2015

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it.

Why Accessibility Is A CIO’s New Responsibility

The Accidental Successful CIO

CIOs need to start to consider the needs of disabled workers Image Credit: Leo Reynolds. CIOs need to understand that the environment in which their company operates is changing. Two important things are happening at the same time. The first is that a lot of us are becoming older.

Cloud computing: A data-centric business model

Cloud Musings

According to the National Institute of Standards and Technology : “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

Dell 265

7 common mistakes in Go (2015)

SPF13

Given at GopherFest 2015. This is an updated version of the talk I gave in NYC Nov 14 at GothamGo. “We We need to think about failure differently. Most people think mistakes are a necessary evil. Mistakes aren’t a necessary evil, they aren’t evil at all.

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Thank the cloud for making big data and IoT possible

David Linthicum

I’ve sworn it off: No longer do I remind people younger than myself that many of today’s concepts we call new and innovative are based on much older concepts popular a long time ago -- when I was young. The ones that immediately come to mind are big data and Internet of things (IoT). Big data -- at least the notion of it -- was always the objective in the world of database technology.

More Trending

Call to Action: Pounding the Table for Security Budgets

The Investing Edge

The vicious cyberattacks on major organizations like Target, Home Depot, eBay, JP Morgan Chase and recently, Anthem , makes one thing clear: the severity and sophistication of cyberattacks has taken a major leap forward.

Budget 201

Compass Piloting Wearable Technology In The Data Center

Data Center Knowledge

The futuristic pilot project combines mobile and wearable technology for smooth data center operation Read More. Compass Datacenters Featured Internet of Things

18 Steps for End-to-End IaaS Provisioning in the Cloud with Azure Resource Manager (ARM), PowerShell and Desired State Configuration (DSC)

IT Pros Rock!

Support for provisioning and managing Azure IaaS virtual machine environments via Azure Resource Manager (ARM) was recently launched as a Generally Available (GA) feature!

Does your Disaster Recovery Plan Include the Cloud?

Eric D. Brown

In years past, companies have relied on multiple data center locations to act as their main disaster recovery (DR) systems and data in case of disaster. This has generally worked well for those companies that have planned and tested their DR systems and plans appropriately.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970

CTOvision

The list below is an update to our reference of "Cyber Security Wake-Up Calls." What does it take to be on the list? Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call.

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts.

Big Data Comes To The Call Center

The Accidental Successful CIO

Call centers are a great place to start to use your big data tools Image Credit: King County, WA.

Security requires long haul planning

Cloud Musings

On Tuesday, October 6 th , the European Court of Justice (ECJ), invalidated the U.S./EU EU Safe Harbor Framework. This framework, in place since 2000, gave blanket permission to data transfers from the European Union to the United States.

Dell 255

the future of the Operating System - LinuxCon 2015 keynote

SPF13

Given as a keynote at LinuxCon + CloudOpen Japan 2015. Linux has become the foundation for infrastructure everywhere as it defined application portability from the desktop to the phone and from to the data center to the cloud. As applications become increasingly distributed in nature, the Docker platform serves as the cornerstone of Linux’s evolution solidifying the dominance of Linux today and into tomorrow. Transcript. The Future of the Operating System. What is an Operating System ?

3 tips to avoid disaster in your cloud migration

David Linthicum

Enterprises are migrating to the cloud in big ways these days. However, the number of moving parts leave many people in IT a bit perplexed -- and fearful that they could be making major mistakes. The reality is that cloud migration is new, so best practices and enabling technologies have yet to emerge. Moreover, there is the added complexity of devops, big data, and the Internet of things. How the heck do you fit those in too?

Devops 215

Ten Reasons Why VMware Is Leading The Hyperconverged Industry

Chuck's Blog - EMC

Those of you who have followed me over the years know that I’m not shy when it comes to a good competitive dust-up.    I’m OK with the usual puffery and slightly exaggerated claims.  All part of the fun. I’m not OK when I believe the claims are misleading.

Vmware 283

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

By Matt Southmayd. Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Numerous recent incidents have heightened awareness of and sensitivity to this risk, and have made it even more critical that they assess their cyber readiness.

Yahoo Launches Second ‘Computing Coop’ Data Center in New York State

Data Center Knowledge

Company completes $170M data center and service center expansion project in Lockport Read More. Cooling Data Center Design Data Center Strategies Featured New York Yahoo

The Sony Hack in Context

CTOvision

By Chris Mellon. The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. The bad news is that neither the press nor the government is placing the Sony attack in context.

The President Speaks At Hadoop World: Introduces DJ Patil as Nation’s First Chief Data Scientist

CTOvision

By Bob Gourley. Data science history was made on 19 Feb 2015. For the first time in the history of Hadoop World, the President of the United States gave a keynote. Dwell on that for a bit. This is huge. No matter what your politics is, you really have to agree, this is huge.

Video 285

Google, like Samsung, is eavesdropping on your private conversations

CTOvision

If you use Google Chrome , you could be subject to eavesdropping by Google. Similar to what Samsung's TVs are doing, the Chromium browser listens to conversations in the vicinity of your laptop, PC, or tablet, and transmits it back to Google.

Google 283

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking.

CIOs Need To Know How To Build Bridges

The Accidental Successful CIO

You’ll need a bridge to move from providing a service to being a partnerbr /> Image Credit: JOHN LLOYD. So here’s a question for you: based on the importance of information technology, what is IT’s role in your company?

How To 227

SAP/HANA Does Big Data for National Security

Cloud Musings

Carmen Krueger, SAP NS2 SVP & GM While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence.

SAP 254

how to be a good open source community member

SPF13

A friend of mine who is a very talented writer recently became intrigued with open source and asked me to help her to understand how to be a good open source community member. Open source is one of the most unusual things in the world. Is there any other profession where highly skilled professionals donate their free time to give their work away for free? Many spend long hours at their day jobs, just to spend their nights and weekends doing the same thing.

3 ways to screw up a cloud deployment

David Linthicum

Most enterprises do not have the experience or talent to effectively take advantage of private or public cloud resources, so adoption is a trial-and-error process. Even if you use case studies from other enterprises with similar problem domains, you'll still run into issues that are unique to your enterprise, including problems with data integration, governance, and poor application design. From Amazon to Azure, InfoWorld puts IaaS clouds to the test to find out which is best for you.

Dell and EMC -- The Aftermath

Chuck's Blog - EMC

So much has been written about the tech industry's largest buyout -- a mind-numbing $67 billion. It's been exactly one week since the announcement -- just enough time for me to get my thoughts in order. 19 years at EMC, two years at VMware -- yes, I'm entitled to an opinion or two.

Dell 276

The Technology Related Content of the President’s State of the Union Address (software developers/coders mentioned for first time in any SOTU)

CTOvision

By Bob Gourley. The 2015 State of the Union address was full of technology related content. Here are key takeaways from the perspective of a CTO: The President showed respect for something many American''s may not have heard of, but you dear readers know very well: Coding!

How Cloud Has Changed the Data Center Architect

Data Center Knowledge

The data center architect supports some of the most critical business functions of an organization. Here''s how the role has evolved with the advent of cloud. Read More. Cloud Computing Data Center Design cloud data center