Sat.Mar 12, 2016 - Fri.Mar 18, 2016

The cloud's missing link: Monitoring and management

David Linthicum

Monitoring and management of cloud-based production environments is often an afterthought. Perhaps there is so much to think about -- security, cost management, and governance -- that monitoring and management fall by the wayside. Or perhaps IT believes it simply can use clouds' native tools. Monitoring and management are important to any data center, whether in the cloud or not.

Tools 159

What’s The Biggest Data Security Threat In Your Business? The Answer Might Surprise You

CTOvision

William Hayles. As an admin, it’s your job to be paranoid. But you might be worrying about the wrong things. You might be overlooking the biggest threat to your servers. Pick your poison, folks - there’s no shortage of boogeymen in the cybersecurity space.

20 Influential Chief Information Officers

A CIO's Voice

20 Influential Chief Information Officers from Michael Krigsman. As the Chief Information Officer role become increasingly prominent, it is important to recognize CIOs who actively stake a claim as innovators and communicators.

Foto Friday – Great Blue Heron in Profile

Eric D. Brown

This is a Great Blue in Profile from a few years ago. Captured with Canon 7D and Canon 400mm 5.6 See more photos in my flickr photostream and/or my 500px portfolio.

130
130

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Old-school vendors share in Oracle's cloud troubles

David Linthicum

In the cloud era, it's getting tougher and tougher to make it as a traditional enterprise software vendor. The latest example: Oracle. In the last quarter, rapid growth for Oracle's cloud services wasn't enough to offset the slowdown in sales of its traditional wares; the cloud accounts for only 8 percent of the Oracle business. Download InfoWorld's quick guide and get started with Azure Mobile Services for building apps today. Stay up on the cloud with InfoWorld's Cloud Computing newsletter. ].

Oracle 149

More Trending

Vapor IO and BaseLayer Integrating Modular Data Center Tech

Data Center Knowledge

Companies integrate data center software and hardware, putting Vapor Chambers inside BaseLayer modules Read More. Colocation Data Center Design Modular Data Centers Open Compute Racks and Enclosures

Will marketing continue to grow their share of the technology budget?

Eric D. Brown

If you are involved with marketing and/or technology in any large organization, you most likely are hearing a lot about marketing technology (MarTech) and the ‘explosion’ of MarTech people, technology, projects… and budgets.

Budget 130

The Battle For Your Head Is Underway: VR from Oculus, Sony, HTC/Valve competing at GDC2016

CTOvision

Bob Gourley. GDC2016 is the largest game developer conference in the globe. By all accounts it will be the biggest yet for virtual reality. It has become so huge a sub-conference has been organized called the Virtual Reality Developers Conference ( VRDC ).

Film 121

The Problem With Healthcare Records

The Accidental Successful CIO

Turning paper into electronic records is turning out to be harder then expected Image Credit: benben. In the U.S., the government is investing a great deal of money into transforming the country’s medical system.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Survey: Women in Data Center Roles Get Paid More than Men

Data Center Knowledge

Stratoscale-sponsored study finds data center industry bucks Silicon Valley trend Read More. Data Center Jobs Featured Staffing

Survey 183

10 Best Practices in Configuring your Agile Project Management Tools

Social, Agile and Transformation

If you are serious about agile development then you most likely selected a tool to enable team collaboration and manage the backlog, sprints, and releases. While I have heard of some teams and even organizations staying low tech and using stickies, cards, or spreadsheets, it's really hard to scale to multiple teams, manage distributed teams, or develop metrics to support process improvements.

What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity?

CTOvision

Bob Gourley. In December 1998 when transitioning into a job doing intelligence support to DoD computer network defense, one of my mentors reminded me of a Reagan-era publication that helped the public better understand the Soviet threat called "Soviet Military Power."

Apple cloud future: Amazon, Google, Microsoft living on borrowed time?

ComputerWorld Consumerization IT

Apple boots out Amazon AWS -- it's migrating most of its S3 storage to Google's Cloud Platform. Should Jeff Bezos be worried? Apple's are more high-profile bytes moving away from Amazon Web Services, so soon after recent news of the Dropbox mostly-defection.

Apple 80

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Drones: Is the Airspace above Your Data Center Secure?

Data Center Knowledge

As use of drones explodes, data center operators should include airspace protection in their security programs Read More. Data Center World Security

7 VPN services for hotspot protection

Network World

VPNs Virtual private networks (VPNs) have many uses. When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located. This can help anonymize your Internet traffic so it’s much harder for websites to track your personal browsing history.

If You Drive A Car, Or Know Someone Who Does, You Must Read This…

CTOvision

Bob Gourley. Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine , we have long known that theoretical hacks against cars are no longer theoretical. They are real.

HR in the Cloud is Soaring

CIO Dashboard

Guest post by Dan Staley. The phonebook, so anxiously anticipated by Navin R. Johnson in the 1979 movie The Jerk, has gone the way of the poor VCR. Extinct. Obsolete. Kaput.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Merger of Two Healthcare Giants Makes IT Transformation Inevitable

Data Center Knowledge

Joseph Health undergoes complete infrastructure overhaul as it integrates with Providence Health Read More. Cloud Computing Data Center Strategies Data Center World Featured

Manufacturers’ resistance to the cloud is weakening

Computerworld Vertical IT

Manufacturers are slowly warming up to the idea of putting portions of their complex ERP systems in the cloud, according a report by Technology Evaluation Centers (TEC). To read this article in full or to leave a comment, please click here (Insider Story

Update On The Battle For Your Head: Videos capture nature of next gen consumer VR

CTOvision

Bob Gourley. This post is a follow on to our report " The Battle For Your Head Is Underway: VR from Oculus, Sony, HTC/Valve competing at GDC2016 ". So far we have seen nothing to change our overall conclusion.

Video 105

Review: Consider VPN services for hotspot protection

Network World

Virtual private networks have many uses. Typically, businesses deploy VPNs so employees can securely access the corporate network from outside the office. However, we’ve seen a rise in third-party VPN services that use the same underlying technology, the encrypted tunnel, to simply provide a secure Internet connection. Why would you ever need to do this? When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Emerging Trends Shaping the Data Center of the Future

Data Center Knowledge

Five billion people today don't have access to the internet, but they will, and that alone is a big reason the data center of today must change Read More. Data Center World

8 Compelling Reasons To Adopt E-Learning Tools And Technology

Kitaboo Blog

Here are 8 Compelling Reasons To Adopt E-Learning Tools And Technology. E-learning has redefined the knowledge and skill acquisition landscape. Studies reveal that over 41.7%

Tools 52

Hands-On with Eastwind Networks’ Active Breach Detection

CTOvision

Adam Gerhart. Recently, at Cognitio Labs , we had the opportunity to test out some new technology from an innovative cyber security solution provider, Eastwind Networks. Eastwind Networks is one of a handful of companies pioneering enterprise ready, active breach detection capabilities. The assumption behind active breach detection is that it is no longer possible to keep every threat out of your network.

The Internet of Speeding Parking Things

Chief Seattle Greek Blog

School Zone Speed Camera in West Seattle. My spouse recently got a speeding ticket. In the mail. From the Seattle Police Department. For 32 miles per hour in a 20 mile per hour zone. Not just any zone. A school zone. On her way to work. As a teacher. 234 bucks.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.