August, 2015

article thumbnail

Manage Those Keys

CTOvision

An unavoidable fact of life is that data breaches can and will occur. The jury is still out on when and to what extent we will be able to reverse this situation. However, in the meantime, to avoid appearing on the “wall of shame” of major breaches that expose confidential information, you had better make sure that all the data you use, store and transmit, is encrypted.

Backup 220
article thumbnail

VMware and Rackspace Release OpenStack Cloud Architecture

Data Center Knowledge

This article originally appeared at The WHIR VMware and Rackspace announced a new interoperable OpenStack cloud architecture this week at VMworld 2015 to help customers spin up OpenStack clouds without the complexity, particularly those associated with hybrid or multi-cloud environments. According.

Vmware 172
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Google’s CIO Can Teach Us About Becoming Better CIOs

The Accidental Successful CIO

Google’s CIO has some great ideas on how we can become better Image Credit: Robert Scoble. This CIO job never came with any instructions. Now that we have the CIO job, we are expected to know what to do, when to do it, and who to involve in doing it. I can only speak for myself, but I sure would like to have the opportunity to talk with someone who really knew what they were doing.

Google 160
article thumbnail

5 Things To Do When Your Career Hits Rock Bottom

Social, Agile and Transformation

Last year at this time I hit rock bottom in my career. For those of you that know me, you know why and for others it's not important to hash out the past. I learned from the experience. So for those of you that are in a bad situation at work, in your role, or in your career I'm able to offer some advice. Keep in mind, it's taken me a year to be able to write about it.

CTO 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Missing Bitlocker Recovery Keys Reporting Tool

Mick's IT Blog

In a perfect environment, GPO forces the bitlocker recovery keys into AD. This doesn't always function correctly. Sometimes a system is bitlockered offline and the key isn't there. Other times, a system might be decrypted and they forget to re-encrypt it. This script is written to generate a report on all systems that have not reported a bitlocker recovery key to AD.

Report 94
article thumbnail

“Cloud First” Lesson’s Learned from ViON

Cloud Musings

In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of the US Federal Government’s information technology modernization efforts: “Cloud computing has the potential to play a major part in addressing these inefficiencies and improving government service delivery.

Cloud 136

More Trending

article thumbnail

Some Terminated HP Employees Offered Jobs at Ciber

Data Center Knowledge

Employees hate to hear the dreaded “restructure” word coming from a CEO because it’s almost always synonymous with layoffs. By now, those at Hewlett-Packard must really despise it. HP’s current effort to breathe life into its Enterprise Systems (ES) business has already.

HP 167
article thumbnail

CIOs Need To Know How To Build Bridges

The Accidental Successful CIO

You’ll need a bridge to move from providing a service to being a partnerbr /> Image Credit: JOHN LLOYD. So here’s a question for you: based on the importance of information technology, what is IT’s role in your company? If you are like most people with the CIO job, your answer will consist of you listing a number of different things that the IT department does for the company: keeps its servers up, installs new applications, protects the network, etc.

How To 175
article thumbnail

How to Get an Agile Product Owner to Pay for Technical Debt

Social, Agile and Transformation

It's the most common question I get when discussing agile development as a CIO with a team of developers that are enthusiastic about maturing their practice. How do you get the Product Owner to prioritize fixing technical debt above new features, enhancements, special requests for customers, and improvements to internal tools? How do you get business stakeholders interested in seeing.

Agile 144
article thumbnail

Tracking Unlicensed Software using PowerShell, SCCM, and Orchestrator

Mick's IT Blog

Keeping track of systems that have unlicensed software installed can be a daunting task, especially when true up comes. We all have encountered systems that have it installed because the user called in screaming and the help desk went ahead with the install to just shut the user up. I decided that using PowerShell, SCCM, and Orchestrator would make this a much easier process.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Congratulations to StartApp, CloudLock and ZoomInfo for 2015 Inc. 5000 Recognition

The Investing Edge

We’d like to express our congratulations to our three current portfolio companies that made the Inc. 5000 fastest growing private companies list this year: Building a successful company is major challenge to begin with, but sustaining a high growth rate raises the bar even higher. Their ability to achieve continued high growth is a testament to the strong leadership and teams at these three companies.

