Sat.Apr 23, 2016 - Fri.Apr 29, 2016

article thumbnail

10 Practices of Strong Agile Product Owners

Social, Agile and Transformation

I've worked with some excellent agile product owners that have developed new products, delighted customers, grown revenue, and collaborated well with their agile teams. I've also worked with other product owners that have some very bad behaviors reflecting in poor under performing products and angry team members. So I thought to share some of the behaviors and practices that make product owners.

Agile 155
article thumbnail

RBAC’s Not Against the Wall: Role-based access control creates automation opportunities

CTOvision

Dean Wiech. Identity and access management is taking over the world. Legislative and regulatory norms dictate this. An ever-increasing number of organizations must manage and assign access privileges across their populations in a structured manner. “Role-based access control” or “RBAC” has gradually become a frequently used term. RBAC solutions address these challenges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Guide to Facebook’s Open Source Data Center Hardware

Data Center Knowledge

Mark Zuckerberg’s social networking giant is the world’s biggest open source hardware design factory Read More.

article thumbnail

Can you really win if you aren’t the best?

Eric D. Brown

People often say that if you work hard and apply yourself, you’ll succeed. But lets be realistic… that isn’t always true, especially because everybody has a different definition of ‘succeed.’ Sure, you can work hard and apply yourself and become better than you were, but it doesn’t mean you’ll become the ‘best’ at something.

Analysis 136
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What A CIO Needs To Know About Encryption

The Accidental Successful CIO

CIOs need to know when to make use of encryption Image Credit: Yuri Samoilov. Due to the importance of information technology, the person with the CIO job has been handed the responsibility of keeping the company’s information assets safe. This involves a number of different things including preventing the wrong people from gaining access to the company’s networks, etc.

Company 122
article thumbnail

Big Data is Here and Getting Bigger

CTOvision

Katie Kennedy. As a supercomputer maker, Cray has been delivering the massive analytic processing power required by scientists and engineers for the last 40 years. Today, they've harnessed those decades of know-how in their data analytics and data discovery solutions. Urika ® -GD Graph Discovery Appliance. Addresses the most complex problems in advanced analytics — interactive data discovery with graphs.

Big Data 151

More Trending

article thumbnail

Workshare Professional Relicensing Script

Mick's IT Blog

Our license keys were expiring for the 2015 year and needed to be updated for 2016. To achieve this, we needed to delete the HKLM features registry key, import the new HKLM features registry key, and then parse through all HKU profiles to delete the subscription key from there. We have both 32-bit and 64-bit machines, so I also had to make the script be able to differentiate between them.

article thumbnail

The Future of Storage

Cloud Musings

A few weeks ago I had the pleasure of doing a Blab on advanced storage with Daniel Newman and Eric Vanderburg. We covered some pretty interesting points on enterprise storage challenges, advanced storage trends and flash. If you didn't catch it, a replay is now available. ( This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech.

Storage 81
article thumbnail

Arizona State University Adopts Hortonworks Data Platform to Shed Light on the Genetic Links to Cancer

CTOvision

Katie Kennedy. Recently announced, Arizona State University (ASU) is using Hortonworks Data Platform (HDP™) to further cancer research. With HDP, ASU researchers have the tools they need to store, process, and query more data at a faster pace, allowing researchers to ask better questions and uncover new links between genetics and cancer. ASU has put an emphasis on innovative approaches to research such as with its Complex Adaptive Systems Initiative (CASI).

article thumbnail

IoT Past and Present: The History of IoT, and Where It’s Headed Today

Data Center Knowledge

The history of the modern Internet of Things (IoT) dates back to the 1990s, yet IoT has evolved hugely since then, thanks especially to the cloud Read More.

Internet 141
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Analyzing real WordPress hacking attempts

Network World

In my last few posts I’ve pondered the issue of how insecure WordPress installations have become. Here’s an interesting thing to try if you run a Wordpress site; install the 404 to 301 plugin and in its settings check the “Email notifications” option and enter an email address in the “Email address” field. Now, whenever a nonexistent URL is requested, you’ll get notified and, at least for me, it’s been pretty interesting to see how hackers attempt to enter my WordPress installations.

89
article thumbnail

How to add more VPN setup options on your Ubuntu Touch device

Tech Republic Security

If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.

How To 98
article thumbnail

Tech News Roundup April 27

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Apple's results hit tech shares, dollar dips before Fed - Reuters. Theranos' Lab Problems Go Way Deeper Than Its Secret Tech - WIRED. Whitepages spins out caller ID and spam-blocking app into startup Hiya. Sour Apple results hit tech shares, dollar dips before Fed - Reuters.

Apple 151
article thumbnail

Data Tower: a Data Center for Saruman

Data Center Knowledge

Italian architects' idea looks like a data center skyscraper from the future Tolkien would have come up with had he been asked to design a server farm Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

With some advanced preparation, you can survive a ransomware attack  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins.

