Choose Your Own Adventure: Data Center World Workshops

Data Center Knowledge

Which workshops would you like to see at the next Data Center World? Cast your vote now. Read More. Data Center World

Free 5 Feb Workshop Explores Using Sharepoint to Bridge the Gap Between Policy and Technology


By Charles Hall. As technology executives, we''re often challenged with managing policy requirements and keeping up with technology to support them, while working with limited budgets and a shallow pool of qualified staff.

Trending Sources

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC


The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. By Bob Gourley.

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA


TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs. By Bob Gourley. If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals.

NIST To Hold 2nd Cloud Computing Forum & Workshop

Cloud Musings

NIST To Hold 2nd Cloud Computing Forum & Workshop. On November 4-5, 2010, the National Institute of Standards and Technology (NIST) will hold their second Cloud Computing Forum & Workshop. Workshop goals include: Public Announcement and initiation of the strategy to develop a Cloud Computing Roadmap. NIST To Hold 2nd Cloud Computing Forum & Workshop. Cloud Musings by Kevin L. Jackson.

Barnsley Council maximises adoption of mobile apps though staff consultation

Computer Weekly

Barnsley Metropolitan Borough Council is rolling out SAP Fiori apps in HR initially, and learning how to adapt to user needs from surgeries and workshops

SAP 46

2016 Going Dutch Cloud Virtualization Server Storage I/O Seminars

Storage IO Blog

There will be 4 seminar workshop sessions, two of those are paid sessions dedicated to Greg Schulz and the other two are free (sponsored) sessions where 50% of the content is sponsored (Reduxio, Fujitsu & SJ Solutions) and the other 50% will be independent (Greg Schulz & Gert Brouwer).

Data 11

European agencies seek to bolster co-operation on cyber crime

Computer Weekly

Fifth annual joint workshop seeks to foster better co-operation between national cyber incident response teams and law enforcement agencies to establish a network to discuss topics of mutual interest

5 reasons to attend Data Natives 2017


Data Natives 2017 is just a couple weeks away, and we have never had this many industry-altering speakers, workshops and networking opportunities. We have liftoff!

Thwarting the Risk of Malicious Attacks on Medical Devices


A group of volunteers with an extensive range of backgrounds convened for a two day workshop in New Orleans. From the workshop, authors Tom Haigh and Carl Landwehr created this report "Building Code for Medical Device Software Security." The report highlights the mature elements discussed during the two day workshop, as well as refined research topics. Wearers and users of medical devices may not be aware of their risk of having their device hacked.

5-6 May 2014 Global Supply Chain Risk Assessment: A joint MORS/SARMA Workshop


Please join us for a two day workshop Global Supply Chain Risk Assessment on Monday and Tuesday 5 & 6 May 2014. The workshop will engage the communities surrounding these problems and include the DoD Acquisition, Intelligence, and Homeland Security Communities as well as those interested in risk analytics applied to securing US infrastructure from attack, whether kinetic or cyber.

Networking & Outreach Workshop - CIO Musings

CIO Musings

Networking & Outreach Workshop. The Greater Richmond Technology Council, in partnership with First Market Bank, Interbake Foods and Mondial Assistance will host a Networking & Outreach Workshop (TechN.O.W.) CIO Musings - Life as a Public Sector CIO. A blog about things that interest me as a Chief Information Officer (CIO) working for a local government. Primarily focused on technology, leadership and some of my recreational pursuits. Follow me on twitter at @BarryCondrey Enjoy!

Management is the key to effective cloud deployment

David Linthicum

Typically, cloud management is the last topic of the day when I do a cloud workshop for IT pros. After sessions on big data migration and cloud bursting, eyes often roll when I move to the subject of cloud management. Most participants believe either that cloud-management features come as a part of a public cloud package or it''s automatic. Neither is true. The truth is public cloud management should be decoupled from any specific public cloud provider.

Inspiring crazy loyalty: A leadership workshop

ComputerWorld IT Management

Chris Laping, author and former Red Robin CIO, discusses the challenges of being a change agent and in leading the charge through digital business transformation. He offers practical advice to help CIOs enable the right conditions to coach their workers and inspire behaviors that will activate successful change throughout their organizations

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative


Wednesday, August 5th, join FireMon at Black Hat for their sponsored workshop. There are four workshop times: 10:00 am, 11:30 am, 1:50 pm and 3:00 pm. This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. The workshop will include a live demonstration and a chance to take a test drive.

For Java Developers: Sign up for two hour Enterprise Ehcache workshop in DC 7 Nov


This two hour workshop is a great way to accelerate your own technical understanding of this topic and that in return can help your agency better accomplish its mission. Choose from two workshop sessions: Morning: 9:00am–11:00am or Afternoon: 1:00pm–3:00pm. By Bob Gourley If you are going to be in DC 7 Nov and are a technologist that fields solutions into federal agencies here is a great opportunity to dive into the in-memory capabilities of Enterprise Ehcache.

