Sat.Aug 19, 2017 - Fri.Aug 25, 2017

Security professionals name top causes of breaches

Computer Weekly

Security professionals have named the top reasons for successful cyber attacks, which are affecting more than half of organisations

The cloud could drive open source out of the enterprise

David Linthicum

For a decade, there’s a question that just won’t go away: Is the cloud killing open source? It still strikes up some emotions. Open source software has been the backbone of enterprise platforms for a long time—remember the LAMP stack of Linux, Apache, MySQL, and PHP/Perl? But consuming open source software via the cloud could change open source’s enterprise footprint. [ Are you ready for the container invasion? Learn how to get started with Kubernetes.

The 12 IT practices CIO says you should not use: Stories, Charge-backs (ii)

IT Toolbox

In 12 'best practices' IT should avoid at all costs , Bob Lewis, CIO columnist, says that "industry best practices are sure to sink your chances of IT success". What makes IT organizations fail? Often, it’s the adoption of what’s described as “industry

Uptime in Space and Under the Sea

Data Center Knowledge

How computers deployed in space and on the ocean floor may end up improving your bank's server farm. Read More. Design Featured Hardware Hewlett Packard Enterprise Microsoft Power and Cooling

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

How AI can aid, not replace, humans in recruitment

Computer Weekly

Artificial intelligence is gaining prominence in a number of industries and brings advantages and disadvantages in the field of recruitment

More Trending

What is DeOS?

IT Toolbox

In these days of organized cyber attacks, you need security companies to be thinking one step ahead of the hackers, and now Cisco has come out with a new acronym to keep us awake at nights. No longer is DDoS (Distributed Denial of Service) our only worry, Cisco suggests that we need to think about Destruction Of Service (DeOS) attacks

Harvey: Hurricane Preparation Tips for Data Center Managers

Data Center Knowledge

Here are some essential steps data center crews should take before, during, and after an extreme-weather event Read More. Featured How to… Manage Uptime

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Big Data Management: A Few Pointers First-Timers Should Remember


There is no doubt about it, data is becoming vital for small and large companies. One of the major reasons data is becoming more important probably deals with its power to save money and optimize performance. Still, to many, using big data is pretty new, so it might be a good idea to consider the following tips […]. Big Data Cloud Computing CTO News Business Tech/Internet Technology Leadership

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

3 Causes for Poor VoIP Call Quality and How to Fix Them

IT Toolbox

Voice over IP (VoIP) can help businesses save money on phone services by using the Internet as its medium rather than traditional phone lines. However, cost savings aren’t the only reason many businesses have moved to VoIP. This technology makes setup as simple as plugging a VoIP phone into a network jack. Not only that, but the myriad apps available for mobile phones and computers make it

VOIP 148

Apple Said to Be Mulling Iowa Data Center

Data Center Knowledge

Company would join Google, Facebook, Microsoft, who have data centers in Iowa Read More. Apple North America

Apple 200

Top UK directors lack training to deal with cyber attacks

Computer Weekly

The UK’s top firms and charities urgently need to do more to protect themselves from online threats, according to a government-backed audit

Building an Awesome CLI App in Go Oscon 2017


A workshop written and delivered by Steve Francia and Ashley McNamara at OSCON 2017. outlining the techniques, principles, and libraries you need to create user-friendly command-line interfaces and command suites before walking you through building your own app. Along the way, you’ll cover everything from how to design and build commands to working with and parsing flags, config files and remote config systems, and how to work with environment variables and 12-factor apps

How To 109

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. To help them achieve this goal, software emerged on the market called mobile device management (MDM). Rather than review specific MDM tools, however, this article

This is Europe’s Hottest Emerging Data Center Market

Data Center Knowledge

Cloud and content giants look south, as new submarine cables come online and demand for digital content spikes in Africa, Middle East, and Asia Read More. Colocation Europe Featured Interxion

Business confidence in managing digital threats low, survey shows

Computer Weekly

Business digital transformation and cyber threats have outpaced enterprise security capacity, a survey has revealed

Survey 171

Connected cars have an ‘indefensible’ security vulnerability

Network World

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

The LAN: A History of Network Operating Systems Part 3

IT Toolbox

Even though the earliest LANs were of this genre, by 1989 it appeared that they were on the way out. By 1992, however, new life had been breathed into peer-to-peer networking by both Novell and Microsoft, along with the popularity of Artisoft's LANtastic. We will take a close look at peer-to-peer LANs at a deeper level in some future posts

DCK Investor Edge: Why CoreSite is REIT Royalty

Data Center Knowledge

A new research report crowns CoreSite Realty the top REIT for total returns for the past three and five-year periods. Read More. Business Colocation CoreSite Investing

Most firms don’t test, but rely on supplier to spec storage, finds survey

Computer Weekly

Most customers simply trust storage suppliers and resellers to recommend the right product for their workloads, while a small minority test their needs and involve application owners

Survey 168

Tips to  Snapchat spying on someone’s account

Doctor Chaos

Snapchat is fast becoming one of the most popular and most used apps these days. The popularity of the app will only grow rather than decreasing. Teenagers are crazy after the app and its maximum users when compared to the adults. They send pictures, drawings, videos and such in addition to sending the regular messages […]. Wireless mobile

Video 100

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Seven Tricks for Better ERP Automation

IT Toolbox

ERP serves as a critical nerve center for most businesses that use them. This means that efficiency with an ERP system often directly translates into business efficiency. And that, in turn, drives competitiveness. One place where businesses frequently cede competitiveness to their nimble rivals is around the area of ERP automation. Poorly designed automation can become a subtle

System 138

Survey: On-Prem Data Centers Lowest Investment Priority for IT Shops

Data Center Knowledge

Surprise, surprise: Public cloud sucking money away from in-house enterprise data centers Read More. Business

Survey 180

Future of dark web markets not yet in question, says analyst

Computer Weekly

AlphaBay and Hansa shutdowns are unlikely to jeopardise the future of dark web markets, according to a security analyst

Are you ready for state-sponsored zombie malware attacks?


On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.