Sat.Sep 05, 2015 - Fri.Sep 11, 2015

article thumbnail

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. The FBI led Internet Crime Complaint Center (IC3) is playing an increasingly important role in helping consumers and victims of fraud know the reality of the threats facing them from cyberspace.

Internet 288
article thumbnail

Optimizing Cloud Resources: the Requirements and the User

Data Center Knowledge

Your applications, your users, and your business all rely on your data center and your cloud architecture. Here are a few good ways to optimize these critical resources. Read More.

Resources 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are You A Wolf CIO?

Social, Agile and Transformation

About four months ago, I attended a Gartner dinner and received a copy of The Wolf in CIO's Clothing from author Tina Nunno. I took the quiz right away (won't tell you my scoring, but let's just say I am not a lamb) but it's taken me awhile to finally read the book. If you're a CIO or aspire to be one, I suggest you download a copy. It's a quick read packed with key insights on managing.

148
148
article thumbnail

IEEE Cloud Computing: Legal Clouds

Cloud Musings

The new issue of IEEE Cloud Computing is now available! This special issue looks at how to balance privacy with legitimate surveillance and lawful data access. Some of the specific areas covered are: Balancing Privacy and Surveillance in the Cloud; Data Flow Management and Compliance in Cloud Computing; Anonymous Credential-Based Access Control Scheme for Clouds; and End-to-End Privacy for Open Big Data Markets.

Cloud 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New DoD Rules For Contractors Focus On Enhancing Security and Incident Response

CTOvision

On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: Download “DoD Rules On Protecting Data In Contractor Systems” 26-Aug-Federal-Registrar-New-DoD-Rules-For-Cyber.pdf – Downloaded 8 times – 290 kB.

Security 277
article thumbnail

Native Cloud and Data Center Tools: Advantages and Challenges

Data Center Knowledge

Before looking at other tool sets, IT managers and their staff should get closely acquainted with the features that came natively with their software. Read More.

More Trending

article thumbnail

What are Effective Vehicles for Retaining your Top Talent

Future of CIO

The effective vehicles for retaining the top talent are effective leadership, agile mindset, the culture of learning, robust (not rigid) processes, and cool technology tools, etc. People spend significant time in the workplace. However, statistically more than two-thirds of employees don’t feel engaged; and people also have a different expectation for their work.

Agile 66
article thumbnail

Registration for 10 Nov 2015 FedCyber Summit Now Open

CTOvision

FedCyber Conference co-chairs Matt Devost and Bob Gourley are pleased to announce that registration for the 10 Nov 2015 FedCyber Summit and Threat Expo is now open. Please reserve your seat today by registering here (as always, the FedCyber Summit is free for federal government employees). Every year this summit brings together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges

article thumbnail

How Data Center Providers Have Become Cloud Leaders

Data Center Knowledge

In creating a data center platform ready for the cloud, administrators must take a few important details into consideration Read More.

article thumbnail

How Tech Could Improve Wildland Firefighting

Chief Seattle Greek Blog

The deaths of three wildland firefighters Aug. 19 in Okanogan County, Wash., is both painful and tragic. Unfortunately the deaths of these firefighters is only the latest in a series of firefighter deaths from wildfires. On June 28, 2013, nineteen Arizona firefighters lost their lives when winds suddenly shifted in the Yarnell Hill fire. An airtanker carrying flame retardant was directly overhead at the time of the tragedy, but radio communications were both spotty and overloaded.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Are you an Analog or a Digital Thinker?

Future of CIO

From a management psychology perspective: the analogy to digital thinking shift is about transforming thinking from linear to nonlinear, from binary to Systems Thinking. The analogy to digital conversion is an industrial evolution to change our daily life significantly. Analog-to-digital conversion is an electronic process in which a continuously variable ( analog ) signal is changed, without altering its essential content, into a multi-level ( digital ) signal.

Agile 53
article thumbnail

The Hacker Playbook: updated for 2015

CTOvision

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Energy 236
article thumbnail

IIX Brings Simplicity of SaaS and Social Networks to Global Data Center Connectivity

Data Center Knowledge

Launches automated interconnection platform Console to make manual interconnect configuration a thing of the past Read More.

article thumbnail

Empowering Analytics: Detecting Fraud In Hybrid Datasets (Webinar 24 Sep 2pm EST)

CTOvision

Fraud is pervasive and is seen in the form of social engineering, phishing attacks, insider threat attacks, and in attempts to extract money using false claims. Fraud especially presents major challenges in fields that include healthcare, visa applications, job applications, travel claims and even clearances. It has been proven to be critical to many terrorist operations and is instrumental to transnational crime.

