Sat.Aug 27, 2016 - Fri.Sep 02, 2016

Blockchain and the promise of cooperative cloud storage

Computer Weekly

Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage

Adapt or die: 3 imperatives for cloud projects

David Linthicum

In the migration to the cloud, enterprises quickly learn that adaptability -- the willingness to change -- has to happen. Failure to adapt can turn minor problems into massive damage. For example, a large enterprise that migrates 100 applications to an IaaS cloud might discover during testing that the latency is too high for 25 of the applications.

Ten Most Connected Data Centers

Data Center Knowledge

Australian internet entrepreneur's new directory aims to rank the world's data centers Read More. Colocation Connectivity

From PC Break/Fix to CloudMASTER®

Cloud Musings

https://www.linkedin.com/in/stevendonovan It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation , a growing information technology firm, as a personal computer break/fix technician.

Cloud 207

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

CW@50: The next 50 years

Computer Weekly

As Computer Weekly celebrates its 50th anniversary, we look ahead to what we might be writing about in another 50 years from now

166
166

More Trending

What Facebook Has Learned from Regularly Shutting Down Entire Data Centers

Data Center Knowledge

Infrastructure chief shares lessons learned from the company’s unusual infrastructure stress tests Read More. Downtime Facebook

Corporate IT: Three Reasons to Update Your Career Paths Today

CEB IT

Like all other functions around a big company, IT teams create formal career paths for their employees that outline the knowledge, competencies, and skills needed for an employee to climb up the career ladder. But, unfortunately, few take the time and effort to update them as and when is needed.

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

ITAM Isn’t Sexy. But We Need It!

CTOvision

Nathaniel Crocker. Kids love toys. The main difference between children and adults is the cost of their toys. Young kids love a Hot Wheels car and it’s only $2.99. Older kids need a Transformer for $24.99. At 50, a new Tesla Roadster sets you back $109,000. But wow, what a car! Zero-to-sixty in 3.7

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

One Data Center Standard to Rule Them All?

Data Center Knowledge

This group wants to solve the problem of too many standards by creating just one more Read More. Cooling Data Center Design Featured Power Technology

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

Although global companies might be unsure about a huge number of issues, ranging from shifting customer preferences , the future of emerging markets , the US presidential race , or the ramifications of a post-Brexit European Union , digitization is one trend that is ever present.

Lessons from the Dropbox breach

Computer Weekly

Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons

Data 152

Facebook Violates Rule #2 Of An Insights-Driven Business: Marry Algorithms And Expertise

Forrester IT

Facebook can't buy a break with its newsfeeds. Every time it changes the model, somebody complains. But its latest snafu -- turning over the job to an algorithm without expert oversight is not the answer. Posting a fake story just isn't smart.

Report 127

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

IoT Could Drive Micro Data Centers for Telcos

Data Center Knowledge

Wireless connections between sensors and hubs, one Schneider Electric ops manager believes, could attract Verizon and AT&T. Read More. AFCOM Data Center World Internet of Things Schneider Electric Carsten Baumann internet of things micro data centers telco

TechNet Augusta 2016: US Army Networks and Services

CTOvision

ChrisScott. This is the second in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The first was an overview you can find at: TechNet Augusta 2016 “ Cyber in the Combined Arms Fight ”. Networks and Services.

Less than a third of organisations prepared for IoT security risks

Computer Weekly

The security industry needs to address the security basics with the growing number of IoT devices in corporate networks, according to security firm Tripwire

Google Pitches In To Declutter The Mobile Web

Forrester IT

On their constant quest to enable users to quickly find the best answers to their questions, Google announced last week that starting in January 2017, they will bury mobile websites where the content is blocked by intrusive interstitials. In other words, mobile websites that have pop-up ads won't rank as high in Google's search results. We've all felt the pain of having to hover our finger over the closeout sign of a large ad, before we can get to the content we set out to find.

Mobile 123

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

How Facebook Made Its Data Warehouse Faster

Data Center Knowledge

New compression algorithm shrinks storage, CPU requirements Read More. Big Data Facebook Storage

Data 158

Strata + Hadoop World New York 2016: Save 20% with our discount code

CTOvision

Bob Gourley. There's no conference quite like Strata + Hadoop World. Just a few days among the best minds in data can entirely change the way you think about data—and can provide tips and techniques that can save you hours of time.

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 150

Frugal Innovation Supports Customer-Obsessed Innovation

Forrester IT

Photo: Indian By Design. The age of the customer demands that businesses drive innovation at ever faster speeds and with limited budgets. More than ever, innovation is of the essence, and innovation must be cost-effective.

Budget 104

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Google and Amazon Vie for Big Inroad Into Wall Street Data Trove

Data Center Knowledge

Trying to understand what causes flash crashes is no longer just for financial regulators and Wall Street Read More. Amazon Big Data Enterprise Google

Google 157

Tracking The Megatrend of Cybersecurity

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity.

System 111

More IoT botnets connected to DDoS attacks

Computer Weekly

Security researchers have found another botnet operation exploiting internet of things devices to carry out powerful distributed denial of service attacks, prompting calls for IoT device makers to improve security

Google Will Attack Popup Ads On Smartphones -- Hallelujah!

Forrester IT

We've all experienced this garbage: You are on your smartphone. You find a link that you hope will help you in a mobile moment. You click with the great hope that it will be exactly what you need. Some irrelevant popup ad grabs you by the arm and blocks your path. You suffer through the ad or the countdown before getting to the site. And feel angry or bad doing it.). Now you finally find out: Does the website help or have you clicked in vain? You gotta be kidding me.

Google 101

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.