Malware 81
article thumbnail

Survey: Are mobile devices a security risk at your company?

Tech Republic Security

Mobile devices offer powerful productivity, but there is also the risk of security breaches. Tech Pro Research's survey looks at the best practices for securing these devices.

Survey 80
article thumbnail

The Need for a Framework for Resilient Cybersecurity

CTOvision

Dan Cybulski. There is little doubt that today our society and enterprises are more connected than ever before. The reality of internet accessible critical infrastructure, Cloud Computing, Bring Your Own Device (BYOD), mobile and Internet of Things (IoT) has stretched the capabilities of todays cyber defenses. Moreover, the expansion of enterprise architectures to include these enabling technologies has added a new level of complexity for organizations to grapple with while also drastically incr

article thumbnail

Build or Lease? Creating the Best Data Center Strategy

Data Center Knowledge

Here’s what infrastructure pros need to know when making the most important decisions of their career Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to keep your small business safe from data breaches and hacks

Network World

Cybersecurity – and security breaches – continues to be a hot topic. And small ecommerce businesses, especially ones using an open source platform, are particularly susceptible to hacks and breaches. So what can small ecommerce shops do to protect their sites as well as any sensitive (customer) data? Following are 10 suggestions from ecommerce security experts.

article thumbnail

Installing Ansible 2.x in a Python Virtualenv on OS X

Scott Lowe

In this post, I’m going to walk you through the steps to install Ansible 2.x into a Python virtual environment (virtualenv) on OS X. There’s nothing terribly hard or unusual about this process, but I wanted to document it here for folks who might be new to the process (or who might be interested in why using this approach could be beneficial). I’m stumbled into this process because I had been using Ansible 1.9.x and wanted to upgrade to Ansible 2.x so that I could use some of the new OpenStack -

System 60
article thumbnail

Tech News Roundup April 29

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Startup Spotlight: Fig Loans offers alternative to payday loans with more long-term benefits. Windows users get Facebook, Instagram, Messenger updates for latest Microsoft OS. Amazon’s cloud computing cash cow: AWS, now a $10B business, fuels record quarter for company.

Intel 150
article thumbnail

CoreSite Shares Spike as Cloud Data Center Leasing Accelerates

Data Center Knowledge

REITs under pressure to deliver lots of capacity in top markets for hyperscale cloud giants Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What users love (and hate) about 4 leading firewall solutions

Network World

While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters. Firewalls create a barrier between a secure internal network and a potentially less-secure outside network.

article thumbnail

Prayer Time at the Austin Summit

Scott Lowe

A large portion of the OpenStack community is gathered in Austin this week for the Spring 2016 OpenStack Summit. As I’ve done at previous Summits (and other events), I’m offering to gather with other Christian believers for a brief time of prayer in the mornings before the sessions kick off each day. Normally I get these arranged much earlier, so I apologize for not getting this out there sooner.

Meeting 60
article thumbnail

The Best Practices are No Longer the “Best” Practices

CTOvision

Katie Kennedy. Editors note: This is a sponsored post provided by Cray. There was a time when information systems security was much simpler. It focused on the appropriate time frame to take a sample of a one-dimensional system log that tracked events like blocked traffic, virus detection, and machines taken off-line. In this day and age, breaches, data theft, and cybercrime are rampant and not abating.

Firewall 150
article thumbnail

How Channel Partners Can Provide Strategic Value with the Cloud

Data Center Knowledge

Cloud is not a destination or singular path, but a transformation that places IT and its partners squarely at the center of the enterprise as both a leader and enabler of value creation. Read More.

Cloud 120
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Which Enterprise HDDs to use for a Content Server Platform

Storage IO Blog

This posts looks at the Servers Direct (www.serversdirect.com) converged Content Solution platforms with Seagate Enterprise Hard Disk Drive (HDD’s). I was given the opportunity to do some hands-on testing running different application workloads with a 2U content solution platform along with various Seagate Enterprise 2.5” HDD’s handle different application workloads.

article thumbnail

How to sync your Google Calendar with Ubuntu Touch

Tech Republic Cloud

Ubuntu Touch users, you'll notice the platform is not syncing your Google Calendar. Jack Wallen shows how to resolve this issue.

Google 62
article thumbnail

Women in Cybersecurity: Reducing the Gender Gap Part II

CTOvision

Katie Kennedy. This is the second post in a three part blog post on the Women in Cybersecurity Conference that took place March 31st through April 2nd in Dallas, Texas. “With 1.5M job openings in cybersecurity, we need security professionals with diverse skill sets” – Jillian Munro. Jillian Munro was the first keynote at the WiCyS conference. Following Munro, were five-minute lightening talks.

IBM 150
article thumbnail

IT Innovators: Keeping Medical Data Secure and Business Moving Forward by Increasing Efficiencies

Data Center Knowledge

Find out the techniques and philosophy one company is employing to maximize its productivity and save money, without compromising its risk posture Read More.

Security 120
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.