May, 2015

article thumbnail

Global Connected Aircraft Conference: 8-10 June in Chantilly VA

CTOvision

The 2015 Global Connected Aircraft Conference will be held 8-10 June 2015 in Chantilly Virginia. Of particular interest to those of you who fly (which is all of you isn't it?) will be a 10 June panel diving into cybersecurity. There are definite cyber threats to aircraft, including aircraft in flight. But there is also definitely hype and wildly out of control pundits who create scenarios that have no basis in fact.

article thumbnail

Infoblox Unveils Secure DNS Server

Data Center Knowledge

Infoblox unveiled an appliance that can detect and block DNS attacks. DNS servers inside the data center have become targets because firewalls don’t inspect DNS queries. Read More.

Firewall 166
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

4 Reasons Why Citizen Developers May Be The Next Big Thing in Application Development

Social, Agile and Transformation

I must be behind the times because last week was the first time I heard the term "Citizen Developer", a term Gartner defines as a user who creates new business applications for consumption by others using. development and runtime environments sanctioned by corporate IT. They are referring to a business user and not a software developer in IT, and are careful to distinguish this from Rogue-IT.

article thumbnail

7 common mistakes in Go (2015)

SPF13

Given at GopherFest 2015. This is an updated version of the talk I gave in NYC Nov 14 at GothamGo. “We need to think about failure differently. Most people think mistakes are a necessary evil. Mistakes aren’t a necessary evil, they aren’t evil at all. They are an inevitable consequence of doing something new and as such should be seen as valuable. “ - Ed Catmull.

Examples 204
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Innovation needs process change

Eric D. Brown

Jeffrey Philips currently wrote a nice piece titled “ Innovate your processes before innovating your products ” over on his excellent Innovate on Purpose blog. In that article, Jeffrey argues that before a company can innovate its products/services, it must innovate its processes if it hopes to build a sustainable edge via innovation over its competition.

Groups 144
article thumbnail

To Be Successful, CIOs Need To Implement Simplicity

The Accidental Successful CIO

Complexity Is Something That IT Can Do Without Image Credit: nerovivo. I don’t know about you, but whenever I see something that looks complicated, I am impressed. I mean, somebody took the time to make that and so based on the importance of information technology it must do something complicated very well. Well, it turns out that I’m wrong.

More Trending

article thumbnail

Cisco Extends Storage Switch Lineup

Data Center Knowledge

Cisco says it is trying to make it simpler to scale storage deployments in the data center while also reducing the number of switches that actually need to be deployed. Read More.

Storage 177
article thumbnail

Transforming Technology Organizations By Investing in Culture and Practices

Social, Agile and Transformation

Should IT only be a services organization to the Business? Should it only provide a services catalog around incidents and requests and a PMO to oversee projects when required? Will perfecting service levels and project execution be good enough for the Business to compete when innovation and data driven practices are so critical for competitiveness? Will IT be able to consider optimal solutions.

Data 187
article thumbnail

Getting Back to Basics

A CIO's Voice

As a CIO, I rarely if ever do basic technology troubleshooting. Not because I don’t want too, but my staff usually discourages me from touching things these days. Yesterday was an usually slow day for me. So I decided to catch up on some personal housekeeping and organizing. So I decided to move my computer and to relocate to a new jack which was not lit.

article thumbnail

The most critical skill?

Eric D. Brown

I’m an avid reader. I tend to read a few books at a time (I read one depending on my ‘mood’ at the time). The other day, I was scrolling through the various sections in Amazon’s Kindle Unlimited program and somehow ended up in the ‘self-help’ section. Now, I’m not a fan of self-help books because they tend to try to tell people that they can follow a ‘recipe’ and then they’ll be ‘all better.’ Life doesn’t work this

Groups 153
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. They include: Public cloud is more easily breached that a private cloud Any infrastructure that you manage or own is more secure than any cloud computing infrastructure Cloud-hosted applications are technically no different than enterprise-hosted

article thumbnail

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. ~ Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8 million to fund targeted areas of promisi

Research 223
article thumbnail

C7 Expanding Utah Data Center

Data Center Knowledge

The exclusively Utah data center provider is completing its 90,000 square foot facility, as well as adding power capacity for a total of 11 megawatts of critical power. Read More.

article thumbnail

33 Bad Behaviors of Agile Developers and IT Operations

Social, Agile and Transformation

I recently published 20 Bad Behaviors of Agile Product Owners and decided not to leave this subject one sided. In trying to improve the organizational culture and more specifically, the culture in IT, the CIO and IT leadership must consider, review, and improve on its own behaviors. So this week I'm itemizing some of the bad behaviors in IT. Like my previous most, I haven't seen these.

Agile 195
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Back-to-Basics Weekend Reading - Survey of Local Algorithms

All Things Distributed

As we know the run time of most algorithms increases when the input set increases in size. There is one noticeable exception: there is a class of distributed algorithms, dubbed local algorithms, that run in constant time, independently of the size of the network. Being highly scalable and fault tolerant, such algorithms are ideal in the operation of large-scale distributed systems.

