July, 2015

article thumbnail

Fed Tech Roundup July 31

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. GAO To Congress: Revisit Privacy Concerns Over Facial Recognition Technology - TechCrunch. Tracking Sentiment Around Presidential Candidates with LUX2016. Viruses or worms haven’t killed anyone – control system cyber incidents have.

article thumbnail

The Paradox of Complexity and Efficiency in Modern IT Infrastructure

Data Center Knowledge

The dynamic allocation of applications and components adds yet another level of complexity to IT operations making it more difficult to manage and monitor data centers. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Should A CIO Deal With An Employee Mutiny?

The Accidental Successful CIO

CIOs need to be aware that a mutiny may be happening right now! Image Credit: HoJo Anaheim. The CIO runs the show when it comes to all things having to do with IT because of importance of information technology, right? Well, it turns out that this is not always the case. Even as you are reading this, in your IT department a mutiny may be brewing. What has caused this to happen and what should you be doing to prepare for it?

article thumbnail

Data is only as good as you make it

Eric D. Brown

I’m currently working with a client who is very immature when it comes to data analysis. This particular client has no history of analyzing data and barely any history of reporting. Their idea of analysis is looking at a few finance reports to see how the business is doing. Now, if this particular client was a small business, I’d have no problem with this approach… but they aren’t.

Data 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Business Leaders are Clueless about Data Integration

Social, Agile and Transformation

When someone says that the data integration process is automated, I suggest asking questions to clarify what they mean by automated. You'll probably conclude that the process is anything but automated let alone reliable, scalable, secure, or configurable. To some, automation implies efficient and reliable but still including manual steps so long as they are performed quickly and easily.

Data 195
article thumbnail

Running Programs as an Application Installation in SCCM 2012

Mick's IT Blog

Recently, I had to deploy an application, IntApp, with minimal intrusion and no reboots. Part of the process was to restart the application after a successful installation. The crux was that the application has to run under the user credentials. The app starts every time a system is logged into, but with laptops, that could have been a long time until the user actually rebooted the machine.

More Trending

article thumbnail

SoftLayer Founder Crosby Shares Lessons of Success

Data Center Knowledge

Story by TC Doyle for The WHIR Chairman and CEO of “To Be Announced.” A lot of business practitioners would have a hard time listing that as their current position in their LinkedIn profile. But not Lance Crosby. Crosby, of course, is the founder and former CEO of SoftLayer. In… Read More.

Course 169
article thumbnail

How A CIO Can Reorganize An IT Department

The Accidental Successful CIO

How a CIO conducts a reorganization can have a big impact on the IT department Image Credit: rocket ship. Hey CIO, how’s that IT department of yours looking these days? If you are like most of us, you are fairly happy with how your IT department has been put together, but there are some areas in which you’d like to make a few changes. Sound like it’s time for a reorganization of the IT department.

Report 149
article thumbnail

Cloud Computing Price-Performance Could Vary By 1000%!

Cloud Musings

by Kevin L. Jackson Yes, y ou read that right. The price/performance of your cloud computing infrastructure could vary as much as 1000 percent depending on time and location. High levels of variability have actually been seen within the same cloud service provider (CSP) processing the exact same job. This also means that the cost to you of processing the exact same job in the cloud could vary by this much as well.

Cloud 134
article thumbnail

Fixing your IT Legacy Before the Next Bridge Collapse

Social, Agile and Transformation

Last week we saw two significant, public system outages, one belonging to NYSE because of a "configuration issue" and the other to United Airlines because of a "router issue". This week, the news is on OPM's data breach of 21 million users and their lack of investment and follow through on resolving security issues identified by auditors. My first thought on seeing these failures is that.

Airlines 163
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

PowerShell MSI Uninstaller By Application Name

Mick's IT Blog

Here is a function that will uninstall an MSI installed application by the name of the app. You do not need to input the entire name either. For instance, say you are uninstalling all previous versions of Adobe Reader. Adobe Reader is always labeled Adobe Reader X, Adobe Reader XI, and so forth. You just need to enter Adobe Reader as the application name and the desired switches.

article thumbnail

Viruses or worms haven’t killed anyone – control system cyber incidents have

CTOvision

The prevailing feeling about why there has been so little focus on securing control systems is that it isn’t real. What I constantly hear is “once there is a real control system cyber incident I will spend the time and money to address the problem”. Unfortunately, there have been already been many very significant control system cyber incidents. However, for various reasons, almost none have been identified as cyber.

System 227
article thumbnail

Storing All That Data: Web-Scale Solutions for a Connected World

Data Center Knowledge

Mobile data traffic is expected to grow ten-fold by 2019, and one way data centers are handling the increase is by adopting web-scale architecture and distributed storage. Read More.

Data 165
article thumbnail

Back-to-Basics Weekend Reading - Data Compression

All Things Distributed

Data compression today is still as important as it was in the early days of computing. Although in those days all computer and storage resources were very limited, the objects in use were much smaller than today. We have seen a shift from generic compression to compression for specific file types, especially those in images, audio and video. In this weekend's back to basic reading we go back in time, 1987 to be specific, when Leweler and Hirschberg wrote a survey paper that covers the 40 years o

Data 89
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Technology Short Take #52

Scott Lowe

Welcome to Technology Short Take #52, the latest collection of news, links, and articles from around the web on data center technologies. Networking. Want to know a bit more about how OVN (Open Virtual Network) plans to integrate support for containers? See this. You might also find it useful to review this OVN presentation from the recent OpenStack Summit in Vancouver.

