Sat.Apr 09, 2016 - Fri.Apr 15, 2016

Government IT: Making the Most of Cybersecurity Investments

CEB IT

President Barack Obama released his final budget proposal to the US Congress in early February. Among the myriad priorities highlighted in the $4.2 trillion proposal (pdf), the president hopes to allocate $19 billion to cybersecurity, which is a 35% increase in cybersecurity spending over FY2016.

Who wins and who loses as the cloud moves out of IT

David Linthicum

Gartner says worldwide IT spending will total $3.5 trillion this year, a 0.5 percent decline from 2015. It won't get better over the next few years, with Gartner predicting that global IT spending will rise only 2 to 3 percent from 2017 to 2020. How can that be possible given the ever expanding importance of technology to modern business? Review: Office 365 fails at collaboration. | If you're editing in the cloud, check out our comparison of cloud office suites. ].

Building Your Hybrid Cloud – Getting Started with Azure Stack TP1

IT Pros Rock!

Microsoft Azure Stack enables your organization to deliver Azure-consistent services from your own datacenter to help you realize the full value of a hybrid cloud strategy.

Report Confirms Large Cloud Providers Drive Q1 Leasing

Data Center Knowledge

The NADC report confirmed that it was Microsoft that leased 22 MW in Ashburn, VA, plus another 9 MW in San Antonio from data center REIT CyrusOne. Read More. Cloud Computing Featured

Report 173

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Corporate IT: 3 Steps to Improve Your Service Metrics

CEB IT

The services that IT teams provide to their colleagues can be measured in incredibly precise ways, which can be both a blessing and a curse.

Budget 130

More Trending

Airline CIOs Show How To Move From The Old To The New

The Accidental Successful CIO

Combining airlines can teach CIO some lessons Image Credit: Luke Ma. The day-to-day challenges of being a CIO and teaching the rest of the company about the importance of information technology are enough to keep most of us fully busy.

Vapor IO’s Re-envisioned Data Centers One Step Closer to Reality

Data Center Knowledge

Imagine designing self-healing physical environments that work in concert with self-healing IT environments. This is the power of OpenDCRE. Read More. Cooling Featured

On Being Happy

Chuck's Blog - EMC

From time to time, I am preoccupied with a simple question: why are we all here? Perhaps the same thought nags at you as well. I prefer answers that are simple and direct, and don't require invoking a cosmological constant.

Oracle 151

Hortonworks DataFlow 1.2 Released

CTOvision

Katie Kennedy. Last month, Hortonworks announced their release of their Hortonworks DataFlow 1.2 , a data-source agnostic, real time data collection and dataflow management platform that makes data movement fast, easy and secure. HDF 1.2

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Ten Hidden Risks That Threaten Your Healthcare Practice

Doctor Chaos

Technology has made running a business and a healthcare practice much easier and more efficient. With several IT advantages, that are always great risks when networks and systems fail. Here are 10 threats to your current operations and how you can easily fix them for free: Ten Hidden Risks That Threaten Your Healthcare Practice from […]. Cyber compliance healthcare infosec

Datera, Fresh from Stealth, Moves Intent-Based Config to Data Storage

Data Center Knowledge

Data center architects familiar with software-defined infrastructure will recognize decoupling as referring to separating the resource requirements of software from the hardware that hosts it. Read More. Storage

Where are you Implementing your Big Data Algorithms?

Social, Agile and Transformation

It sounds like a simple question. You have to load several data sets, implement some data cleansing, perform some matching to third party data, compute several aggregates, develop some rankings, group several dimensions, benchmark against another data set, analyze for trends and then normalize the data for multiple data visualizations. In all likelihood, the algorithms that perform these. agile data big data data management data scientist digital transformation

Women in Cybersecurity: Reducing the Gender Gap Part I

CTOvision

Katie Kennedy. This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31 st through April 2 nd , women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference. This three-day long event was designed to both enhance the state of cyber security and to raise awareness about the importance and nature of a cybersecurity career.

