Sat.Aug 09, 2014 - Fri.Aug 15, 2014

article thumbnail

From the Intel Newsroom: Improving Parkinson’s Disease Monitoring and Treatment through Advanced Technologies

CTOvision

'By Bob Gourley. Editor’s note: The use case articulated here is important on its own, but is also one that can be repeatable across multiple other medical research activities and diseases. Thanks Intel and Cloudera for the technology and thanks to the Michael J. Fox Foundation for Parkinson’s Research (MJFF) for what you are doing here.

Intel 287
article thumbnail

IO Building Massive Beachhead in New Jersey

Data Center Knowledge

'Provider has deployed dozens of modular data centers in its massive facility overlooking the New Jersey Turnpike in Edison, establishing itself as a major player in the highly competitive New Jersey market. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Is It Possible For An IT Department To Make Money?

The Accidental Successful CIO

'It turns out that CIOs can transform the IT department into a revenue generator Image Credit: Joe+Jeanette Archie. One of the biggest challenges that the person with the CIO job has is that the department that they are responsible for is more often than not viewed as being a cost center. What this means is that the IT department spends and spends and spends and never seems to actually bring in any money.

Company 194
article thumbnail

Losing Big with Big Data

Eric D. Brown

'I help companies use big data to work better. I love what I do and I love seeing companies and people succeed with big data. That said, I’ve seen my fair share of companies (and people) lose with big data too. Most of these ‘losses’ aren’t due to bad data or poor usage of analytical tools. Most of these losses can be traced to a few simple decisions that were made when a big data initiative was being planned.

Big Data 162
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

More Questions than Answers from Data Breach Report

CTOvision

'By Shannon Perry. The American media has never paid more attention to data breaches and cybersecurity than it does today. Major breaches in the last year  at large companies like Target and eBay  have made information security discussions more worrying and more widespread, albeit still not universally understood. On August 5 th , Nicole Perlroth and David Gelles with The New York Times published an article titled  Russian Hackers Amass Over a Billion Internet Passwords. According to

Report 268
article thumbnail

Cooling and Powering Florida Poly’s New Supercomputer

Data Center Knowledge

'Data center supporting the HPC system in the nation’s newest technology and science school features liquid cooling and unusual electrical design. Read More.

More Trending

article thumbnail

National Cybersecurity = Cloud Computing Security

Cloud Musings

'A recent article Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent ( [link] ). This forecast was gleaned from a just released Emergent Research and Intuit study. This statement is also very scary in that it also highlights the growing importance of the cybersecurity threat to the nations economic livelihood.

Security 148
article thumbnail

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

'By William McElmurry. For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue receiving incentive payments. Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care.

Security 267
article thumbnail

Vocus Acquires Perth Data Center in Western Australia For $11.7 Million

Data Center Knowledge

'IT solutions provider ASG remains a tenant and Vocus becomes preferred solutions provider. Vocus continues to expand its data center footprint in Australia and nearby New Zealand. Read More.

article thumbnail

PowerShell: Removing Outlook Data Files

Mick's IT Blog

'Automating the removal of Outlook data files is a tedious process that is difficult to automate. The registry key is a data hash that is unique on each system. Here is a script I wrote that will do just that. This script will remove the data file from Outlook when run under the end-user''s credentials. The script parses through the HKU and removes the registry entry for that key.

Data 81
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mobile isn’t working remotely, it’s a mindset!

A Screw's Loose

'I spend a lot of time talking about devices and apps. Not necessarily because I want to be talking about them, but that’s what people think mobility is about. They want to get into conversations about Android or iOS (they both have their strengths), why they think Windows Phone OS will succeed or fail, or [.].

Mobile 77
article thumbnail

Security Innovation Network SINET 16 Application Process Now Open

CTOvision

'By Bob Gourley. We have previously written about the Security Innovation Network ( SINET ) and the yearly SINET Showcase. This is a group every technology firm should have some familiarity with now. Startups should track SINET as a way to learn and perhaps expose your technology to the community. Established security firms should track SINET to learn of emerging capabilities to partner with.

article thumbnail

IBM Opens SoftLayer Data Center in Toronto, Canada

Data Center Knowledge

'First SoftLayer data center in Canada, the facility to improve service for the company''s Canadian customers as well as customers outside of the country serving the Toronto market. Read More.

article thumbnail

Introduction to Micro-Segmentation TechTalk 47

Virtualized Greek

'Sorry no Mrs. in this video. In preparation for a deep dive on micro-segmentation, I give a high level over of Micro-Segmentation as I understand it currently. High level mirco-segmentation is a attribute of the Goldilocks zone VMware believes.

Vmware 74
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

VMworld 2014 Prayer Time

Scott Lowe

'I mentioned this on Twitter a few days ago, but wanted to go ahead and formalize some of the details. A blog reader/Twitter follower contacted me with the idea of getting together briefly at VMworld 2014 for some prayer time. I thought it was a great idea (thanks David!), so here are the details. What: A brief time of prayer. Where: Yerba Buena Gardens, behind Moscone North.

article thumbnail

Tapping Global Threat Intelligence To Secure Enterprise Networks

CTOvision

'By Bob Gourley. Tapping Global Threat Intelligence To Secure Enterprise Networks. Cyber Security Symposium. August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. For more and to register see: [link]. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote.

