October, 2014

article thumbnail

History Is Made By Samsung: Knox Platform Enables First Consumer Mobile Device To Be Validated and Approved For U.S. Gov Classified Use

CTOvision

'For those of us who work in and around the enterprise security domain something unique has just happened. The U.S. Government has just approved a commercial consumer device, the Samsung Galaxy family of devices, for classified info. This means government organizations can establish new, smarter, more scalable mechanisms to get classified information to mobile users.

Mobile 347
article thumbnail

Shutterfly Deploys 1,000 Cabinets at Switch SUPERNAP

Data Center Knowledge

'In one of the largest colocation deals ever, photo editing and sharing service Shutterfly Inc. is deploying 1,000 cabinets at the SUPERNAP data center campus in Las Vegas. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Agile Data Organization - Balancing Responsibilities in Data Science Programs

Social, Agile and Transformation

'If you''ve read this blog or have seen me speak at a conference, then you know I am a strong proponent of self-service BI programs. I''ve posted on principles of self-service BI programs, attributes of data driven organizations, and how to avoid data landfills among many other big data topics all aimed to get business teams successful competing and driving decisions with data.

Agile 221
article thumbnail

Drowning in Data, Starved for Information

Eric D. Brown

'In his 1982 book Megatrends, John Naisbitt wrote “We are drowning in information but starved for knowledge.” While written over 30 years ago, that line is as very true today…but I might change it a bit to match the current state of affairs. Today, we are drowning in data and starved for information. Every organization has a great deal of data and more data is being collected every day.

Data 203
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Book: Technology That Every CIO Needs To Know About

The Accidental Successful CIO

'Technology That Every CIO Needs To Know About. As the CIO of your company, it’s your job to stay on top of all of the different forms of technology that the company uses to accomplish its business goals. This task is made even harder by all of the changes that are always occurring in the various technology fields. As the CIO you need to understand how to pick the correct type of database to be used on projects.

Big Data 187
article thumbnail

Thriving in a Cloud, Big Data, Mobility and Security World

Cloud Musings

'"The next generation of technology solutions will transform lives, businesses and economies." This is the theme at this year''s Dell World opening keynote and this view is supported by Gartner''s Top 10 Strategic Technology Trends for 2015 : C omputing Everywhere - As mobile devices continue to proliferate, Gartner predicts an increased emphasis on serving the needs of the mobile user in diverse contexts and environments, as opposed to focusing on devices alone.

Big Data 174

More Trending

article thumbnail

From HAL to Johnny Depp’s California Data Center: The Evolution of Data Centers in Movies

Data Center Knowledge

'The data center has gone a long way in Hollywood. We look at 10 data centers that play pivotal roles in blockbusters and the evolution from abstract concept to full-fledged future data center. Read More.

article thumbnail

Five Takeaways from Mobile Enterprise Boston

Social, Agile and Transformation

'Last week I attended M|Enterprise Boston, a conference that brought together technologists ahead of the curve in mobile application development, IT executives looking for best practices on mobile device management in large enterprises, and leaders looking to help their business gain a competitive edge by developing differentiating mobile capabilities.

Mobile 182
article thumbnail

Why Convergence?

Eric D. Brown

'“This post is brought to you by End-to-End Solutions for IT Pros and Dell.”. When I talk to clients about the technology and systems challenges being faced within their organization, I tend to hear a wide variety of responses. Challenges within the data center seem to exist in just about every client discussion. These challenges revolve around a myriad of issues but most can be categorized into areas like efficiency, energy usage, management, agility and utilization.

article thumbnail

Should The CIO View The CMO As Friend Or Foe?

The Accidental Successful CIO

'Do CIOs and CMO really have to fight? Image Credit. If there is one fact of life that everyone who has the CIO job has had to learn to deal with, it’s that our IT budgets never seem to be big enough. However, it turns out that there is someone else in the company who does not have the same problem: the CMO. In fact, the CMO has so much money to spend, they are starting to build their own IT department.

Budget 182
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

"Cloud Musings" Joins Dell Content Provider Network

Cloud Musings

'Cloud Musings, a GovCloud Network Property, is proud and honored to announce that we will now be serving over 3 Million Dell Community online daily viewers. Our content will focus on Cloud Computing for Business and will continue to provide independent and vendor neutral information on how business, government and non-profit organizations can better leverage the global and parallel nature of cloud computing.

Dell 170
article thumbnail

Our Freemium Future: Development teams take advantage of free, entry-level versions of software 

CTOvision

'CTOs should consider having their development teams take advantage of free, entry-level versions of software – known as freemium software – to test out the functions of commercial products. From the perspective of Michael Williams, BIRT Product Evangelist & Forums Manager at reporting and analytics leader Actuate, freemium software is a resource that can really help the enterprise.

Software 288
article thumbnail

Explaining the Uptime Institute’s Tier Classification System

Data Center Knowledge

'Over the years, some industry pundits have expressed frustration with Uptime Institute’s Tier Classification System for being confusing, writes Matt Stansberry of Uptime Institute. But in many cases, these individuals have misrepresented the purpose and purview of the program. Fundamentally, it is.

System 272
article thumbnail

Expanding the Cloud – Introducing the AWS EU (Frankfurt) Region

All Things Distributed

'Today, Amazon Web Services is expanding its worldwide coverage with the launch of a new AWS region in Frankfurt, Germany. This is our 11th infrastructure region and was built to support the strong demand we are seeing in Europe and to give our customers the option to run infrastructure located in Germany. The new Frankfurt region provides low millisecond latencies to major cities in continental Europe and is also run with carbon neutral power.

