Sat.Apr 30, 2016 - Fri.May 06, 2016

article thumbnail

Four Cloud Computing Myths That Need To Die

CTOvision

Justin Blanchard. After all these years, cloud computing is still a victim of myths that are largely untrue, and are often obviously untrue. Cloud computing, and public cloud platforms specifically, have been around for a long time. The cloud is used every day by companies ranging from one-person freelance outfits to the largest enterprise organizations with tens of thousands of employees.

Cloud 168
article thumbnail

Why Google Wants to Rethink Data Center Storage

Data Center Knowledge

Taking a closer look at the fundamental redesign of storage Google is proposing, from system to the physical disk itself Read More.

Storage 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Options That CIOs Have To Consider: Build, Colocation, or Cloud

The Accidental Successful CIO

CIOs have to make hard decisions about future data centers Image Credit: Intel Free Press. If there is one thing that I think that we can all agree on then it is that our data processing and storage needs continue to grow as the company comes to realize the importance of information technology. The person with the CIO job now has to find a way to deal with this explosive growth.

Cloud 122
article thumbnail

Is Leadership Ready to Handle a Shark Attack?

Social, Agile and Transformation

CIO and IT leaders should be able to relate to this video. Watch the first few minutes to see Mick Fanning waiting to catch a wave when suddenly he is attacked by a shark. You can see him scramble a bit then fend him off before a boat comes to his rescue. Now for those of us in IT, there are some great lessons to share with your business leaders on handling a real life crisis from this.

Video 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Women in Cybersecurity: Reducing the Gender Gap Part III

CTOvision

Katie Kennedy. This is the third post in a three part blog post on the Women in Cybersecurity Conference that took place March 31st through April 2nd in Dallas, Texas. The first keynote for the final day of the Women in Cybersecurity conference was Shelley Westman. Westman had a long road that ultimately led her to where she is today, Vice President of Operations and Strategic Integration Initiatives at IBM Security.

article thumbnail

Why You Should Never Overlook Under-Rack Airflow

Data Center Knowledge

You might not think it, but the small space between the bottom of an IT rack or cabinet and the raised floor or slab can play a profound role in airflow management (AFM). Read More.

Industry 119

More Trending

article thumbnail

Install Dell Command Update and Flash BIOS in WinPE

Mick's IT Blog

I have wanted to get the process of flashing the BIOS into the WinPE environment for quite a while. With the help of Sapien's PowerShell Studio , I finally wrote the script to make this possible. The purpose is that it can flash it much quicker in the WinPE environment and it also gives two opportunities for he BIOS to be flashed during the build process.

Dell 89
article thumbnail

Black Mirror Transcends Fiction Into Reality

CTOvision

Katie Kennedy. Fiction, especially fiction with technology components, can be an entertaining way to think through ethics issues. With that in mind a series we have been watching is the Netflix anthology called Black Mirror. Black Mirror highlights the dark side of life and technology, is now a reality. In the third episode of Season 1, "The Entire History of You", the characters are implanted with a device called a "grain".

Video 161
article thumbnail

Understanding Hyperconverged Infrastructure Use Cases

Data Center Knowledge

According to analysts, hyperconverged infrastructure adoption is skyrocketing. Here's what it can be used for. Read More.

140
140
article thumbnail

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

Tech Republic Security

The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.

Apple 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Machine Learning – How Artificial Intelligence is Invading the Enterprise

The Investing Edge

Machine learning, a method of data analysis that automates analytical model building, is at the top of the “hype curve” for emerging technologies and is one of the top 10 strategic technology trends for 2016, according to Gartner. It’s safe to say that most of us are already interacting with machine learning applications on a daily basis whether it’s Apple’s Siri, Facebook’s face detection, Netflix personalized recommendations, or iOS’s autocorrect.

article thumbnail

AFCEA International and George Mason University Host Annual Critical Issues in C4I Symposium

CTOvision

Michael Johnson. AFCEA International and George Mason University are hosting the annual Critical Issues in C4I Symposium which will bring academia, industry and government/military together to address important issues in C4I technology and systems R&D. We are proud to announce that Cognitio's Bob Gourley will be providing assessments on the future of IT relevant to operational ISR and critical DoD missions (including Cybersecurity, Counter IED, Counter terrorism) during this event.

Agile 152
article thumbnail

Top 10 Data Center Stories of the Month: April

Data Center Knowledge

Here are the most popular stories that ran on Data Center Knowledge in April Read More.

article thumbnail

How to easily encrypt/decrypt a file in Linux with gpg

Tech Republic Security

Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.

