Sat.Mar 28, 2015 - Fri.Apr 03, 2015

article thumbnail

The Solution for ITS and Legacy Messaging: Syndeo

CTOvision

'By Katie Kennedy. Messaging is a critical function for any organization. This is especially true for the Military and Intelligence communities, where it is imperative that vital messages reach intended recipients as quickly as possible. The first messaging system was hand-written notes. While functional, these did not provide a timely way to get a message to a recipient quickly over a long distance, and could be intercepted.

CTO Hire 262
article thumbnail

Is Big Data a Bubble Set to Burst?

Data Center Knowledge

'Sentiment about Big Data appears to be shifting from enthusiasm to skepticism, as the business world questions how much value it can actually provide Read More.

Big Data 216
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Agile Teams - Common Questions, Simple Answers

Social, Agile and Transformation

'Many readers of Social, Agile, and Transformation know that I''ve recently started a new position as Global CIO of Greenwich Associates. When I came in, I committed to the team that we would rapidly adopt Agile Development and Agile Planning practices in order for us to fulfill our goals. Today, less than one hundred days into this position, we have Scrum running in three programs and Kanban.

Agile 155
article thumbnail

Setting standards for IoT can capitalize on future growth

Cloud Musings

'by Melvin Greer Managing Director Greer Institute for Leadership and Innovation The adoption of Internet of Things (IoT) appears to be unquestioned. Advances in wearables and sensors are strategic to tech companies, telecoms and manufacturers across multiple domains. Everyone from millennials to boomers is incorporating IoT technologies into the daily flow of life.

Dell 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What does the future hold for SharePoint?

CTOvision

'By John Mancini. Editor''s note: t’s been 14 years since SharePoint was first launched, so AIIM ’s John Mancini takes the opportunity to look at where it sits in enterprises today and how it will be used in the future.-bg. SharePoint, Microsoft’s web application framework and platform, was unveiled back in 2001 and now numbers 125 million global users, utilizing the tool to integrate intranet, content and document management.

article thumbnail

Hybrid Data Centers Key Part of Cloud Evolution

Data Center Knowledge

'A recent survey suggests that a form of hybrid IT data center is developing and becoming the connection point between traditional IT and various cloud platform as more and more enterprises turn to the cloud for solutions Read More.

More Trending

article thumbnail

Call to Action: Pounding the Table for Security Budgets

The Investing Edge

'The vicious cyberattacks on major organizations like Target, Home Depot, eBay, JP Morgan Chase and recently, Anthem , makes one thing clear: the severity and sophistication of cyberattacks has taken a major leap forward. Having thieves steal sensitive data such as credit card information or personal identities is extremely costly, both financially and to the brands’ reputation.

Budget 108
article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

'By Charles Hall. We noticed an event readers in the great state of Tennessee may take an interest in. The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertainin

article thumbnail

Hybrid Cloud’s Need for Speed

Data Center Knowledge

'A hybrid cloud world means increasingly hyper-connected data clouds. Like in bull-riding, the magic needs to happen in 3-7 seconds or else you’re bucked. Read More.

IBM 193
article thumbnail

European Union Data Protection Authorities Approve Amazon Web Services’ Data Processing Agreement

All Things Distributed

'As you all know security, privacy, and protection of our customer’s data is our number one priority and as such we work very closely with regulators to ensure that customers can be assured that they are getting the right protections when processing and storing data in the AWS. I am especially pleased that the group of European Union (EU) data protection authorities known as the Article 29 Working Party has approved the AWS Data Processing Agreement (DPA), assuring customers that it meets the hi

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Is Data Virtualization the Future of Enterprise Storage?

Virtualized Greek

'I recently attended Storage Field Day 7 (See disclosure) and was introduced to the concept of data virtualization. From a high-level data virtualization is the abstraction of data services from the physical data. Initially, the concept of data virtualization didn’t.

article thumbnail

Thorn: Digital Defenders of Children

CTOvision

'By Bob Gourley. Everyone I have ever spoken to about Thorn is a huge supporter of this group. We are so proud to have them involved with Cognitio''s 30 April 2015 Synergy Forum. Thorn leveraged technology to combat the sexual exploitation of children. They partner with tech companies, governments and other non-governmental organizations to execute on their mission.

CTO 234
article thumbnail

Does Backing Up Data to Cloud Make Financial Sense?

Data Center Knowledge

'Knowing whether it makes more financial sense to to backup data onsite or offsite in a cloud depends on the required amount of data needing to be stored and how much bandwidth it might take to move across the internet. Either way, it''s complicated. Read More.

Financial 185
article thumbnail

March 2015 Server StorageIO Update Newsletter

Storage IO Blog

'Besides various college championships, March also has a connection to back up and data protection. Thus this months newsletter has a focus on data protection, after all March 31 is World Backup Day which means it should also be World Restore test day! A reminder on the importance of data protection including backup, BC, DR and related technologies is to make sure they are occuring as planned.