Survey 115
article thumbnail

Technology Short Take #51

Scott Lowe

Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Here’s hoping you find something useful in this collection! Networking. I’m not sure if this falls here or into the “Cloud Computing/Cloud Computing” category, but Shannon McFarland—fellow co-conspirator with the Denver OpenStack Meetup group—has a nice article describing some design and deployment co

Vmware 60
article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. They include: Public cloud is more easily breached that a private cloud Any infrastructure that you manage or own is more secure than any cloud computing infrastructure Cloud-hosted applications are technically no different than enterprise-hosted

Industry 128
article thumbnail

Brocade Federal Forum 17 June Washington DC: Great speakers and attendees converge on critical topics

CTOvision

Our friends at FedScoop and Brocade have collaborated with leaders from across government and industry to build an incredibly compelling agenda for the 17 June Federal Forum. Speakers include the Federal Government's CIO, the CIOs from DHS, DoD, HHS, Commerce, Transportation, plus senior executives from AT&T, HP, Intel, ImmixGroup, FedScoop, and of course Brocade.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Zynga Ditches Data Center Plans For AWS

Data Center Knowledge

The casual gaming company spent over $100 million on data centers as it shifted away from Amazon Web Services. The company has come full circle, back to relying on AWS Read More.

article thumbnail

Is there Thoughts without Words?

Future of CIO

Miscommunication is the symptom of many human conflicts, but the "thought" behind it is the root cause of almost all human problems. Questions of computability have often been linked to questions about the nature of the human mind since one may wonder if the mind is a computational machine. In other words, is there thought without the word? Are we really using language or used by it?

System 56
article thumbnail

Join me at the AWS Summit in Paris, Tel Aviv, Berlin, Amsterdam or New York

All Things Distributed

An important way of engaging with AWS customers is through the AWS Global Summit Series. All AWS Summits feature a keynote address highlighting the latest announcements from AWS and customer testimonials, technical sessions led by AWS engineers, and hands-on technical training. You will learn best practices for deploying applications on AWS, optimizing performance, monitoring cloud resources, managing security, cutting costs, and more.

article thumbnail

Using an Apt Proxy

Scott Lowe

In this post I’ll show you how to use apt-cacher-ng as an Apt proxy for Ubuntu systems on your network. I’m sure there are a lot of other resources that also provide this information, but I’m including it here for the sake of completeness and making it as easy as possible for others. Using an Apt proxy will help reduce the traffic coming from your network to external repositories, but it simpler and easier than running your own internal repository or mirror.

Network 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Science and Art of Business Leadership

Cloud Musings

Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of business is best learned from real practitioners. That is why I jumped at the chance to meet Dimension Data ’s Steve Nola during the company’s analyst event, Perspectives 2015, in Prague, Czech Republic.

Cloud 70
article thumbnail

Lessons from the Synergy Forum: Affordability of Cybersecurity & Risk Management

CTOvision

On April 30 2015 industry leaders and government practitioners gathered in Tysons Corner at Cognitio's Synergy Forum to discuss technology trends, innovation, and ways to enhance enterprise and mission outcomes. Technology and Emerging Concepts for Enhanced Cybersecurity , the forum’s first panel discussion, consisted of David Bray, Brian Carrier, Peter Fonash, and Dean Hall, who collectively identified many of the growing opportunities and challenges in the cyber arena.

article thumbnail

MapR Hadoop Distribution Now Shipping With Apache Drill

Data Center Knowledge

Apache Drill allows self-service SQL analytics without requiring pre-defined schema definitions, meaning better real time insights without having to prepare the data Read More.

Data 162
article thumbnail

DFive Principles to Manage Change Effectively

Future of CIO

Business Change Management is managing everything that is necessary to get people to adopt new ways of working to harness innovation and improve productivity. Traditional Change Management is all about management and control. Real change is all about appropriate leadership and management. Anyone who has successfully worked with the change in organizations and businesses know that the change process is unpredictable and a moving target; it's less about management and more about leadership.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The AWS Pop-up Loft opens in New York City

All Things Distributed

Over a year ago the AWS team opened a "pop-up loft" in San Francisco at 925 Market Street. The goal of opening the loft was to give developers an opportunity to get in-person support and education on AWS, to network, get some work done, or just hang out with peers. It became a great success; every time when I visit the loft there is a great buzz with people getting advice from our solution architects, getting training or attending talks and demos.

article thumbnail

Building a Fully Automated Ubuntu Installation Process

Scott Lowe

Recently on Twitter, I mentioned that I had managed to successfully create a fully automated process for installing Ubuntu Server 14.04.2, along with a method for bootstrapping Ansible. In this post, I’m going to describe the installation process I built and the components that went into making it work. I’ll discuss the Ansible bootstrap process in a separate post.

Linux 60
article thumbnail

The Science and Art of Business Leadership

Cloud Musings

Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of business is best learned from real practitioners. That is why I jumped at the chance to meet Dimension Data ’s Steve Nola during the company’s analyst event, Perspectives 2015, in Prague, Czech Republic.

Cloud 128
article thumbnail

7012 Regs and Cyber insurance on collision course with small business

CTOvision

Editor's note: This post first appeared at MKHamiltonAssociates.com and is republished here with the permission of the author. - bg. Part One: What are the “7012” regulations? Defense Acquisition Regulation Supplement 252.204-7012. In November 2013, the US Department of Defense issued final rules to its defense acquisition regulations. Defense Acquisition Regulation Supplement (DFARS) section 252.204-7012 now requires contractors to safeguard information that is deemed Unclassified, but controll

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.