SAP 160
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

VMware Cisco EMC VCE Zen and now server storage I/O convergence

Storage IO Blog

'In case you have not heard, the joint initiative (JV) founded in the fall of 2009 between Intel VMware Cisco and EMC called VCE had a change of ownership today. For those not familiar or who need a recap, VCE was created to create converged server, storage I/O networking hardware and software solutions combing technologies from its investors resulting in solutions called vBlocks.

Vmware 84
article thumbnail

Oregon’s FirstNet Consultation – Impressions

Chief Seattle Greek Blog

'Oregon’s Consultation. In February, 2012 the First Responder Network Authority (FirstNet) was created and funded with $7 billion by Congress to build a nationwide wireless network for responders to daily incidents and larger disasters. I sometimes call it a cellular network to connect the smart phones and tablets of cops and firefighters, but, really, anyone who responds to disasters will probably be able to use it.

Network 64
article thumbnail

Vets360 Founder Rick Collins Being Honored at the 'Champions' Leadership Conference

Cloud Musings

'Veteran''s 360 and Rick Collins, Founder & Executive Director of Vets 360, Inc., are being honored at this year''s Champions Leadership, and Research Conference™. This event, November 6th-7th, 2014 at the Washington Duke Inn & Golf Club in Durham, NC, is an independent conference, and a component of eMerging Entrepreneurs'' “Veterans Economic Advancement project.

article thumbnail

Lessons Learned: Are you one of the Fortune 500’s Unfortunate 221?

CTOvision

'The Recorded Future Special Intelligence Desk has just released a new Threat Intelligence Report we found to be full of important context and actionable information for enterprise cyber defenders. The report, titled The Fortune 500’s Unfortunate 221, is available for download here. This report is important for two key reasons: It shows a clear example of the strategic benefit of cyber intelligence to enterprise cyber defense.

Malware 287
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

IBM Adds OpenStack Services, Launches Cloud Data Center in Mumbai

Data Center Knowledge

'OpenStack powered by IBM cloud on SoftLayer infrastructure brings OpenStack closer to enterprises. IBM also anounced a new data center in Mumbai, India as part of $1.2bn global data center expansion. Read More.

IBM 265
article thumbnail

Document Model Support in DynamoDB: Flexibility, Availability, Performance, and Scale.Together at last

All Things Distributed

'Today, I’m thrilled to announce several major features that significantly enhance the development experience on DynamoDB. We are introducing native support for document model like JSON into DynamoDB, the ability to add / remove global secondary indexes, adding more flexible scaling options, and increasing the item size limit to 400KB. These improvements have been sought by many applications developers, and we are happy to be bringing them to you.

article thumbnail

September October 2014 Server and StorageIO Update Newsletter

Storage IO Blog

'Hello and welcome to this joint September and October Server and StorageIO update newsletter. Since the August newsletter, things have been busy with a mix of behind the scenes projects, as well as other activities including several webinars, on-line along with in-person events in the US as well as Europe.

Storage 79
article thumbnail

Continued Controversy over Smartphone Encryptions

CTOvision

'With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. This heightened attention has manifested itself in recent actions by Apple and Google that have provided higher levels of encryption for smartphone data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Three Most Common Myths in Enterprise Security

CTOvision

'Editor’s note: This post by Invincea CEO Anup Ghosh first appeared at LinkedIn. We knew this would be of interest to you and posted it here with the author’s permission.-bg. I’ll say it up front, your security program does not work because it is based on three common myths we hold as unquestionable truths in enterprise security: Myth 1: We can patch our way to security.

article thumbnail

The Importance of an Online Encryption Policy

CTOvision

'Benjamin Franklin once said, “If you fail to plan, you plan to fail.” This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

NIST Issues Draft Guide To Cyber Threat Information Sharing

CTOvision

'I love and respect NIST and I just want to come right out with that so you know where I am coming from. Now add on top of that the fact that they have just issued a draft document that discusses items at the intersection of three of my passions, Cyber Security, Technology and Intelligence, and you can see why I am so excited. So, with my bias in mind, I report the following: NIST has just produced a draft special publication that I believe is the best thing I have ever read from their organiza

CTO 283
article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

'This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter. Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia. Most every enterprise with a mature understanding of the importance of protecting their digital assets has a cyber intelligence program underway.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Strata Hadoop World 2014: Watch Live Streaming Here

CTOvision

'If you could not make it to Strata-Hadoop World 2014 in NYC you can still watch streaming video of the keynotes. To do that visit our Hadoop World video streaming page here: https://ctovision.com/strata-hadoop-world-2014-watch-live-streaming-here/. Be sure to bookmark it! Here is the schedule of keynotes: Thursday Keynote Welcome. 8:45am–8:55am Thursday, 10/16/2014.

Big Data 276
article thumbnail

Examining New Mission-Enabling Design Patterns Made Possible By The Cloudera-Intel Partnership

CTOvision

'CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. The paper captures design considerations for enterprise technologists that flow from the engineering work both Cloudera and Intel have been putting into both open source technologies and hardware design.

Intel 276
article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

'On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Ed Steinike , the CIO at Coca-Cola, and Bob Flores , the former CTO of the Central Intelligence Agency (CIA) and a partner at our parent firm Cognitio were the key presenters.

article thumbnail

The Data Impact Awards: This is the “academy awards” of data solutions

CTOvision

'Editor’s note: Last night Cloudera held the 2014 Data Impact Awards. I was very proud to be a judge and honored to be a presenter. The most interesting part for me was reviewing the many impactful nominations, especially those that are directly tied to saving lives, curing disease, finding fraud, and helping the department of defense and the intelligence community support national security missions.

Data 274
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.