Journal 70
article thumbnail

Integrate (26-30 Sep 2015 in Santa Clara) is the largest conference 100% focused on integrating technologies

CTOvision

Thanks to the organizers of the Integrate + API World 2015 Conference ( Sept. 26-30 , Santa Clara) we are able to give away up to 50 free OPEN passes to this very powerful event. Claim your Integrate OPEN pass here ($300 value). OR Get 30% off your Integrate PRO Pass ( see pass types here ). Integrate + API World 2015 is the nation’s largest integration + API conference featuring participants such as Google, IBM, Facebook, Linkedin, HP, Slack, HipChat, Zendesk, and 200+ more companies.

article thumbnail

FireHost Rebrands to Armor, Sharpening Cybersecurity Focus

Data Center Knowledge

This article originally appeared at The WHIR FireHost has rebranded to Armor, reflecting a shifting focus to security and compliance solutions, rather than cloud hosting, according to an announcement on Monday. As part of the announcement, Armor is extending its FireHost Virtual Private Cloud (VPC).

article thumbnail

What’s The Right Way For CIOs To Think About The Cloud?

The Accidental Successful CIO

Now that cloud computing has arrived, what should a CIO do? Image Credit: Pam Broviak. As the person with the CIO job, you now live in a world that is filled with lots and lots of real-time data. It comes from your customers, your manufacturing, your partners, and, of course, your company’s web site. Having access to this much data via the arrival of cloud computing is great news.

Big Data 132
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Looking for Security Peak Performance?

Cloud Musings

You can find it at Dell Peak Performance 2015 !!! I'll be there at the Aria Resort and Casino in Las Vegas attending as a social media representative with a full access pass and an invitation to meet and interview Dell executives and security technology leaders. The event is packaged across three focused tracks: Security Foundation: This track is designed for professionals including business owners, partner executives and sales professionals that are new to the Dell SonicWALL solution or who are

Security 131
article thumbnail

SCCM Inactive Systems Report

Mick's IT Blog

I have wanted a PowerShell script that would generate an excel report listing all of the inactive systems, if they are in active directory, and the last time someone logged onto the system if it is in AD. As we all know, it is easy to overlook these systems and they can accumulate, even if the cleanup is setup in SCCM. I chose to use SCCM as the definitive report because it pulls it's initial listing of systems from AD.

System 80
article thumbnail

Congrats to Blue Coat – PerspecSys buy is wise choice

The Investing Edge

Congratulations to enterprise security industry leader Blue Coat Systems on their acquisition of PerspecSys. Our portfolio company PerspecSys , an early leader in the rapidly emerging cloud data protection market, was recently acquired by security gateway leader Blue Coat Systems. This was a very savvy move by Blue Coat and it positions them well in the cloud gateway/cloud access security broker (CASB) market which is projected to grow rapidly by numerous industry analysts.

Cloud 85
article thumbnail

Industry and Government Cybersecurity Professionals Are Gathering In DC 9, 10, 11 Sep

CTOvision

NIST, DHS and NSA are collaborating together and with professionals across industry to hold the Cybersecurity Innovation Forum 9, 10 and 11 Sep in DC. For more and to register see: [link]. The following is from the event invitation: 2015 Cybersecurity Innovation Forum. September 9 - 11, 2015. Washington Convention Center - Washington, DC. The 2015 Cybersecurity Innovation Forum is a three-day event sponsored by the National Institute of Standards and Technology that will be held September 9 - 1

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Lenovo to Fold Smartphone Business Into Motorola

Data Center Knowledge

When Lenovo bought Motorola’s smartphone business from Google in early 2014, the move had investors questioning the decision to sink $2.91 billion into a flailing company. After all, even under the direction of the Internet behemoth, Motorola experienced several consecutive quarters in the.

