Sat.Dec 16, 2017 - Fri.Dec 22, 2017

article thumbnail

We are Doing Agile, but are not Agile

Social, Agile and Transformation

Everyone, or at least almost everyone is doing some form of agile practices today. In fact, some leaders drive their digital transformation programs with leading agile to deliver customer facing applications. In a year of speaking at conferences, I did not meet anyone selling their waterfall, top-down project management practices as keys to their transformation programs.

Agile 183
article thumbnail

FedCloud Security Roadmap for 2018

CTOvision

As the Government continues to migrate to the cloud it becomes critical to integrate stronger security into its operations. Cloud and data security must go together. While cloud computing provides valuable IT architectures and solutions for government agencies, it also requires them to relinquish data security to public cloud service providers. Using the services of a […].

Security 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top 10 storage and backup stories of 2017

Computer Weekly

In Computer Weekly’s top 10 storage stories of 2017, we tracked key trends such as the continued rise of hyper-converged infrastructure, the emergence of NVMe flash and object storage

Storage 163
article thumbnail

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

Keeping the company safe is the job of the CIO Image Credit: Bill Smith. I think that we can all agree that we are living in an increasingly dangerous world. As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

Banking 140
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The time to deal with IoT security is now

Network World

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.” But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula , global product management leader and security expert at SenecaGlobal , what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected device

Security 151
article thumbnail

PKWARE Brings Persistent Encryption to Turnkey Key Management with Smartcrypt Appliances

CTOvision

PKWARE, a global leader in data security, recently announced the launch of four virtual and hardware key management appliances. The appliances will allow for simplified deployment and enhanced security features of Smartcrypt Enterprise Manager, the central component of PKWARE's Smartcrypt platform. Smartcrypt Appliances are the only key management appliances that have out-of-the-box support for persistent […].

Hardware 151

More Trending

article thumbnail

'Paris s'éveille'! Introducing the AWS EU (Paris) Region

All Things Distributed

Today, I'm happy to announce that the AWS EU (Paris) Region, our 18th technology infrastructure Region globally, is now generally available for use by customers worldwide. With this launch, AWS now provides 49 Availability Zones, with another 12 Availability Zones and four Regions in Bahrain, Hong Kong, Sweden, and a second AWS GovCloud (US) Region expected to come online by early 2019.

Training 115
article thumbnail

BITPro User Group Meeting Presentation Decks and Useful Links

Anoop

We had another successful Bangalore IT Pro user group meeting at Microsoft office Bangalore. We had more than 80 participants from different parts of the country. Thank you for all of the attendees, speakers, and sponsors (Microsoft and Adaptiva) to make this event successful. In this post, I will share BITPro User Group Meeting Presentation Decks […].

Meeting 103
article thumbnail

How Splash Made a Splash at Dreamforce (on a Budget)

The Investing Edge

For those of you still recovering from Dreamforce 2017 , I interviewed Amy Holtzman, VP of marketing at leading event marketing platform Splash , to get the inside scoop on how they planned and executed on their own Dreamforce presence. For startups who don’t have the budget to buy a booth, take over a coffee shop, host a concert, or send the whole company to San Francisco for a week, this is an especially helpful guide on how to get the best return on a conference like Dreamforce.

Budget 87
article thumbnail

Top 10 cyber crime stories of 2017

Computer Weekly

Here are Computer Weekly’s top 10 cyber crime stories of 2017

246
246
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Endpoint Imperative: A Form Factor Renaissance

Cloud Musings

Workplace expectations are changing, and along with them, the devices we use to do our jobs. In this episode of "The End Point Imperative", Intel’s Sarah Wieskus tells us about how Intel is driving better user interface and performance while continuing to driving enhanced security and manageability. Kevin L. Jackson: Hi everyone and welcome to this episode of The Endpoint Imperative, a podcast series from Intel.

Intel 79
article thumbnail

Video Guide Download Install and Configure MDT 8450

Anoop

I downloaded MicrosoftDeploymentToolkit_x64.MSI and installed it on SCCM CB 1711 preview lab environment. There are 32 and 64 bit versions of MDT 8450 available. This version (build 6.3.8450.1000) of the Microsoft Deployment Toolkit requires Windows 10 ADK build. In this post, we will see how to Download Install and Configure MDT 8450. More Videos – Subscribe the YouTube channel here […].

Video 84
article thumbnail

Rethinking the 'production' of data

All Things Distributed

This article titled " Daten müssen strategischer Teil des Geschäfts werden " appeared in German last week in the "IT und Datenproduktion" column of Wirtschaftwoche. How companies can use ideas from mass production to create business with data. Strategically, IT doesn't matter. That was the provocative thesis of a much-talked-about article from 2003 in the Harvard Business Review by the US publicist Nicolas Carr.

Data 79
article thumbnail

Kaspersky Labs appeals US ban

Computer Weekly

Russian security software giant appeals US government's decision to ban the use of its products in federal agencies

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cloud Storage 2.0 Set To Dominate Market

Cloud Musings

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important. Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage.

