Sat.Jan 23, 2016 - Fri.Jan 29, 2016

Stop Using Pre-Scripted Questions in an Interview

Eric D. Brown

Over my career, I’ve hired over 50 direct reports and been involved in the hiring process for over 150 other people. For the most part, all of these hires ended up being good people and great employees.

No matter who wins in US vs. Microsoft, we all lose

David Linthicum

The battle of government reach into data stored in overseas data centers should be top of mind for IT organizations. It has significant implications for whether cloud-stored data can be protected, and the battle so far suggests if either side completely wins, the result would be unpleasant. The U.S. Justice Department and Microsoft are waging a war over whether federal prosecutors in the United States can access email stored on servers in Ireland.

A Year in Review – A Look Back on our Portfolio Companies’ Successful 2015

The Investing Edge

We’d like to recognize the many successes and accomplishments our portfolio companies achieved in 2015. From impressive rounds of funding to key acquisitions, these companies continue to be leaders in their sectors. While we won’t attempt to capture them all, below are some representative highlights: CloudLock , a leading cloud cybersecurity and CASB provider, had a rewarding year filled with impressive rankings and revenue growth.

Startup Envisions Data Centers for Cities of the Future

Data Center Knowledge

Project Rhizome brings architect sensibility to edge data center design Read More. Data Center Design Data Center Strategies Featured Internet of Things

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Foto Friday – McDonald Creek, Glacier National Park

Eric D. Brown

This is a capture of a some rapids / waterfalls on McDonald Creek in Glacier National Park. Captured with Canon 7D Mark II and Sigma 8-16mm at 13mm, f/8.0, ISO125 at 1/30 sec handheld. See more photos in my flickr photostream and/or my 500px portfolio.


More Trending

the future of content


Throughout human history the ability to share information ultimately ideas has propelled the human race. For millennia the ability to read and write was the distinguishing factor between the educated and the common. For the first 5000 years of recorded human history each individual copy was made painstakingly by hand which consequently made a copy rare and extremely valuable.

Ultimate Data Protection – Leveraging the Power of Quantum


Katie Kennedy. QuintessenceLabs , the Australian cybersecurity company whose products leverage quantum science as well as deep security expertise, has received global recognition for their game-changing cyber security systems.

Qarnot’s Home Heating Servers Now Plugged into Data Centers

Data Center Knowledge

Data center provider DATA4 takes majority financial stake in French digital heater company Read More. Blades Europe Green Data Centers Infrastructure

Does Your Company Need A Chief Safety Officer?

The Accidental Successful CIO

Twitter has a problem on their hands and they think that they need a Chief Safety Officer Image Credit: Twitter. As more and more companies create online communities for our customers to interact with us and each other in, CIOs are starting to see a need for a new type of employee.

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

5 Things CIO Should Do in First 100 Days of Leading Digital Transformation

Social, Agile and Transformation

I am now one year into my third CIO role where digital transformation was a top priority. It's hard enough to jump into an organization as a new CIO and make an impact in year one and much harder to either lead or be a team member in a transformation program. Bu that's exactly what I've been tasked to do, and my last several posts come from insights across all three organizations. My post. about me agile planning cio data scientist digital transformation leadership

A Conversation With Marc Andreessen: AI, Robotics, Jobs and Accelerating The Future


Bob Gourley. If you are an enterprise technologist or if you love thinking about the incredible future we can build for ourselves you no doubt already track the very interesting Marc Andreessen. His open sharing of views and context via his blog , on YouTube and his Twitter Feed are a great source of information for those seeking insights into the emerging tech scene and we recommend following him there for continuous context.

Equinix, AT&T, Verizon Join Facebook’s Open Source Data Center Project

Data Center Knowledge

Open Compute Project launches telco project that will focus on telecommunications tech Read More. Blades Networking Open Compute

Does anyone really want the government deciding encryption policy?