Linux 119
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

5 secure habits of the paranoid PC user

Network World

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners. We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data.

article thumbnail

Tech News Roundup May 4

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Data61, Treasury to review the future of blockchain technology in Australia - ZDNet. GeekWire Deals: Use Alexa or your phone to control your TV with the Blumoo IR blaster. Apple hires robotic hand pioneer Yoky Matsuoka, former UW professor and Nest exec.

article thumbnail

The Impact of Block Sizes in a Data Center

Data Center Knowledge

Understanding and accommodating for block sizes in the design, operation and optimization phases of the VM lifecycle leads to more predictable application delivery in your environment. Read More.

article thumbnail

New standards may bring run-flat tech to hard drives in Microsoft Azure and data centers

Tech Republic Data Center

If car tires can keep going when they're damaged, then why not hard disks? Industry standards committees are working on this concept. Microsoft and others are starting to plan for its implementation.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to share files easily and quickly with Send Anywhere

Tech Republic Cloud

There's a new way to share files, and Jack Wallen thinks it could easily become your must-have file sharing tool. Send Anywhere is simple, fast, and ready to serve.

How To 68
article thumbnail

A Cat-and-Mouse Game

CTOvision

Katie Kennedy. When a company is breached, it is akin to obtaining a disease no one wants and no one wants to admit to having. With reputations and trust on the line, companies are hesitant to broadcast a breach. The Australian Crime Commission estimates that the annual cost of cyber crime to Australia is more than $1 billion in direct cost. Australian Prime Minister Malcolm Turnbull recently announced the government’s $230 million Cyber Security Strategy. “We need to pay more attent

article thumbnail

Yahoo Data Center Team Staying “Heads-Down” Amid Business Turmoil

Data Center Knowledge

Brings online latest $20 million data center expansion in Nebraska Read More.

article thumbnail

EMC announces LEAP suite of cloud-native apps and InfoArchive 4.0

Tech Republic Data Center

At the recent EMC World conference, the Federation announced a new set of enterprise content apps called LEAP, to help businesses solve their digital problems.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Top 50 Oracle SQL Blogs for 2016

Database Star

As someone who works with and blogs about Oracle, I like to read other Oracle blogs. I also noticed it was hard to find a good list of the top Oracle SQL blogs. So, I decided to make my own list. Top Oracle SQL Blogs I had found more than 50 Oracle SQL blogs, but wanted […].

Oracle 74
article thumbnail

Moving Toward a Framework for Resilient Cybersecurity: Evaluating the Threat Landscape

CTOvision

Dan Cybulski. In this previous post on The Need for a Framework for Resilient Cybersecurity we highlighted that the increasing diversity and sophistication of today's IT environments is driving a need for organizations to implement a framework for resilient cybersecurity. In this post we will focus on one of the critical components of this framework: Threat Intelligence.

Security 150
article thumbnail

Study: Containers Are Great, but Skilled Admins Are Scarce

Data Center Knowledge

Containers are useful in speeding development times, but there is a major lack of skilled workers capable of using them Read More.

Study 124
article thumbnail

5 major data center announcements from day one of EMC World 2016

Tech Republic Data Center

At the 2016 EMC World conference, EMC made a slew of announcements on new data center tech it was introducing. Here's a recap.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

High-tech moms: Tips for managing family life while steering booming businesses

ComputerWorld IT Management

Happy Mother's Day, Tech Moms! Image by Thinkstock To help celebrate Mother’s Day, we asked some successful and hard-charging entrepreneurs, who also happen to be moms, to share their insights into managing the many rigors of creating a startup company, all while juggling the daily challenges of parenting. They share how their work lives and home lives sometimes have balance – and sometimes not – and why a strong support network is sacred, and perfection is overrated.

Network 73
article thumbnail

Tech News Roundup May 2

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosyste. Technology Ticker. Why is the technology industry so afraid of tax? - Sydney Morning Herald. 'Sense Of Urgency' In Forming Next Government - 98FM. Tad Czyzewski Named Executive Director of The Choral Arts Society of Washington. Schumer urges federal investigation into billboard tracking - WGRZ.com.

article thumbnail

Scott Noteboom’s Data Center Startup LitBit Raises $7M

Data Center Knowledge

Unveils flagship product, a software platform for orchestrating connected devices Read More.

article thumbnail

ImageMagick users beware: Multiple vulnerabilities leave servers compromised

Tech Republic Security

The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.

62
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.