Sat.Jan 23, 2016 - Fri.Jan 29, 2016

article thumbnail

A Conversation With Marc Andreessen: AI, Robotics, Jobs and Accelerating The Future

CTOvision

Bob Gourley. If you are an enterprise technologist or if you love thinking about the incredible future we can build for ourselves you no doubt already track the very interesting Marc Andreessen. His open sharing of views and context via his blog , on YouTube and his Twitter Feed are a great source of information for those seeking insights into the emerging tech scene and we recommend following him there for continuous context.

Education 191
article thumbnail

5 Things CIO Should Do in First 100 Days of Leading Digital Transformation

Social, Agile and Transformation

I am now one year into my third CIO role where digital transformation was a top priority. It's hard enough to jump into an organization as a new CIO and make an impact in year one and much harder to either lead or be a team member in a transformation program. Bu that's exactly what I've been tasked to do, and my last several posts come from insights across all three organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

7 Biggest Data Center Migration Mistakes (and How to Avoid Them)

Data Center Knowledge

In the words of Yogi Berra, “If you don't know where you are going, you'll end up someplace else.” These are words to live by when planning beyond your migration. Read More.

article thumbnail

Stop Using Pre-Scripted Questions in an Interview

Eric D. Brown

Over my career, I’ve hired over 50 direct reports and been involved in the hiring process for over 150 other people. For the most part, all of these hires ended up being good people and great employees. Sure, there were a couple bad hires in there but I’d like to think my track record is pretty good mostly because I approached each interview as a conversation rather than a list of questions.

Examples 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Supercomputing Predictions for 2016

CTOvision

Katie Kennedy. Wondering where supercomputing is heading in 2016? Here are some well informed assessments brought to you by Cray. New Processor Technologies. The leader of this technology is currently Intel, with their next generation Xeon Phi coprocessor, which is a hybrid between an accelerator and general purpose processor. This innovative design combines many-core architect with general purpose productivity.

Big Data 169
article thumbnail

Does Your Company Need A Chief Safety Officer?

The Accidental Successful CIO

Twitter has a problem on their hands and they think that they need a Chief Safety Officer Image Credit: Twitter. As more and more companies create online communities for our customers to interact with us and each other in, CIOs are starting to see a need for a new type of employee. In any online community, there are a lot of things that can happen. I can’t quite explain why some people behave like they do, but the anonymity of being online and not having to confront people face-to-face see

Company 116

More Trending

article thumbnail

A Year in Review – A Look Back on our Portfolio Companies’ Successful 2015

The Investing Edge

We’d like to recognize the many successes and accomplishments our portfolio companies achieved in 2015. From impressive rounds of funding to key acquisitions, these companies continue to be leaders in their sectors. While we won’t attempt to capture them all, below are some representative highlights: CloudLock , a leading cloud cybersecurity and CASB provider, had a rewarding year filled with impressive rankings and revenue growth.

Company 104
article thumbnail

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

Bob Gourley. Bitcoin is hot right now. It is known as a crypto-currency, but has the potential to be applied to far more than exchanging value. Bitcoin is a protocol, one that many consider the next great protocol for the Internet and the emerging Internet of Things. As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality.

article thumbnail

Does anyone really want the government deciding encryption policy?

ComputerWorld Consumerization IT

Security and privacy debates are highly nuanced, allowing for much interpretation, balancing acts and differences of opinion. For that reason, I try and be tolerant of a wide range of views on the subject. Every so often, though, some executive says something so divorced from logic and reality that silence is not an option. Enter AT&T CEO Randall Stephenson and his attack on Apple's encryption efforts.

article thumbnail

Traditional Network or Virtual? Five Tips to Help You Decide

Data Center Knowledge

These tips, based on real-world examples, provide a starting point for understanding the pros and cons of five common traditional and virtual deployment models. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Validate TPM Settings at the Beginning of a Build of a Dell machine.

Mick's IT Blog

NOTE: I used Sapien's PowerStudio to write this script that significantly simplified the process! I have wrestled with the issue of encrypting a system using Bitlocker during a build. The issue I have had is that not all of the process can be automated. The steps of turning on the TPM, and activating it can be automated. The portion where the TPM is cleared is a forced, manual process.

Dell 94
article thumbnail

Ultimate Data Protection – Leveraging the Power of Quantum

CTOvision

Katie Kennedy. QuintessenceLabs , the Australian cybersecurity company whose products leverage quantum science as well as deep security expertise, has received global recognition for their game-changing cyber security systems. Their products include high speed random from a quantum source, powerful key and policy management with embedded secure key store, as well as flexible encryption modules for a range of applications.

Data 153
article thumbnail

Technology Short Take #60

Scott Lowe

Welcome to Technology Short Take #60. As usual, I’ve gathered what I hope to be a useful but varied collection of articles and links on key data center technologies. I hope something I’ve included here will be helpful—enjoy! Networking. The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers.

Vmware 60
article thumbnail

Qarnot’s Home Heating Servers Now Plugged into Data Centers

Data Center Knowledge

Data center provider DATA4 takes majority financial stake in French digital heater company Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Update Drivers and BIOS via PowerShell and Dell Command Update

Mick's IT Blog

NOTE: I used Sapien's PowerShell Studio to write this script that significantly simplified the process! During the build process, I execute the Dell Command Update to make sure the latest drivers and BIOS version are installed. I use the script below so that it can disable the BIOS password and execute the dcu-cli.exe in either a 32-bit or 64-bit system.

