SSD. 3200x1800 touchscreen.

Dell 60
article thumbnail

Mainframe computing provides customer value and economies of scale

IT Toolbox

Patricia Genetin, from CA Technologies? ROI and Business Value Analytics Team, used this year's Arcati Mainframe Yearbook to explain how The State of Oregon, Enterprise Technology Services (ETS) educates buyers and customers on the critical role of mainframe IT operations and the proven value it provides.

Education 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The New Book “Decision Master” Introduction Chapter IV: Decision Pitfalls

Future of CIO

Decision making is the arena across the art and science; gut feeling and information, confidence and humilit y. Making decisions is one of the significant tasks for digital leaders and professionals today. However, the high ratio of strategic decisions has been made poorly and even cause a catastrophic effect. What are the key factors contributing to poor quality decision-making, where are the blind spots, and how to avoid potential decision-making pitfalls?

Groups 40
article thumbnail

Frame Relay Standards

IT Toolbox

The FRF works to develop frame relay technologies, improve existing standards, and facilitate multivendor interoperability.

article thumbnail

Cybersecurity in the President Trump Administration

Cloud Musings

From the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will have its hands full. And this doesn’t even account for ongoing efforts to infiltrate critical infrastructures by nation-state proxies and efforts to influence political, economic, and military conditions in the Un

article thumbnail

Developing Quality Metrics for your Big Data Application

IT Toolbox

Big data applications and their associated proprietary, high-performance data stores arrived on the scene a few years ago. With promises of incredibly fast queries, many IT shops implemented one or more of these combination hardware and software suites. Results have been generally good: many installations report incredible decreases in query elapsed times, sometimes by factors of 100 or more.

Big Data 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Take Care of Your Small IT Team

IT Toolbox

Small business organizations that are rising to the top don?t have a standard workflow where employees work from 9 to 5 and just strictly stick to their tasks.

article thumbnail

The bottom line on journal posting throughput via BDC

IT Toolbox

For financial postings Transaction code generally has no impact because the underlying FMs are generally common though enjoy TCodes are marginally slower.

Journal 100
article thumbnail

The Virtual Enterprise and the Cloud merge to form the virtual cloud Enterprise (vii)

IT Toolbox

continuing from. How does the Cloud benefit the enterprise (vi). The rise of the Cloud that moves the IT out of the enterprise (v).

article thumbnail

Should Your IT Company Go For Government Contracts

IT Toolbox

It is a well-known fact that governments (all levels) often struggle with equipment and expertise when it comes to various IT matters.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.