Big Data 236
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Ten Best Ways to do On-The-Job Training

CTOvision

There are a variety of different styles of job training, but typically the most effective training happens when employees are actually at work. Employee development is important for a number of different reasons, and on-the-job training can provide unparalleled opportunities for employee growth, job development, and more. But why is on-the-job training so valuable, and what is the best way to do it?

Training 234
article thumbnail

Fed Tech Roundup September 8

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Registration for 10 Nov 2015 FedCyber Summit Now Open. Apple and Other Tech Companies Tangle With US Over Access to Data - New York Times. Patent Law Shouldn't Block the Sale of Used Tech Products - New York Times.

Training 225
article thumbnail

Fed Tech Roundup September 11

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. NASA Invites Media to Explore Mars Science Fiction and Fact in Cinema. How Can Agencies Balance IT Innovation and Cost Savings? - Nextgov. GAO dings IRS, Secret Service techs-up for pope and more - FCW.com.

article thumbnail

Fed Tech Roundup September 10

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Mike Read Appointed to President of Teledyne Marine; Robert Mehrabian Comments. Determining Who Should Be in Charge of Cyber Security. Defensive tests get tougher for FCW - MyWebTimes.com. Tech training program receives $3.5M in federal funding - The Seattle Times.

Training 219
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Preparing Your Enterprise for Global Scale

Data Center Knowledge

As we experience a boom in data center traffic, it's key that enterprises deliver fast and reliable internet access to the increasing number of mobile users. Read More.

article thumbnail

IBM Acquires StrongLoop for Node.js Capabilities

Data Center Knowledge

Says integration of StrongLoop will help build scalable APIs, connect existing back-end processes with front-end mobile, Internet of Things, and web apps Read More.

IBM 173
article thumbnail

Cloudera Aims to Replace MapReduce With Spark as Default Hadoop Framework

Data Center Knowledge

Says One Platinum Initiative would formalize what is already a de facto standard Read More.

Big Data 218
article thumbnail

ASHRAE Invites Industry Comment on Data Center Efficiency Standard Draft

Data Center Knowledge

Cuts telco facilities out of standard; PUE requirements stay in, but compliance paths redefined Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Confirms Acquistion of Cloud Application Security Firm Adallom

Data Center Knowledge

Cloud access security broker technology from Adallom will be available for Office 365 and the Enterprise Mobility Suite Read More.

Cloud 185
article thumbnail

Three Tips for Surviving Today’s Complex Data Landscape

Data Center Knowledge

The growth of structured and unstructured data and the need to create value from it has provided database administrators with a huge challenge. Read More.

article thumbnail

Are You Ready for Appageddon?

Data Center Knowledge

Here are three ways to survive Appegeddon, a.k.a., the high demand from users to access multiple applications on any number of mobile devices. Read More.

Mobile 164
article thumbnail

Microsoft Back in Court over Emails in Dublin Data Center

Data Center Knowledge

Hopes appeals court will overturn previous order to turn over suspected drug trafficker’s emails Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Report: Apple Takes Space in Russian Data Center to Comply With Data Location Law

Data Center Knowledge

Silicon Valley giant one of few companies that managed to meet deadline for storing Russian citizen data in Russia Read More.

article thumbnail

Dell Partners with Kingsoft as Part of $125 Billion Tech Investment in China

Data Center Knowledge

New strategy includes entry of Dell Ventures into Chinese market to support entrepreneurship and growth among Chinese emerging tech firms Read More.

Dell 163
article thumbnail

AWS, GoDaddy Named in Ashley Madison Lawsuit

Data Center Knowledge

Plaintiffs allege those named in the suit have been involved in the possession and distribution of stolen property Read More.

168
168
article thumbnail

Google Partners with CDNs to Lower Cloud Prices for Users Who Cache Content At “The Edge”

Data Center Knowledge

Users who pay CDNs to cache content originating from Google cloud VMs will pay less for cloud services Read More.

Google 175
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.