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

A Secure Foundation: Keep Your Enemies Close and Your Internal Network Closer

Doctor Chaos

I don’t think a day goes by without hearing about another company that was a victim of a data breach. These companies are not small either. Organizations like the Office of Personnel Management (OPM), The Internal Revenue Service (IRS), United Airlines and many others have all lost very sensitive data. Despite significant investments in the […]. Cyber

DataStax Brings Graph Databases to Enterprise Cassandra

Data Center Knowledge

TitanDB is not a database itself, but moreover a system for interpreting elements of data in terms of their type of relationship to one another. Read More. Big Data Featured

An untapped market for inventing the future?

CIO Dashboard

Guest post by Mitra Best , US Innovation Leader, PwC. As the proliferation of digital technologies disrupts the business landscape, technology executives are scrambling to find the right skills to keep pace.

Film 79

Warning Meat Puppets: Robotic Trucks Drive Across Europe In Demonstration Of What Is Possible Today

CTOvision

Bob Gourley. An operational fleet of robotic trucks just demonstrated their safety and efficiency by autonomously moving across Europe. In an article titled " A fleet of trucks just drove themselves across Europe ," Joon Ian Wong writes that: About a dozen trucks from major manufacturers like Volvo and Daimler just completed a week of largely autonomous driving across Europe, the first such major exercise on the continent.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

The Armada Collective Strikes Again

Doctor Chaos

Several rumblings on Internet Relay Chat channels and underground forums have started mentioning targeted attacks from an organization known as the Armada Collective. This is a group that has been using email to threaten companies and other organizations by demanding Bitcoins. Failure to pay results in massive Distributed Denial of Service (DDoS) attacks against the […]. Cyber data breach DDoS infosec

Rackspace Calls on Software Devs to Break CPU Performance Barriers

Data Center Knowledge

The days of getting software improvements by the brute force performance improvement of a generic CPU are slowing down drastically. Read More. Power

Apple's healthy CareKit revolution

Computerworld Vertical IT

Around three years ago, I was talking with the CIO of a regional hospital about how mobile apps could improve hospital and post-discharge experiences for patients. The conversation came up largely because of the Affordable Care Act, which included new rules to lower Medicare reimbursements to hospitals with high rates of readmissions for people with specific conditions. The goal: Encourage better discharge and follow-up care that would mean healthier patients and lower medical costs.

Apple 63

How to Achieve Elastic High Performance Computing in the Cloud: A Case Study with Bright Computing

CTOvision

Katie Kennedy. Fabio Trojani, a Professor of Finance at the Geneva Finance Research Institute (GFRI) of the University of Geneva and a Senior Chair of the Swiss Finance Institute, oversees a quantitative research team that carries out research in various areas of Financial Economics, Financial Econometrics and Statistics. The projects Professor Trojani works on, need to be powered by a significant HPC infrastructure.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Import Active Directory Module into Windows PE

Mick's IT Blog

One thing I have been wanting to have is access to active directory in a WinPE environment. The main reason I want it is to be able to delete systems from active directory during a build. When I first started researching, I found this blog that guided me on writing this script.

HPE Debuts ProLiant Easy Connect Platform for SMBs

Data Center Knowledge

HPE is looking to capture a larger share of the SMB market with the launch of the ProLiant Easy Connect Managed Hybrid solution, the first in a new series of plug and play devices for small and mid-sized businesses sold exclusively through the channel. The Hewlett-Packard Enterprise (HPE) ProLiant. Hewlett-Packard HPE

SMB 140

Step-By-Step: Enabling Multi-Factor Authentication for Azure Active Directory Users

CanITPro

Multi-factor authentication (MFA) provides an additional layer of security to confirm the identity of a user.

The Air Traffic Control System: We all assumed it was vulnerable, but now we know

CTOvision

Bob Gourley. There have been rumors in the security community for several weeks now about outages in the Swedish Air Traffic Control System that may have been caused by malicious activity. Now reporting indicates these rumors may in fact be true.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.