2015

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it.

Why Accessibility Is A CIO’s New Responsibility

The Accidental Successful CIO

CIOs need to start to consider the needs of disabled workers Image Credit: Leo Reynolds. CIOs need to understand that the environment in which their company operates is changing. Two important things are happening at the same time. The first is that a lot of us are becoming older.

Cloud computing: A data-centric business model

Cloud Musings

According to the National Institute of Standards and Technology : “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

Dell 265

Thank the cloud for making big data and IoT possible

David Linthicum

I’ve sworn it off: No longer do I remind people younger than myself that many of today’s concepts we call new and innovative are based on much older concepts popular a long time ago -- when I was young. The ones that immediately come to mind are big data and Internet of things (IoT). Big data -- at least the notion of it -- was always the objective in the world of database technology.

The Amazing Oracle M7

Chuck's Blog - EMC

There was a time decades ago when I was intensely interested in CPU technology. RISC, CISC, all that. Endless debates about which one was "better", which one was going to win in the long term, etc. Well, we know how the story ended up for most of the datacenter market: it’s mostly an Intel world.

Oracle 285

Call to Action: Pounding the Table for Security Budgets

The Investing Edge

The vicious cyberattacks on major organizations like Target, Home Depot, eBay, JP Morgan Chase and recently, Anthem , makes one thing clear: the severity and sophistication of cyberattacks has taken a major leap forward.

Budget 201

More Trending

18 Steps for End-to-End IaaS Provisioning in the Cloud with Azure Resource Manager (ARM), PowerShell and Desired State Configuration (DSC)

IT Pros Rock!

Support for provisioning and managing Azure IaaS virtual machine environments via Azure Resource Manager (ARM) was recently launched as a Generally Available (GA) feature!

Does your Disaster Recovery Plan Include the Cloud?

Eric D. Brown

In years past, companies have relied on multiple data center locations to act as their main disaster recovery (DR) systems and data in case of disaster. This has generally worked well for those companies that have planned and tested their DR systems and plans appropriately.

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970

CTOvision

The list below is an update to our reference of "Cyber Security Wake-Up Calls." What does it take to be on the list? Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call.

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

By Matt Southmayd. Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness.

Big Data Comes To The Call Center

The Accidental Successful CIO

Call centers are a great place to start to use your big data tools Image Credit: King County, WA.

Security requires long haul planning

Cloud Musings

On Tuesday, October 6 th , the European Court of Justice (ECJ), invalidated the U.S./EU EU Safe Harbor Framework. This framework, in place since 2000, gave blanket permission to data transfers from the European Union to the United States.

3 tips to avoid disaster in your cloud migration

David Linthicum

Enterprises are migrating to the cloud in big ways these days. However, the number of moving parts leave many people in IT a bit perplexed -- and fearful that they could be making major mistakes. The reality is that cloud migration is new, so best practices and enabling technologies have yet to emerge. Moreover, there is the added complexity of devops, big data, and the Internet of things. How the heck do you fit those in too?

Devops 214

Ten Reasons Why VMware Is Leading The Hyperconverged Industry

Chuck's Blog - EMC

Those of you who have followed me over the years know that I’m not shy when it comes to a good competitive dust-up.    I’m OK with the usual puffery and slightly exaggerated claims.  All part of the fun. I’m not OK when I believe the claims are misleading.

Vmware 283

The Sony Hack in Context

CTOvision

By Chris Mellon. The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. The bad news is that neither the press nor the government is placing the Sony attack in context.

Yahoo Launches Second ‘Computing Coop’ Data Center in New York State

Data Center Knowledge

Company completes $170M data center and service center expansion project in Lockport Read More. Cooling Data Center Design Data Center Strategies Featured New York Yahoo

The President Speaks At Hadoop World: Introduces DJ Patil as Nation’s First Chief Data Scientist

CTOvision

By Bob Gourley. Data science history was made on 19 Feb 2015. For the first time in the history of Hadoop World, the President of the United States gave a keynote. Dwell on that for a bit. This is huge. No matter what your politics is, you really have to agree, this is huge.

Video 285

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

If you use Google Chrome , you could be subject to eavesdropping by Google. Similar to what Samsung's TVs are doing, the Chromium browser listens to conversations in the vicinity of your laptop, PC, or tablet, and transmits it back to Google.

Google 283

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking.

The Technology Related Content of the President’s State of the Union Address (software developers/coders mentioned for first time in any SOTU)

CTOvision

By Bob Gourley. The 2015 State of the Union address was full of technology related content. Here are key takeaways from the perspective of a CTO: The President showed respect for something many American''s may not have heard of, but you dear readers know very well: Coding!

The Wisdom Of Carl Sagan On Science, Government, and Even Enterprise IT and Digital Risk

CTOvision

Of course you know Carl Sagan the distinguished astronomer and great explainer of science via best selling books and the TV series Cosmos. One of his last interviews was conducted by Charlie Rose in May 1996.

CIOs Need To Know How To Build Bridges

The Accidental Successful CIO

You’ll need a bridge to move from providing a service to being a partnerbr /> Image Credit: JOHN LLOYD. So here’s a question for you: based on the importance of information technology, what is IT’s role in your company?

How To 227

“Cloud First” Lesson’s Learned from ViON

Cloud Musings

In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1].

Cloud 253

IoT standards must start in the cloud

David Linthicum

In the next five years, our homes will have lots of devices connected to cloud services: thermostats, security systems, refrigerators, washers, dryers, coffeemakers, cars, TVs, set-top-boxes, doorbells, light switches. you name it. All the Internet of things devices will communicate with different cloud systems for data storage, compute services, and software updates. Our homes may suffer from a level of cloud complexity to rival that of smaller enterprises.

Cloud 212

Dell and EMC -- The Aftermath

Chuck's Blog - EMC

So much has been written about the tech industry's largest buyout -- a mind-numbing $67 billion. It's been exactly one week since the announcement -- just enough time for me to get my thoughts in order. 19 years at EMC, two years at VMware -- yes, I'm entitled to an opinion or two.

Dell 276

The Megatrend of Cloud Computing: An update for technology decision-makers

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity.

How Cloud Has Changed the Data Center Architect

Data Center Knowledge

The data center architect supports some of the most critical business functions of an organization. Here''s how the role has evolved with the advent of cloud. Read More. Cloud Computing Data Center Design cloud data center

NGA and DigitalGlobe Release Powerful Application To Community Under Open Source License

CTOvision

By Bob Gourley. Never doubt that a small group of thoughtful, committed, citizens can change the world. Indeed, it is the only thing that ever has.”. ? Margaret Mead.

What Is The Difference Between Data Governance and Big Data Governance?

CTOvision

The video at this link and embedded below starts with a great question: What is the difference between data governance and big data governance? Well we all know that the theory should be that there should be no difference.