Network 258
article thumbnail

BGP Routing Table Size Limit Blamed for Tuesday???s Website Outages

Data Center Knowledge

'Many service providers experience outages, causing downtime for hosting firms and customer websites. Read More.

279
279
article thumbnail

The Holistic IT Governance

Future of CIO

It takes strategic and systematic thinking and a holistic IT governance approach in running an Agile IT. Digital IT is permeating into the very fabric or core processes in modern organizations, thus, IT governance is crucial to steering business in the right direction and make effective business decisions. However, what is the best approach to begin implementing formal IT Governance specifically aimed at improving the quality of demand?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Running Arista vEOS on KVM

Scott Lowe

'In this post, I’ll show you how I got Arista’s vEOS software running under KVM to create a virtualized Arista switch. There are a number of other articles that help provide instructions on how to do this, but none of those that I found included the use of libvirt and/or Open vSwitch (OVS). In order to run vEOS, you must first obtain a copy of vEOS.

article thumbnail

Big Data, Small World: Kirk Borne at TEDxGeorgeMasonU

CTOvision

'By Bob Gourley. The video at this link and embedded below shows Kirk Borne at TEDx GeorgeMason. From the YouTube description: Dr. Kirk Borne is a Multidisciplinary Data Scientist and an Astrophysicist. He is Professor of Astrophysics and Computational Science in the George Mason University School of Physics, Astronomy, and Computational Sciences (SPACS).

Big Data 255
article thumbnail

Data Security: Encryption in the Cloud

Data Center Knowledge

'Cloud services have taken the business world by storm, and all the data handled by the cloud must be secured, writes Richard Moulds of Thales e-Security. Encryption plays an important role in creating trust in the cloud. Read More.

Cloud 220
article thumbnail

IT Reinforcement

Future of CIO

It is not that businesses need to reinforce IT ASAP, but they need reinforce accountability. There are stresses in many professions and people must respond accordingly. Technology is becoming more critical than ever before and organizations will need to ensure that IT professionals are challenged, but not overwhelmed if they expect to retain them. So why haven't more technology professionals and business leaders leveraged managed services to reduce the burden affordably , and how to reinforce IT

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cloud-Hosted Cloud Management via Platform9

Scott Lowe

'A new startup emerged from stealth today, a company called Platform9. Platform9 was launched by former VMware veterans with the goal of making it easy for companies to consume their existing infrastructure in an agile, cloud-like fashion. Platform9 seeks to accomplish this by offering a cloud management platform that is itself provided as a cloud-based service—hence the name of this post, “cloud-hosted cloud management.” It’s an interesting approach, and it certainly hel

Cloud 60
article thumbnail

Carnegie Mellon Software Engineering Institute CERT Insider Threat Program Manager Certification

CTOvision

'By Bob Gourley. The Carnegie Mellon University Software Engineering Institute is a national treasure. One of the great bastions of the discipline of enterprise grade software engineering.This is the home to the first computer emergency response team (CERT), a group formed with DoD funding to enhance the coordination of computer emergency response teams in the wake of the famous morris worm.

article thumbnail

The Bitcoin Service Provider: New Tenant Class for Data Centers

Data Center Knowledge

'Data center provider Latisys lands a colocation deal with mining services company Rocky Mountain Miners. Read More.

article thumbnail

Top Three Traits of Respective Leaders

Future of CIO

H ighly effective leaders get respect, not because of their titles, but because of their vision and influence; insight and wisdom; ability and humilit y. Leaders and managers are different roles. A leader has a vision and personal influence to convince others to achieve that vision. A manager controls the day-to-day activities and resource utilization of the company.

Energy 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Deploying CoreOS on OpenStack Using Heat

Scott Lowe

'In this post, I’m going to illustrate one way to deploy CoreOS on OpenStack using Heat. By no means is this intended to be seen as the only way to use Heat to deploy CoreOS, but rather as one way of using Heat to deploy CoreOS. I’m publishing this in the hopes that others will be able to use this as a building block for their own deployments.

article thumbnail

Pew Report: Robotics, A.I., and Jobs

CTOvision

'By Shannon Perry. Scientists, programmers, and engineers work ceaselessly to develop improvements in robotics and artificial intelligence, which constitute some of the most impressive technological feats ever accomplished. Impressive personal assistants like Apple’s Siri and Microsoft’s Cortana can interpret voice commands, provide useful information, and even tell jokes, while incredible supercomputers like IBM’s Watson can make hypotheses and literally learn.

article thumbnail

Redefining System Architecture with Data at the Core

Data Center Knowledge

'To meet the new demands of business, IT can no longer count on the tried and true, writes Momchil Michailov of Sanbolic. What todays IT teams need is a modern system architecture that has data at its core. Read More.

article thumbnail

Foto Friday – Cardinal from the backporch

Eric D. Brown

'Captured this Cardinal from our backporch last week. Taken with Canon 7D and Canon 400mm 5.6 L handheld. See more photos in my flickr photostream and/or my Zenfolio portfolio (where you can buy images). If you like my photography , feel free to support my addiction habit by visiting Adorama (affiliate link) to purchase new or used photographic gear.

113
113
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.