Backup 65
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

European Union Data Protection Authorities Approve Amazon Web Services’ Data Processing Agreement

All Things Distributed

As you all know security, privacy, and protection of our customer’s data is our number one priority and as such we work very closely with regulators to ensure that customers can be assured that they are getting the right protections when processing and storing data in the AWS. I am especially pleased that the group of European Union (EU) data protection authorities known as the Article 29 Working Party has approved the AWS Data Processing Agreement (DPA), assuring customers that it meets the hig

article thumbnail

Your House Now Buys Itself What It Needs

CTOvision

'By Katie Kennedy. Imagine you are getting ready to fill your washing machine with all your of dirty clothes and when you are ready to close the door and fill up the detergent, you suddenly realize your detergent bottle is completely empty. A sense of panic washes over you and then the doorbell rings. You race to the door and the FedEx deliverer is standing there with a package.

Barcode 232
article thumbnail

RF Code’s Evolution to Internet of Things in the Data Center

Data Center Knowledge

'Market forces like DCIM, Internet of Things, and cloud have deeply influenced the company primarily known for RFID asset tags. It''s been a year of change for product, people, and now pricing. Read More.

Internet 184
article thumbnail

Understanding mobile needs (How I bought my daughter a prom dress)

A Screw's Loose

'I took my daughter prom dress shopping last weekend. I know, most of you think I must be nuts (hence my blog name) but it was actually a lot of fun. That’s not saying I like shopping; I like clothes shopping even less. My daughter is a senior in High school and heads off to [.].

Mobile 55
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Key Factors in Organizational Change Management

Future of CIO

Organizational change management has a strong role in business transformation, benefits realization, and strategy execution. With change becomes the new normal, and the speed of change is accelerating at digital age, Change Management also turns to be strategically important in today’s organization, it is no longer just a one-time project, but an ongoing business capability.

article thumbnail

The CTOvision Mobile App: Updated to include events plus tech news and videos

CTOvision

'By Bob Gourley. An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. The app began as a way to serve our readers with content from CTOvision and that remains a key capability. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 231
article thumbnail

CyrusOne Buys its Third and Biggest Austin Data Center

Data Center Knowledge

'Large powered shell will provide 120,000 square feet of data center space with 12 megawatts of critical power at full build-out Read More.

article thumbnail

15 April Webinar on The Cyber Threat: Insights from History and Current Ops

CTOvision

'By Bob Gourley. Learn about the cyber threat from seasoned professionals who have spent years in direct contact with adversaries defending government and corporate systems. This presentation provides facts and observations on the cyber threat in ways that can inform you decision-making and improve your ability to defend. Best practices in the domain of cyber intelligence will be discussed, and recommendations will be made on ways to directly enhance our collective defense.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Navy’s New Innovation Cell: Designed to enhance the speed to mission

CTOvision

'By Chris Ward. The Navy knows it is falling behind in innovation. Constrained by a mountain of acquisition regulations, it has a hard time reaching across the Industry/Government divide to learn the “art of the possible”. CTOvision Pro readers can review our update on how the Navy intends on enhancing innovation at this link: The Navy’s New Innovation Cell.

CTO 227
article thumbnail

Pew Reports on American Digital Habits Post-Snowden

CTOvision

'By Shannon Perry. A recent report from the Pew Research Center provides an interesting look into Americans’ online habits following Edward Snowden’s revelations about surveillance practices in the United States. The survey questioned adults about the extent to which their attitudes and online behaviors had changed following the revelations. Of the population of U.S. adults who are aware of the surveillance programs, 25% has changed the way it uses email accounts, search engines, and other infor

Report 225
article thumbnail

2015 Brocade Federal Forum: Help break the network status quo

CTOvision

'By Bob Gourley. Our friends at FedScoop and Brocade are combining efforts to produce an informative event that can help ensure your networks and data centers are optimized. And by optimized I mean are significantly reducing your IT spend, which should get your attention. Here is more from the event invite: Federal networks need to modernize. Federal Forum 2015 brings government and industry together to understand why and what steps to take to begin this journey.

Network 225
article thumbnail

Reducing the Number of Speeders is Ford’s Latest Technology

CTOvision

'By Katie Kennedy. Ford''s newest technology plans to turn drivers into slower, safer drivers. Ford''s "Intelligent Speed Limiter" tech will be able to read speed limit signs and keep your car at that speed, or alter your speed to the new limit. A camera mounted on the windshield scans the road signs on the sides of the highway and, when the vehicle enters a 20mph zone, the system reduces the top speed to match.

Video 224
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Revising Data Backup and Business Continuity Handbook

Data Center Knowledge

'Channel partners can help data centers move past traditional, non-reliable backup methods to modern solutions that ensure business continuity in the face of disaster Read More.

article thumbnail

How to Approach a Move to Modular or Pre-Fab Data Centers

Data Center Knowledge

'What do you do when a data center is reaching the limits of its capacity? Often, modular or pre-fabricated data center tactics are considered in this scenario. Read More.

article thumbnail

Ushering in the Era of Commodity Storage in the Data Center

Data Center Knowledge

'Here''s a look at three technologies making storage on commodity x86 boxes in the data center a reality Read More.

article thumbnail

Symantec Signs Multi-Megawatt Lease at Santa Clara Data Center

Data Center Knowledge

'In Vantage''s first mixed-use deal, the customer will take lab space and redundant data center space Read More.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.