Sat.Dec 13, 2014 - Fri.Dec 19, 2014

article thumbnail

FBI Provides An Update On #SonyHack Investigation Including Some Tech Details On Attribution

CTOvision

'By Bob Gourley. The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It is true they have been wrong before, and it is a very American trait to be skeptical of government assessments.

Malware 348
article thumbnail

The Role of the CEO – Driving Corporate Culture

Eric D. Brown

'I’m sure there are many definitions of a CEO out there. Plenty of people will say the CEO should be a leader, manager, communicator and facilitator. Other’s might say that the CEO is the person most focused on strategy and the ‘future’ of the business. Investopedia defines the CEO as: The highest ranking executive in a company whose main responsibilities include developing and implementing high-level strategies, making major corporate decisions, managing the overall ope

Agile 253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Undertaking the Challenge to Reduce the Data Center Carbon Footprint

Data Center Knowledge

'Data centers have come under intense scrutiny from environmental groups because of their significant contribution to carbon emissions, writes Brian Lavallée of Ciena. However, there are multiple strategies and tactics that organizations can adopt in order to reduce their energy consumption. Read.

article thumbnail

2014 Big Data Posts - Self Service BI, Agile Data Management Practices, and Killing Data Landfills

Social, Agile and Transformation

'In 2014, many of my posts on BigData were actually about "small" data management practices. Specifically, I hope these posts educated readers that tools of "Data Science 1.0" such as Microsoft Excel, PowerPoint and especially Access can disrupt - even kill - efforts to make organizations become more data driven. In addition to calling out this problem which is something I have been doing for a.

Big Data 195
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Examining New Mission-Focused Capabilities Coming From The Cloudera And Intel Engineering Partnership

CTOvision

'By Bob Gourley. The video at this link and embedded below captures the content and dialog of a webinar which examined new capabilities of Cloudera and Intel , with a focus on capabilities that provide a full stack solution to many key enterprise mission needs. The webinar included insights by Cloudera’s Senior Director of Technology Webster Mudge and Intel’s Enterprise Technology Specialist Ed Herold, plus questions from an informed audience.

Intel 285
article thumbnail

Demystifying IT

Eric D. Brown

'In a recent “Movers and Shakers” article by Martha Heller titled “ The Power of Metaphor “, Malini Balakrishnan, CIO of Building Materials Holdings Corporation (BMC) claimed that one of the most important roles that a CIO has today is helping the organization uunderstandwhat role the IT group plays. Balakrishnan is quoted as saying: “As CIOs, we need to demystify IT.

Groups 162

More Trending

article thumbnail

2014 - The Year the CIO and CMO Partnership Became Mission Critical

Social, Agile and Transformation

'I started 2014 with several posts on the CIO / CMO relationship and where IT departments can help with digital marketing initiatives. The main touch point is around data and the technologies that enable CMOs to be more data driven. With so many technology vendors trying to tap into marketing budgets and when most of the key marketing data is is enterprise systems, SaaS products, and other data.

Big Data 169
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

'By Anup Ghosh. Editor’s note: As an advisor to Invincea I closely track not only their capabilities but the context they provide the community. Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invincea blog, it is reposted below for your consideration. – bg. Let’s be honest. As wild as this year has been in InfoSec, none of us, and I mean nobody, anticipated the events that unfolded this week with the Sony hack: A major studio cancels a theatrical

Security 282
article thumbnail

Technology and the Evolving Workforce

Cloud Musings

'by Melvin Greer Managing Director Greer Institute for Leadership and Innovation According to a Greer Institute Workforce and Talent study, the 2020 workforce is both “the most educated and culturally diverse of any generation” and “notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies.” Given this, it is crucial for leaders to understand how best to motivate and engage this 2020 workforce and win the war for top talent.

Dell 169
article thumbnail

Security is Key: Five Data Center Protection Questions to Keep Your Data Safe

Data Center Knowledge

'There is an ongoing challenge in the data center to balance the strength of good encryption with the competing interests of budget and usability. Joe Sturonas of PKWARE discusses five data center protection questions to help keep data safe. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why The Singapore Stock Exchange Problem Is The CIO’s Fault

The Accidental Successful CIO

'Bad things have been happening at the Singapore Stock Exchange Image Credit: Reuters. Stock exchanges are challenging businesses to run. The people who use stock exchanges, stock traders, banks, brokers, etc. move very fast. The phrase “time is money” was invented to describe these people. They have a desperate need to be able to communicate with other people in a very rapid and very reliable way.

article thumbnail

Recorded Future Launches New Cyber Threat Insights Report: Valuable context for defenders

CTOvision

'By Bob Gourley. Recorded Future has launched a new free service for cyber defenders which I am finding valuable for situational awareness. This new cyber daily provides technical indicators and context around vulnerabilities making them more understandable and helping put them in context. My view is their report can be helpful to both security executives and more operational and tactical defenders since it can help both prioritize actions and discuss the need to mitigate specific concerns.

Report 276
article thumbnail

Security attacks and countermeasures

Cloud Musings

'by Sandra K. Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes further noted that such concerns create barriers to the adoption of critical technologies that drive value and growth: mobility, cloud and big data.

