Sat.Apr 30, 2016 - Fri.May 06, 2016

Beyond AWS: The cloud's next stage

David Linthicum

Amazon.com's cloud platform, Amazon Web Services , generated $2.56 billion in revenue last quarter, putting it on pace to make $10 billion this year. AWS has been the clear public cloud leader for some time, and the latest financial data shows that leadership translates to real money as more enterprises adopt public cloud computing. Let's do the math: It's believed that 5 percent of IT workloads are on public clouds now, counting both infrastructure and applications.

IBM 159

Machine Learning – How Artificial Intelligence is Invading the Enterprise

The Investing Edge

Machine learning, a method of data analysis that automates analytical model building, is at the top of the “hype curve” for emerging technologies and is one of the top 10 strategic technology trends for 2016, according to Gartner.

Top 10 Data Center Stories of the Month: April

Data Center Knowledge

Here are the most popular stories that ran on Data Center Knowledge in April Read More. DCK Featured

Black Mirror Transcends Fiction Into Reality

CTOvision

Katie Kennedy. Fiction, especially fiction with technology components, can be an entertaining way to think through ethics issues. With that in mind a series we have been watching is the Netflix anthology called Black Mirror.

Video 130

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Oracle-style database coupling doesn't work in the cloud

David Linthicum

Many organizations that built applications 10-20 years ago had a very data-oriented approach to application architecture. Although mainly due to the particularities of Oracle-based systems, it became commonplace to couple the application to the database. (In In the case of Oracle-connected applications, stored procedures and triggers coupled the database to the application.).

Oracle 158

More Trending

EdgeConneX Brings the Edge of Amazon’s Cloud to Portland

Data Center Knowledge

As cloud providers race to grow capacity in core markets, the edge data center firm says there’s also a race to the edge Read More. Amazon Cloud Computing Colocation Connectivity Data Center Strategies Featured Peering Site Selection

Cloud 156

AFCEA International and George Mason University Host Annual Critical Issues in C4I Symposium

CTOvision

Michael Johnson. AFCEA International and George Mason University are hosting the annual Critical Issues in C4I Symposium which will bring academia, industry and government/military together to address important issues in C4I technology and systems R&D.

Agile 111

Is Leadership Ready to Handle a Shark Attack?

Social, Agile and Transformation

CIO and IT leaders should be able to relate to this video. Watch the first few minutes to see Mick Fanning waiting to catch a wave when suddenly he is attacked by a shark. You can see him scramble a bit then fend him off before a boat comes to his rescue.

Video 130

High-tech moms: Tips for managing family life while steering booming businesses

ComputerWorld IT Management

Happy Mother's Day, Tech Moms!

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.

Friday Funny: Herding Cats on the Raised Floor

Data Center Knowledge

And you thought zombie servers were your biggest problem. Read More. Humor

154
154

Four Cloud Computing Myths That Need To Die

CTOvision

Justin Blanchard. After all these years, cloud computing is still a victim of myths that are largely untrue, and are often obviously untrue. Cloud computing, and public cloud platforms specifically, have been around for a long time. The cloud is used every day by companies ranging from one-person freelance outfits to the largest enterprise organizations with tens of thousands of employees. The cloud is established, proven, and here to stay.

Top 50 Oracle SQL Blogs for 2016

Database Star

As someone who works with and blogs about Oracle, I like to read other Oracle blogs. I also noticed it was hard to find a good list of the top Oracle SQL blogs. So, I decided to make my own list. Top Oracle SQL Blogs I had found more than 50 Oracle SQL blogs, but wanted […].

3 Strategies to Decrease IT Costs and Increase Business Impact

CIO Dashboard

Guest post by Suheb Siddiqui and Chetan Shetty. A veteran CIO recently told me, “The last few months felt like I time traveled back to the 1980s. Business stakeholders are demanding the applications they want, designed the way they like, and at a speed dictated by their priorities.”