The Influential CIO Workshop

Lundberg Media

Here’s an excerpt from my Persuasive Communication and Influence workshop. Read my article based on this workshop here. Influence: the act or power of producing an effect without apparent exertion of force or direct exercise of command. For most CIOs and their teams, this is the only way to get things done. Do you need to increase […].

Data Natives X India: Interview with Vikramank Singh from Facebook


With the event just around the corner and so many incredible speakers to see, we took the time to talk with one of our workshop heads, Vikramank Singh about his experience as a.

Agenda Announced For June 6-8 Global Connected Aircraft Summit


A workshop on customer experience mapping. Even more networking time during receptions, coffee breaks, workshops during sessions, breakfasts and beyond. Bob Gourley.

Tweets from Gartner Symposium 2012 - Social, Agile, and.

Social, Agile and Transformation

I went to several CIO workshops, round tables, and analyst presentations covering innovation, CIO leadership, big data, analytics, and financial management. Social, Agile, and Transformation. I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 and business transformation. Saturday, October 27, 2012.

IDG Contributor Network: The new branch office SD-WAN model

Network World

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts: 1. Public cloud is driving a lightweight edge security model.

WAN 27

ID Card Maker


With built in powerful multi-layer ID card designer, various templates and samples available, and more, ID Card Workshop enables you to create ID cards, employee badges, membership cards, loyalty cards, VIP cards, and more for your business. ID Card Workshop is here to meet all of your needs.

Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON

Network World

A month after the conference ended, the results are in: 47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests. Smart door locks, padlocks, thermostats, refrigerators, wheelchairs and even solar panel arrays were among the internet-of-things devices that fell to hackers during the IoT Village held at the DEF CON security conference in August.

Analytics 2014: Insights For Mission Impact


Interested in sponsorship opportunities for this workshop? By Bob Gourley. We are partnering with the highly regarded community-focused United States Geospatial Intelligence Foundation (USGIF) to coordinate this event.

The Future Cheetah


Harvard & MIT Workshops To Probe Cryptoledger Technology ( By Katie Kennedy. MIT has created a robotic cheetah that has the ability to run and jump like a real animal.

Much ado about the ransomware scourge

Network World

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files.

Back-to-Basics Weekend Reading - Bloom Filters

All Things Distributed

in Demetrescu, Camil, Experimental Algorithms, 6th International Workshop, WEA 200 Listening to the " Algorithms to Live By " audio on my commute this morning, once again I was struck by the beauty of Bloom Filters.

Join Women in Cybersecurity This Week in Dallas


The conference includes keynote presentations, workshops, poster competitions, mentoring sessions and a career fair. Katie Kennedy. Women in Cybersecurity (WiCyS) is hosting its third annual Women in Cybersecurity event on March 31 through April 2 at the Hyatt Regency DFW International Airport. WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry.

Adobe 86

Fed Tech Roundup November 9th


SAVE THE DATE: USGIF to Host SmallSats Workshop, Nov. The following are some of the hot topics in the federal technology ecosystem (from and ): Fed Tech Ticker. GE Unveils Dubai-Based Aviation Tech Support Hub; Jim Daily Comments. SAVE THE DATE: 2015 Technology “Good Scout” Award Luncheon, Nov. Amyx, Inc. Promotes Allen Ashourian, Paul Regazzi and Bill Cummings. Aerojet Rocketdyne’s Marvin Young Joins Air Force Scientific Advisory Board.

Tech News Roundup May 20


University of Washington will host first-ever White House workshop on artificial intelligence. Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Viv, Your Personal Assistant. Cooper Standard Adds Former General Dynamics Exec Sonya Sepahban to Board of Directors. 2016 FCW Rising Star Awards Call for Nominations Now Open - Press Release Rocket.

Announcing People + Data Digest !


Kord is a recognized expert on data ethics and a frequent speaker, author and workshop facilitator on data topics. By Kord Davis. Our world is awash in data and information about it. And the impact to our individual lives is increasing every day.

Women in Cybersecurity: Reducing the Gender Gap Part I


The conference began with workshops with women professionals in the cybersecurity workforce. Katie Kennedy. This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31 st through April 2 nd , women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference.

The Influential CIO

Lundberg Media

This article is based on my Persuasive Communication and Influence workshop. The CIO role spans and must influence all parts of an organization without directly controlling them. Today’s trends — global, mobile, data-driven virtual business — increase the stakes and make CIO influence not only important for the CIO’s personal success but for the success […]. Change Management CIO Communication Leadership business technology change influence persuasion