Security 159
article thumbnail

The Continued Threat of DDoS Attacks, Four Ways to Address the Concern

Data Center Knowledge

'DDoS is becoming the preferred method of attack for hackers, hacktivists and rogue governments due to its simplicity, ease of distribution and potential for major disruption. Bill Barry of Nexusguard discusses four steps that can help your company recover in the event of an attack. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How the Internet of Things Can Improve Environmental Sustainability

The Investing Edge

'I’m a graduate of the College of Agriculture and Life Sciences at Cornell and sit on the board of Change is Simple , a non-profit devoted to educating the next generation to become thoughtful and aware of environmental issues and social responsibility. I also surf as frequently as possible, when I can find free time, literally immersing myself as often as I can in the power of nature.

article thumbnail

The quotable @ScottMcNealy said: Trying to run a business without awareness of the cyber threat is asking to be fired

CTOvision

'By Bob Gourley. The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack.

CTO 274
article thumbnail

A CIO’s Christmas List

A CIO's Voice

'2014 has been a great year. Things are looking better. Hopefully the momentum will carry into 2015. I have tried to be really good by being the best CIO I can. So Santa, this year, I would like the following: Apple iPhone 6 plus. I have decided bigger is better but I haven’t figured out how to carry it. A development team that can hit the ground running and fix code quickly.

Budget 87
article thumbnail

Are You Ready for Big Metadata?

Data Center Knowledge

'Metadata, which in the past was limited to names and labels, today encompasses information about the relationships between data, reports, and processes, writes Glenn Johnson of Magic Software Enterprises Americas. And as the amount of metadata continues to grow, it requires its own strategy for.

Strategy 194
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The new normal: Cloud, it’s not just early adopters anymore Part II

The Investing Edge

'In our last blog post , we referenced an IDG study suggesting that in the past two years, the percentage of enterprises with either applications or infrastructure running in the cloud has gone from just 12 percent to an enormous 69 percent. This post will discuss why. Business Insider recently reported that a gigabyte’s worth of storage on a hard drive cost more than $9,000 in 1993, but a mere 4 cents in 2013.

Cloud 87
article thumbnail

Your Enterprise has too many Cyber-ish People

CTOvision

'By John Scott. Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’

article thumbnail

Will Docker replace VMware?

Virtualized Greek

'Is Docker, and for that matter containers in general full-on competition to VMware and other virtualization platforms? Docker has announced platform level features that include network virtualization and clustering. However, not every workload is suitable for containers. Containers lack much.

Vmware 98
article thumbnail

Taiwan’s Foxconn Patents Solar-Powered Data Center Container

Data Center Knowledge

'Three patents describe two different container cooling systems, power supply system Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Server Storage I/O Cables Connectors Chargers & other Geek Gifts

Storage IO Blog

'It is that time of the year when annual predictions are made for the upcoming year, including those that will be repeated next year or that were also made last year. Then there are the gift lists or trying to figure out what to get that difficult to shop for person particular geek’s who may have everything, or want the latest and greatest that others have, or something their peers don’t have yet.

Storage 83
article thumbnail

DDN raises the bar as data intensive analytics push storage systems

CTOvision

'By Dan Cybulski. It is no secret that today’s data intensive analytics are stressing traditional storage systems. The capacity of individual drives continues to increase while performance sees little change. As such, organizations are leveraging horizontal scale and non-volatile memory (NVM) technology (i.e. SSD) to bolster the performance of traditional storage platforms and support the ever-increasing IOPS and bandwidth requirements of their applications.

Storage 260
article thumbnail

Installing a VMware Workstation lab – Part 1 Video

Virtualized Greek

'I decided to create walk-thru’s to Johnathan Frappier’s #vDM30in30 labs. While I have no intention in doing 30 videos in 30 days Johnathan has laid out a very good framework for setting up a lab and I thought video walk-thu’s.

Video 75
article thumbnail

Sophisticated Iranian Hacker Group Could Be Targeting US Businesses

Data Center Knowledge

'FBI warns that Iranian hacker group may be ready to target US businesses that deal with defense contractors, energy firms and educational institutions. Read More.

Groups 200
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DIY converged server software defined storage on a budget using Lenovo TS140

Storage IO Blog

'Do you need or want to do a Do It Yourself (DIY) build of a small server compute cluster, or a software defined storage cluster (e.g. scale-out), or perhaps a converged storage for VMware VSAN, Microsoft SOFS or something else? Do you need a new server, second or third server, or expand a cluster, create a lab or similar and want the ability to tailor your system without shopping or a motherboard, enclosure, power supply and so forth?

Storage 82
article thumbnail

The Mission Needs of DoD In and Around Pacific Command

CTOvision

'By ChrisScott. This report provides insights into the mission needs of the US Military in and around the Pacific command. If you are registered please Login Here. To request a login Sign Up Here.

CTO 239
article thumbnail

Blog Migration in the Works

Scott Lowe

'You might have noticed that blog content has been a bit sparse over the last few weeks. The reason I haven’t generated any new content is because all my spare time is taken up with preparing to migrate this site to a new hosting platform. Sometime over the holiday season, I’ll be migrating this site from a hosted WordPress installation to Jekyll running on GitHub Pages.

Mobile 60
article thumbnail

Five Tips to Advance Your Cloud Career in 2015

Data Center Knowledge

'It''s time to get out there and get noticed. The IT industry is hot, and cloud is the hottest thing in IT Read More.

Cloud 238
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.