Internet 172
article thumbnail

title

Scott Lowe

This is a liveblog for the Day 1 general session at VMworld 2015 in San Francisco. For many people, VMworld started yesterday with the Welcome Receptio in the Solutions Exchange, but today marks the official kick-off to the event. I’ll have to end this liveblog shortly before the general session ends in order to make it to some customer meetings. The keynote kicks off with a short video about the VMware Cloud Academy, where both “legacy” and “cloud-native” apps can enjoy the Unified Hybrid Cloud

Vmware 60
article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

UPDATE: NBC News reports U.S. officials have disclosed a hack of the Pentagon’s Joint Staff unclassified email system, which took place on July 25. Recent unauthorized access to a U.S. government database led to the compromise of information on at least 21.5 million individuals. This massive background investigation data breach also compromised usernames, passwords, mental health records and financial information.

Dell 117
article thumbnail

Windows Updates Reporting Tool

Mick's IT Blog

My firm uses MDT to build all of our computers. The windows updates are setup as packages so they can be applied to the OS before it is laid down on the PC. MDT will then download any new updates and apply them to the PC after the OS has been laid down. In order to keep track of new updates needing to be integrated as a package, I have written the following PowerShell script that will generate a CSV file listing all of the updates installed during the build and in the exact order they were insta

Windows 109
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to Mentor Human Side of Business via Change Management

Future of CIO

Change Management = the human side of change! Change for all of us is inevitable, some of us get it quicker than others. So the challenge for organizations is to recognize who their people are and where these talented professionals can contribute to the business success and feel valued along the way. From change management perspective, what's the psychology behind the change?

article thumbnail

Fed Tech Roundup August 27

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Army tries to speed cyber acquisition process - FCW.com. State Dept. IG chides diplomats for using private email. Iowa testing digital driver's licenses - GCN.com. Rebuild Healthy Homes from HUD. HUD’s Switchboard Puts Customer Experience and Customer Service Together.

Symantec 208
article thumbnail

Assessing the State of the Cloud and Containers at OpenStack Silicon Valley

Data Center Knowledge

This article originally appeared at The WHIR At the OpenStack Silicon Valley event this week, cloud professionals are discussing an OpenStack ecosystem that’s drastically different than when the event first launched five years ago. The software has considerably matured, but it’s also taking on even.

Cloud 168
article thumbnail

Spousetivities at VMworld 2015

Scott Lowe

It’s that time of year again—time for VMworld ! And along with VMworld comes another highly-anticipated event: Spousetivities ! That’s right, Spousetivities is back again this year for another set of outstanding activities organized for spouses traveling with conference attendees. If your spouse is traveling with you to San Francisco for VMworld, this is a great opportunity for him (or her) to meet up with other spouses and attend some exclusive activities.

Travel 60
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How To Use the SQL Developer Format SQL Options

Database Star

In this article, I’ll explain what formatting SQL is, and how to find the SQL Developer Format SQL options. What Is SQL Formatting? SQL formatting is the process of neatly arranging your code to make it more readable. When you write SQL, the format of the code is not relevant to the database. By this, I mean that the SQL statement will execute if the syntax is correct and the formatting is terrible.

article thumbnail

SCCM Client Installer

Mick's IT Blog

This PowerShell script will uninstall previous versions of SCCM client, run the CCMClean to make sure all instances of the client are gone off of the machine, and finally install the SCCM client. The script will not complete until the installation of the SCCM client is completed. I used this when upgrading from 2007 to 2012 and also have this integrated into the build.

article thumbnail

How do You Well Tune the 'Change Management' Process?

Future of CIO

Change is not for its own sake, but putting people at the center of the change. Change is the new normal. However, more than two-thirds of Change Management effort fail to achieve the business expectation. When would you communicate the change imperative to your employees and how would you ensure their buy-in to this new directive? And how do you well tune the “Change Management” processes in managing change with efficiency, effectiveness, and agility?

article thumbnail

4th Annual SAP NS2 Solutions Summit

CTOvision

SAP's annual Solutions Summit is an opportunity to engage and lead the dialogue that is grounded in perspectives from national security leaders such as yourself, on critical issues facing the U.S. national security community. The theme this year is “ Human Critical: Empowering the People that Drive U.S. National Security ,” and the objective is to honor the men and women who power the U.S. national security mission are essential to its success.

SAP 201
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.