Sat.Aug 27, 2016 - Fri.Sep 02, 2016

ITAM Isn’t Sexy. But We Need It!


Nathaniel Crocker. Kids love toys. The main difference between children and adults is the cost of their toys. Young kids love a Hot Wheels car and it’s only $2.99. Older kids need a Transformer for $24.99. At 50, a new Tesla Roadster sets you back $109,000. But wow, what a car! Zero-to-sixty in 3.7

Facebook Violates Rule #2 Of An Insights-Driven Business: Marry Algorithms And Expertise

Forrester IT

Facebook can't buy a break with its newsfeeds. Every time it changes the model, somebody complains. But its latest snafu -- turning over the job to an algorithm without expert oversight is not the answer. Posting a fake story just isn't smart.

Report 238

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Devops and cloud: Great together, great apart

David Linthicum

Devops strongly benefits many enterprises by encouraging more continuous development and deployment by bringing some operations capabilities to in-house programmers. The business case for continuous everything is easy to make, although these benefits vary from organization to organization. It's easy to attribute the rise of devops directly to the rise of cloud computing. After all, cloud computing also assumes continuously updated applications and infrastructure.

Devops 223

Blockchain and the promise of cooperative cloud storage

Computer Weekly

Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

TechNet Augusta 2016: US Army Networks and Services


ChrisScott. This is the second in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The first was an overview you can find at: TechNet Augusta 2016 “ Cyber in the Combined Arms Fight ”. Networks and Services.

Google Pitches In To Declutter The Mobile Web

Forrester IT

On their constant quest to enable users to quickly find the best answers to their questions, Google announced last week that starting in January 2017, they will bury mobile websites where the content is blocked by intrusive interstitials. In other words, mobile websites that have pop-up ads won't rank as high in Google's search results. We've all felt the pain of having to hover our finger over the closeout sign of a large ad, before we can get to the content we set out to find.

Mobile 230

More Trending

Corporate IT: Three Reasons to Update Your Career Paths Today


Like all other functions around a big company, IT teams create formal career paths for their employees that outline the knowledge, competencies, and skills needed for an employee to climb up the career ladder. But, unfortunately, few take the time and effort to update them as and when is needed.

Strata + Hadoop World New York 2016: Save 20% with our discount code


Bob Gourley. There's no conference quite like Strata + Hadoop World. Just a few days among the best minds in data can entirely change the way you think about data—and can provide tips and techniques that can save you hours of time.

Frugal Innovation Supports Customer-Obsessed Innovation

Forrester IT

Photo: Indian By Design. The age of the customer demands that businesses drive innovation at ever faster speeds and with limited budgets. More than ever, innovation is of the essence, and innovation must be cost-effective.

Budget 195

CW@50: The next 50 years

Computer Weekly

As Computer Weekly celebrates its 50th anniversary, we look ahead to what we might be writing about in another 50 years from now


The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

3 Ways to Protect Firms’ Information Security as they Digitize


Although global companies might be unsure about a huge number of issues, ranging from shifting customer preferences , the future of emerging markets , the US presidential race , or the ramifications of a post-Brexit European Union , digitization is one trend that is ever present.

Tracking The Megatrend of Cybersecurity


Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity.

System 238

Google Will Attack Popup Ads On Smartphones -- Hallelujah!

Forrester IT

We've all experienced this garbage: You are on your smartphone. You find a link that you hope will help you in a mobile moment. You click with the great hope that it will be exactly what you need. Some irrelevant popup ad grabs you by the arm and blocks your path. You suffer through the ad or the countdown before getting to the site. And feel angry or bad doing it.). Now you finally find out: Does the website help or have you clicked in vain? You gotta be kidding me.