ComputerWorld Consumerization IT

Security and privacy debates are highly nuanced, allowing for much interpretation, balancing acts and differences of opinion. For that reason, I try and be tolerant of a wide range of views on the subject. Every so often, though, some executive says something so divorced from logic and reality that silence is not an option. Enter AT&T CEO Randall Stephenson and his attack on Apple's encryption efforts.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Why your company needs to ask the right questions about big data

Tech Republic Big Data

The accuracy of your analytics may depend on how well you asked questions of your data

Where Websites Live


Katie Kennedy. The article below was produced by Hosting Facts. The total number of websites is expected to exceed 1 billion in the coming year. At the time of this writing, the number was estimated at around 970,864,745, and increasing by about 2 websites per second (Source: [link] /).

7 Biggest Data Center Migration Mistakes (and How to Avoid Them)

Data Center Knowledge

In the words of Yogi Berra, “If you don't know where you are going, you'll end up someplace else.” These are words to live by when planning beyond your migration. Read More. Industry Perspectives

Validate TPM Settings at the Beginning of a Build of a Dell machine.

Mick's IT Blog

NOTE: I used Sapien's PowerStudio to write this script that significantly simplified the process! I have wrestled with the issue of encrypting a system using Bitlocker during a build. The issue I have had is that not all of the process can be automated. The steps of turning on the TPM, and activating it can be automated. The portion where the TPM is cleared is a forced, manual process.

Dell 70

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Five Focal Points in Running a Digital IT

Future of CIO

Digital IT keeps the digital flow from top-down to bottom-up; from branding on the surface to tuning the processes underneath.

Supercomputing Predictions for 2016


Katie Kennedy. Wondering where supercomputing is heading in 2016? Here are some well informed assessments brought to you by Cray. New Processor Technologies. The leader of this technology is currently Intel, with their next generation Xeon Phi coprocessor, which is a hybrid between an accelerator and general purpose processor. This innovative design combines many-core architect with general purpose productivity.

Intel 104

ICTroom Unchains Capacity from Size in Modular Data Centers

Data Center Knowledge

European firm’s new designs scale power and building size independently Read More. Data Center Design Europe Featured Infrastructure Modular Data Centers

Update Drivers and BIOS via PowerShell and Dell Command Update

Mick's IT Blog

NOTE: I used Sapien's PowerShell Studio to write this script that significantly simplified the process! During the build process, I execute the Dell Command Update to make sure the latest drivers and BIOS version are installed. I use the script below so that it can disable the BIOS password and execute the dcu-cli.exe in either a 32-bit or 64-bit system. The BIOS password must be disabled if you want the BIOS to be updated. Also, I execute the script in two different task sequences.

Dell 65

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Five Aspects of Digital Strategy Management

Future of CIO

In practice, digital strategy is a living process with iterative steps and a dynamic continuum. The strategy is what you intend to do or accomplishes in terms of managing both resources and constraints to having the critical success factors in place and achieve the set of strategic priorities.

Crypto-currencies and their promise for enterprise technology professionals


Bob Gourley. Bitcoin is hot right now. It is known as a crypto-currency, but has the potential to be applied to far more than exchanging value. Bitcoin is a protocol, one that many consider the next great protocol for the Internet and the emerging Internet of Things. As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality.

Data Center Colocation in 2016: What to Expect

Data Center Knowledge

Activity will pick up in tier-two regions, but top markets will continue seeing most demand Read More. Colocation Featured Supply and Demand

Fix for A connection to the deployment could not be made

Mick's IT Blog

This error is very annoying when running through a build. I Googled and found this fix to it by Kyle Beckman. The trick is delaying the LiteTouch.wsf from trying to execute the next task before network connectivity is available. Kyle's fix is putting a simple timed delay in the LiteTouch.wsf. I decided to enhance this fix by using PowerShell. Instead of having to guess at how long to wait, why not use the Test-Connection commandlet and delay the script until connectivity is available?

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.