Dell 88
article thumbnail

Where Websites Live

CTOvision

Katie Kennedy. The article below was produced by Hosting Facts. The total number of websites is expected to exceed 1 billion in the coming year. At the time of this writing, the number was estimated at around 970,864,745, and increasing by about 2 websites per second (Source: [link] /). According to Internet research company Netcraft , as of this past spring there were around 177 million active websites among the hundreds of millions of existing hostnames.

article thumbnail

Technology Short Take #60

Scott Lowe

Welcome to Technology Short Take #60. As usual, I’ve gathered what I hope to be a useful but varied collection of articles and links on key data center technologies. I hope something I’ve included here will be helpful—enjoy! Networking. The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers.

Vmware 60
article thumbnail

Three Trends Driving the 100G Ethernet Market

Data Center Knowledge

As companies continue to grow in scale and their data needs become more complex, 100G will offer the bandwidth speeds and efficiency they desperately need. Read More.

Trends 123
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Fix for A connection to the deployment could not be made

Mick's IT Blog

This error is very annoying when running through a build. I Googled and found this fix to it by Kyle Beckman. The trick is delaying the LiteTouch.wsf from trying to execute the next task before network connectivity is available. Kyle's fix is putting a simple timed delay in the LiteTouch.wsf. I decided to enhance this fix by using PowerShell. Instead of having to guess at how long to wait, why not use the Test-Connection commandlet and delay the script until connectivity is available?

Network 87
article thumbnail

Using Defense Within the O-Line of Security

CTOvision

Barry Strauss. The NFL Conference championship games wrapped up this weekend to set the stage for Super Bowl 50, which will take center stage Feb. 7 at Levi’s Stadium in Santa Clara, CA. The game will be a battle of offensive and defensive forces – with the winning team ultimately lifting the Vince Lombardi Trophy. Throughout the Big Game, coaches will be breaking down and dissecting the playbooks and game plans as the action unfolds.

Security 151
article thumbnail

Five Focal Points in Running a Digital IT

Future of CIO

Digital IT keeps the digital flow from top-down to bottom-up; from branding on the surface to tuning the processes underneath. Many IT organizations are accelerating from the industrial speed to the digital speed, it also needs to sharpen its image from a back office support center to a front yard of digital innovation. IT-business alignment is also shifted to IT-business engagement.

Cloud 45
article thumbnail

Equinix, AT&T, Verizon Join Facebook’s Open Source Data Center Project

Data Center Knowledge

Open Compute Project launches telco project that will focus on telecommunications tech Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why your company needs to ask the right questions about big data

Tech Republic Big Data

The accuracy of your analytics may depend on how well you asked questions of your data.

article thumbnail

Fed Tech Roundup January 29

CTOvision

Katie Kennedy. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. These ideas need to be retired: Technology practices that are stifling public sector success - Brookings Institution (blog). Deadline approaches for recording qualified emails as federal records - The Hill (blog). iPhone Wireless Charging Technology Being Developed By Apple For 2017: Report - International Business Times.

article thumbnail

Five Aspects of Digital Strategy Management

Future of CIO

In practice, digital strategy is a living process with iterative steps and a dynamic continuum. The strategy is what you intend to do or accomplishes in terms of managing both resources and constraints to having the critical success factors in place and achieve the set of strategic priorities. In the strategy-making process, one must also assess the environment, competitions, and other threats and opportunities and devise contingencies accordingly.

article thumbnail

The Importance of Balancing Data Center Power Consumption

Data Center Knowledge

To help avoid future power balance issues, engineers need to understand the circuit capacities of their data centers and design rack power loads to fall within the de-rated power capacities. Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Using Docker with macvlan Interfaces

Scott Lowe

In this post, I’m going to show you how to use macvlan interfaces with Docker for networking. The use of macvlan interfaces presents an interesting networking configuration for Docker containers that may (depending on your use case) address issues with the standard Linux bridge configuration. Macvlan interfaces, if you’re unfamiliar with them, are a (somewhat) recent addition to the Linux kernel that enables users to add multiple MAC address-based logical interfaces to a single physical interfac

Linux 60
article thumbnail

ACC Foundation Releases Extensive State of Cybersecurity Report

CTOvision

Katie Kennedy. The Association of Corporate Counsel (ACC) Foundation has released the largest study of its kind on corporate cybersecurity, the result of the study is: The State of Cyber Security Report. The study was under written by Ballard Spahr. The report highlights cybersecurity issues for more than 1,000 corporate lawyers at 887 organizations worldwide.

Report 150
article thumbnail

CIOs as Chief Influence Officer: How does a CIO Make a Digital Influence

Future of CIO

There is now a greater need for a CIO to understand business drivers and equip with digital mindsets. Digital makes a significant impact on every aspect of the business from people, process to technology and capability. IT plays a pivotal role in digital transformation. Given the power of SMAC technologies and abundance of information to fuel business innovations, how does a CIO make the multitude of digital influence, like a Pro?

System 45
article thumbnail

Startup Envisions Data Centers for Cities of the Future

Data Center Knowledge

Project Rhizome brings architect sensibility to edge data center design Read More.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.