Storage 79
article thumbnail

Video Guide Windows Server 2016 Backup Solution from Veeam

Anoop

Veeam has a backup and restore solution for Microsoft Windows devices. Veeam agent for Microsoft Windows can be used to take backups of servers, desktops, and laptops. Previously, this solution was known as “Veeam Endpoint Backup” In this post, we will see Video Guide Windows Server 2016 Backup Solution from Veeam. Following are the 3 posts […].

Backup 84
article thumbnail

In 2018, Telecom and Networking are Vital (Again)

The Investing Edge

Our collective nostalgia for the 1990s is a thing that is either currently happening , or already passed , depending on your pop culture barometer. For most of us, that time represents Seinfeld and Pulp Fiction , and for others it marks the heyday of the telecom and networking markets as the internet drove explosive growth. Much like the resurgence of 90s pop-culture, we believe networking is again an exciting area of new technologies and services.

Network 70
article thumbnail

Nordic states innovate to attract global tech players

Computer Weekly

The Nordic region is already a hotbed for tech startups and has the ingredients to attract more investment from the established tech giants

151
151
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Top "Cloud Musings" Posts For 2017

Cloud Musings

( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.) ↑ Grab this Headline Animator ( Thank you. If you enjoyed this article , get free updates by email or RSS - © Copyright Kevin L.

Cloud 79
article thumbnail

5 Steps To Reduce Due Diligence Investment Failures

Future of CIO

In my activities as an angel investor, and my work with new ventures seeking investment, I find the “due diligence” stage to be fraught with the most risk. Usually this stage only really starts after an investor has expressed serious interest, or already informally agreed to invest. Most founders consider the story already told and the deal pending, so they aren’t sure what more then can do.

Meeting 76
article thumbnail

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Network World

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

article thumbnail

UK government blames North Korea for WannaCry cyber attack

Computer Weekly

The UK and US governments say a North Korean group was responsible for the ransomware attacks that hit the NHS and other organisations globally this year

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Book: The Daily Stoic: 366 Meditations on Wisdom, Perseverance, and the Art of Living

Storage IO Blog

This book was a delight. I started reading it earlier this year, caught up quickly (I started in July), and then mostly read a page each day when I was in the bathroom in the morning. I let it unfold slowly, reading the daily quote and Ryan Holiday’s (and Stephen Hanselman’s) thoughts on the quote, and then rereading the quote. I was near the end so I finished it off last night.

Study 68
article thumbnail

Ranking the World’s Top CEOs Using Social Media Sentiment Data

Dataconomy

CEOs of the world’s leading companies have a global influence that stretches beyond their own business and commercial interests. The general public is increasingly looking to the people steering some of the largest companies in the world for their views on political and social issues. In a Financial Times article. The post Ranking the World’s Top CEOs Using Social Media Sentiment Data appeared first on Dataconomy.

Social 72
article thumbnail

30% off APC 1500VA Compact UPS Battery Backup & Surge Protector

Network World

An APC UPS provides backup power power and surge protection to power and protect your PC or Mac, network router, gaming consoles like Xbox and PS4, AV and other business electronics from the dangers of power surges, spikes, lightning and power outages. By powering your critical electronics with a backup battery during blackouts, you ensure personal and professional connectivity when it matters most.

Backup 60
article thumbnail

Top 10 cloud stories of 2017

Computer Weekly

Here are Computer Weekly’s top 10 cloud stories of 2017

Cloud 215
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Secure Pico Channels with DIDs

Phil Windley

Summary: Decentralized identifiers are a perfect complement to the event channels in picos and provide the means of performing secure messaging between picos with little effort on the developer's part. Picos are Internet-first actors that are well suited for use in building decentralized soutions on the Internet of Things. See this description of picos for more details.

article thumbnail

How can CIOs Set up a prioritization process to survive and thrive from the whirlwind of daily busyness?

Future of CIO

IT-driven digital transformation is the journey of continuous delivery and improvement; it is crucial to set the right priority to survive and thrive. Business transformation or change initiatives today nearly always involve some form of information and technology. IT should be seen by any business as a digital transformer and focus on setting principles and developing the next practices for improving business effectiveness, efficiency, and performance.

article thumbnail

Hiring or Managing a Team? Here Are 3 Tools You Should Be Using

Dataconomy

One of the perennial challenges that enterprises face is hiring high-quality employees that will stick around for the long haul. Technology is evolving to enable new ways of solving hiring problems that have long plagued companies across all industries. Take collaboration collaboration software and services, for example, which have allowed. The post Hiring or Managing a Team?

Tools 50
article thumbnail

Top 10 datacentre stories of 2017

Computer Weekly

Over the course of 2017, we saw hyperscale cloud giants continuing to invest in their UK presence, as well as Apple’s ongoing planning permission delays in Ireland and the disruption caused by the datacentre downtime from British Airways

Course 121
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.