Schema Evolution Patterns

Speaker: Alex Rasmussen, CEO, Bits on Disk

If you want to make your development team squirm, ask them about database schema changes or API versioning. Most development teams struggle with changing database schemas and updating API versions without breaking existing code. Alex Rasmussen is an expert in helping teams through these struggles. His talk will examine database schema changes and API versioning as two instances of schema evolution: how your systems respond when the structure of your structured data changes.

Yahoo Data Center Team Staying “Heads-Down” Amid Business Turmoil

Data Center Knowledge

Brings online latest $20 million data center expansion in Nebraska Read More. Featured Yahoo

Women in Cybersecurity: Reducing the Gender Gap Part III

CTOvision

Katie Kennedy. This is the third post in a three part blog post on the Women in Cybersecurity Conference that took place March 31st through April 2nd in Dallas, Texas. The first keynote for the final day of the Women in Cybersecurity conference was Shelley Westman. Westman had a long road that ultimately led her to where she is today, Vice President of Operations and Strategic Integration Initiatives at IBM Security.

5 secure habits of the paranoid PC user

Network World

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners. We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data. Let's take a look at some of their security habits that you may want to practice regularly.

Install Dell Command Update and Flash BIOS in WinPE

Mick's IT Blog

I have wanted to get the process of flashing the BIOS into the WinPE environment for quite a while. With the help of Sapien's PowerShell Studio , I finally wrote the script to make this possible.

Dell 86

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Why Google Wants to Rethink Data Center Storage

Data Center Knowledge

Taking a closer look at the fundamental redesign of storage Google is proposing, from system to the physical disk itself Read More. Cloud Computing Featured Google Storage disk

Google 153

Moving Toward a Framework for Resilient Cybersecurity: Evaluating the Threat Landscape

CTOvision

Dan Cybulski. In this previous post on The Need for a Framework for Resilient Cybersecurity we highlighted that the increasing diversity and sophistication of today's IT environments is driving a need for organizations to implement a framework for resilient cybersecurity.

Oracle ASCII Function with Examples

Database Star

In this article, I’ll show you what the ASCII function is and demonstrate some examples. Purpose of the Oracle ASCII Function The ASCII function is used to convert a single character into a number that represents the character. It’s how you get an ASCII value of a CHAR in Oracle.

CIOs: Match security plans to your company's 'risk appetite'

ComputerWorld IT Management

This report from the CIO Executive Council (CEC), based on a webcast featuring Scott Angelo, CIO at K&L Gates, and Mike Plantinga, CIO at CIBC Mellon, explores CIO-level strategies for dealing with cybersecurity threats – before and after a data breach. To read this article in full or to leave a comment, please click here (Insider Story

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Equinix Building New Data Centers in Silicon Valley, New York, Hong Kong

Data Center Knowledge

Adds three locations to already extensive global expansion push Read More. Asia-Pacific Colocation Equinix New York Silicon Valley Supply and Demand

Tech News Roundup May 6

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem. Technology Ticker. Plans for a whale sanctuary ride a wave of support, but face a storm of controversy. Jeff Bezos sells $671M worth of Amazon shares in his largest stock sale ever. Startup Spotlight: Shyft helps workers swap shifts with labor marketplace model. Tableau cuts hiring forecast by 50% for 2016, plans to hire new president. Get ready for in-flight wifi that doesn't suck - Quartz.

Step-By-Step: Enabling an Azure Active Directory Self-Service Password Reset

CanITPro

Password reset requests are a common nuisance for system administrators and the people they support. Company operations can be negatively affected if users are not provided access to systems and applications promptly.

Report: CIOs face 'massive gap' in talent acquisition

ComputerWorld IT Management

Only 11 percent of IT executives said they have a “robust” talent acquisition pipeline, according to a recent survey of 133 IT executives conducted by the CIO Executive Council (CEC). That’s a big problem in an increasingly competitive talent market, where corporate IT shops compete not only with each other for talent but also with cloud vendors and Silicon Valley. To read this article in full or to leave a comment, please click here (Insider Story

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.