Vmware 60
article thumbnail

How to Lead Through Constant Change

Future of CIO

The vision for long-term transformation is required for the change to be effective and lasting. Change becomes new normal because of the "VUCA" characteristics of the digital dynamic. Traditional step-by-step Change Management as a one-time initiative or isolated approach might not work any longer for constant and multitude of change. Companies need to embed a changeable mindset in their culture and build change capabilities among all staff, not only managers in a continuous way.

How To 63
article thumbnail

IDG Contributor Network: Apple stands alone in controlling the in-store experience

Computerworld Vertical IT

When it comes to redefining the brick-and-mortar shopping experience, no major retailer even approaches what Apple has done with the Apple Store. The Apple Store had real mobile payments long before anyone else, as well as in-aisle payments, long before anyone else. (To this day, Starbucks, which often proclaims itself as a mobile payments leader, offers neither.

Apple 58
article thumbnail

Tamr: Connect and enrich all your data for analytics and decision making

CTOvision

With this post we are initiating coverage of Tamr. Tamr was founded in 2013 by a distinguished cadre of database industry veterans including Andy Palmer and Turing award winner Mike Stonebreaker. Tamr enables enterprises to make use of 100% of available data by unifying and enriching data holdings. Tamr's data unification platform catalogues, connects and curates internal and external data sources at scale through a combination of machine learning algorithms and human expert guidance, radically

Data 253
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

When Self-Service BI Actually Means Self-Service

Data Center Knowledge

Self-service should be an approach to data analysis that grants users the access and ability to work with the information they need to analyze without depleting IT resources and time. Read More.

Analysis 164
article thumbnail

How To Keep Calm at Work

Database Star

As part of your job in the IT industry, there will no doubt be times that you will get annoyed and stressed. Learn how to keep calm at work with some tips in this article. Take a Deep Breath When I’m not feeling calm at work, the first thing I do is stop and take a big, deep breath. It makes me stop what I’m doing for a few seconds and focus just on the breath that I’m taking.

How To 53
article thumbnail

Intel and Micron unveil new 3D XPoint Non Volatie Memory (NVM) for servers and storage

Storage IO Blog

In a webcast the other day, Intel and Micron announced new 3D XPoint non-volatile memory (NVM) that can be used for both primary main memory (e.g. what’s in computers, serves, laptops, tablets and many other things) in place of Dynamic Random Access Memory (DRAM), for persistent storage faster than today’s NAND flash-based solid state devices (SSD), not to mention future hybrid usage scenarios.

3D 63
article thumbnail

Can Your Culture Help People Become WHO They Are?

Future of CIO

Being humans, we should have one big advantage - knowing about our own nature. There are many different perspectives of culture presented along with diverse ways and means of dealing with it. At high-mature digital organizations, culture management, talent management, and performance management have been integrated into a holistic people management approach.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Often Have You Saved the Day with Your Coding Skills?

Nutanix

It’s 4:45 pm on a Friday before a long weekend, your manager stops by your cubicle and has a last minute task for the team that needs to be done before everyone leaves for the day.

20
article thumbnail

CTOvision Now Curating Reference To Cyber Threat Intelligence Companies

CTOvision

CTOvision seeks to provide information that helps enterprise technologists succeed. This includes curated lists of technologies we believe hold the greatest potential of making dramatically positive/virtuous contributions to organizational missions. Since all of us already know the big players in tech, we tend to focus on the smaller but still very capable firms, and now curate entries on over 270 of these disruptive forces for positive change.

Company 234
article thumbnail

Enterprise Storage: How to Manage the Inevitable

Data Center Knowledge

Jason Phippen is Head of Global Product and Solutions Marketing for SUSE. The vast majority of IT departments are experiencing enormous increases in the demand for storage and computing power. Few, if any, will have the budget to meet rising requirements that continue to outpace the growth of their.

Storage 176
article thumbnail

How To Turn On Line Numbers in SQL Developer

Database Star

In this article, I’ll show you what line numbers are in SQL Developer and how to turn this setting on. What Are Line Numbers in SQL Developer? Line numbers are numbers that are next to each line in the Code Editor. They indicate which line of code you’re working on. They are helpful for developers for many reasons: They let you see how many lines of code you’ve written They help with debugging errors , as error messages usually refer to a line number (related: 7 Debugging Tips

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Part III – 3D XPoint new server storage memory from Intel and Micron

Storage IO Blog

The initial die or basic chip building block 3D XPoint implementation is a layer 128 Gbit device which if using 8 bits would yield 16GB raw. Over time increased densities should become available as the bit density improves with more cells and further scaling of the technology, combined with packaging. For example while a current die could hold up to 16 GBytes of data, multiple dies could be packaged together to create a 32GB, 64GB, 128GB etc. or larger actual product.

3D 54
article thumbnail

Data Scientist vs. Data Algorithm

Future of CIO

Analytical algorithms and data scientists are not mutually exclusive, but they are absolutely complimentary. An algorithm is a procedure or formula for solving a problem. An algorithm is a model of the real world. A data scientist is a job title for an employee or business intelligence (BI) consultant who excels at analyzing data, particularly large amounts of data, to help a business gain a competitive edge (whatis.com).

Data 49
article thumbnail

How Often Have You Saved the Day with Your Coding Skills?

Nutanix

It’s 4:45 pm on a Friday before a long weekend, your manager stops by your cubicle and has a last minute task for the team that needs to be done before everyone leaves for the day.

20
article thumbnail

ThreatBrief: Strategic Cyber Intelligence Delivered Daily

CTOvision

The Daily Threat Brief provides strategic insights into threats. This is an open source intelligence report modeled after the concept of the President’s Daily Brief (PDB). Every day the analysts of Cognitio succinctly provide insights into global risk and security issues in ways that can reduce your personal and business risks and inform your strategic decision making.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.