Google 190

Ten Most Connected Data Centers

Data Center Knowledge

Australian internet entrepreneur's new directory aims to rank the world's data centers Read More. Colocation Connectivity

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Cyber security breaches reported to ICO double in a year

Computer Weekly

An increase in cyber security incidents reported to the Information Commissioner’s Office is further evidence of the need to shift to automated, artificial intelligence-led defences, says Huntsman Security

Datrium: Server powered enterprise storage with speed, simplicity and saving


Bob Gourley. With this post we are initiating our coverage of Datrium. We are tracking them in our list of The Hottest Infrastructure Companies. Datrium provides a new class of storage called Server Powered Storage.

From PC Break/Fix to CloudMASTER®

Cloud Musings It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation , a growing information technology firm, as a personal computer break/fix technician.

Cloud 145

What Facebook Has Learned from Regularly Shutting Down Entire Data Centers

Data Center Knowledge

Infrastructure chief shares lessons learned from the company’s unusual infrastructure stress tests Read More. Downtime Facebook

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

Lessons from the Dropbox breach

Computer Weekly

Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons

Data 151

Automotive Technology Accelerates Beyond the Curve


Jeremy Sutter. For decades, the automotive industry was a technological backwater full of missed opportunities. Now, automakers worldwide are responding to new challenges with high-tech solutions. Today, the auto sector is seen as the fastest- evolving tech industry of them all. The Old Days. Not more than fifteen years ago, the typical car still relied on technology commonplace in the 1930's.

FSociety Locker – Python Malware

Doctor Chaos

A new ransomware variant, named “Fsociety Locker” (“Fsociety ALpha 1.0”), showed up recently seeking a place in the threat marketplace. The authors of this malware must be “Mr. Robot” fans, as the name “Fsociety” refers to the fictional group of hackers in that show. Security researchers at Sarah (Qi) Wu and He Xu at Fortinet described the the […]. Malware malware

One Data Center Standard to Rule Them All?

Data Center Knowledge

This group wants to solve the problem of too many standards by creating just one more Read More. Cooling Data Center Design Featured Power Technology

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Less than a third of organisations prepared for IoT security risks

Computer Weekly

The security industry needs to address the security basics with the growing number of IoT devices in corporate networks, according to security firm Tripwire

TechNet Augusta 2016 “Cyber in the Combined Arms Fight”


ChrisScott. This is the first in our series of posts based on our attendance at AFCEA’s TechNet in Augusta. Other coming posts will dive into details of Army Mission Needs for Networking, Integrated Electronic Warfare, Tactical Radios, Defensive Cybersecurity, Cybersecurity Training, and the Army’s Cybersecurity Center of Excellence.

How to prevent your security camera from being hacked

Doctor Chaos

As the number of connected gadgets around your home increases, so do your chances of getting hacked. Those odds are still very small, but it does happen. “Internet of things” devices pose a threat that their non-connected counterparts never did. They increase the number of gateways into your home by introducing vulnerabilities that didn’t exist […].

IoT Could Drive Micro Data Centers for Telcos

Data Center Knowledge

Wireless connections between sensors and hubs, one Schneider Electric ops manager believes, could attract Verizon and AT&T. Read More. AFCOM Data Center World Internet of Things Schneider Electric Carsten Baumann internet of things micro data centers telco

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 148

Can Graph Databases Really Advance Our Digital Public Services?


Emil Eifrem. Graph databases most commonly associated with social networks and recently adopted by enterprises are now being looked into by government agencies and the civil services to manage big data. Neo Technology’s Emil Eifrem explains how graph databases have the potential to enhance digital public services.

The Dropbox hack is real

Doctor Chaos

Troy Hunt on his blog ( is reporting that Dropbox may have been hacked. Earlier today, Motherboard reported on what had been (rumored) for some time, namely that Dropbox had been hacked. Not just a little bit hacked and not in that “someone has cobbled together a list of credentials that work on Dropbox” hacked either, […]. InfoSec infosec

Report 100

How Facebook Made Its Data Warehouse Faster

Data Center Knowledge

New compression algorithm shrinks storage, CPU requirements Read More. Big Data Facebook Storage

Data 157

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.