Choose Your Own Adventure: Data Center World Workshops

Data Center Knowledge

Which workshops would you like to see at the next Data Center World? Cast your vote now. Read More. Data Center World

Free 5 Feb Workshop Explores Using Sharepoint to Bridge the Gap Between Policy and Technology


By Charles Hall. As technology executives, we''re often challenged with managing policy requirements and keeping up with technology to support them, while working with limited budgets and a shallow pool of qualified staff.

Trending Sources

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC


The 2014 Trusted Cyber Collaboration Workshop is being held 24-26 Sep in DC. TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. By Bob Gourley.

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA


TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs. By Bob Gourley. If you are or have been involved in enterprise grade cyber security you know the importance of collaboration among trusted teams of professionals.

Hotel booking site Trivago powers collaboration with Dropbox

Computer Weekly

A Slack group and a workshop day helped Trivago deploy Dropbox for Business to 1300 users

How the public sector can use AI to streamline digital services

Computer Weekly

A recent Capita workshop explored the impact of this and other emerging technologyChatbots have the potential to reduce the load on contact centres.


Thwarting the Risk of Malicious Attacks on Medical Devices


A group of volunteers with an extensive range of backgrounds convened for a two day workshop in New Orleans. From the workshop, authors Tom Haigh and Carl Landwehr created this report "Building Code for Medical Device Software Security." The report highlights the mature elements discussed during the two day workshop, as well as refined research topics. Wearers and users of medical devices may not be aware of their risk of having their device hacked.

5-6 May 2014 Global Supply Chain Risk Assessment: A joint MORS/SARMA Workshop


Please join us for a two day workshop Global Supply Chain Risk Assessment on Monday and Tuesday 5 & 6 May 2014. The workshop will engage the communities surrounding these problems and include the DoD Acquisition, Intelligence, and Homeland Security Communities as well as those interested in risk analytics applied to securing US infrastructure from attack, whether kinetic or cyber.

Networking & Outreach Workshop - CIO Musings

CIO Musings

Networking & Outreach Workshop. The Greater Richmond Technology Council, in partnership with First Market Bank, Interbake Foods and Mondial Assistance will host a Networking & Outreach Workshop (TechN.O.W.) CIO Musings - Life as a Public Sector CIO. A blog about things that interest me as a Chief Information Officer (CIO) working for a local government. Primarily focused on technology, leadership and some of my recreational pursuits. Follow me on twitter at @BarryCondrey Enjoy!

Barnsley Council maximises adoption of mobile apps though staff consultation

Computer Weekly

Barnsley Metropolitan Borough Council is rolling out SAP Fiori apps in HR initially, and learning how to adapt to user needs from surgeries and workshops

SAP 17

Inspiring crazy loyalty: A leadership workshop

ComputerWorld IT Management

Chris Laping, author and former Red Robin CIO, discusses the challenges of being a change agent and in leading the charge through digital business transformation. He offers practical advice to help CIOs enable the right conditions to coach their workers and inspire behaviors that will activate successful change throughout their organizations

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative


Wednesday, August 5th, join FireMon at Black Hat for their sponsored workshop. There are four workshop times: 10:00 am, 11:30 am, 1:50 pm and 3:00 pm. This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. The workshop will include a live demonstration and a chance to take a test drive.

European agencies seek to bolster co-operation on cyber crime

Computer Weekly

Fifth annual joint workshop seeks to foster better co-operation between national cyber incident response teams and law enforcement agencies to establish a network to discuss topics of mutual interest

For Java Developers: Sign up for two hour Enterprise Ehcache workshop in DC 7 Nov


This two hour workshop is a great way to accelerate your own technical understanding of this topic and that in return can help your agency better accomplish its mission. Choose from two workshop sessions: Morning: 9:00am–11:00am or Afternoon: 1:00pm–3:00pm. By Bob Gourley If you are going to be in DC 7 Nov and are a technologist that fields solutions into federal agencies here is a great opportunity to dive into the in-memory capabilities of Enterprise Ehcache.

The Influential CIO Workshop

Lundberg Media

Here’s an excerpt from my Persuasive Communication and Influence workshop. Read my article based on this workshop here. Influence: the act or power of producing an effect without apparent exertion of force or direct exercise of command. For most CIOs and their teams, this is the only way to get things done. Do you need to increase […].

Agenda Announced For June 6-8 Global Connected Aircraft Summit


A workshop on customer experience mapping. Even more networking time during receptions, coffee breaks, workshops during sessions, breakfasts and beyond. Bob Gourley.

IDG Contributor Network: The new branch office SD-WAN model

Network World

Wrapping up an SD-WAN workshop session with a client last week, I reflected on how rapidly the branch office WAN connectivity and management model is changing. Some great opportunities are emerging for enterprise IT teams that can materially impact how the network is designed, paid for and managed. Here are some thoughts: 1. Public cloud is driving a lightweight edge security model.

WAN 27

ID Card Maker


With built in powerful multi-layer ID card designer, various templates and samples available, and more, ID Card Workshop enables you to create ID cards, employee badges, membership cards, loyalty cards, VIP cards, and more for your business. ID Card Workshop is here to meet all of your needs.

Management is the key to effective cloud deployment

David Linthicum

Typically, cloud management is the last topic of the day when I do a cloud workshop for IT pros. After sessions on big data migration and cloud bursting, eyes often roll when I move to the subject of cloud management. Most participants believe either that cloud-management features come as a part of a public cloud package or it''s automatic. Neither is true. The truth is public cloud management should be decoupled from any specific public cloud provider.

Back-to-Basics Weekend Reading - Bloom Filters

All Things Distributed

in Demetrescu, Camil, Experimental Algorithms, 6th International Workshop, WEA 200 Listening to the " Algorithms to Live By " audio on my commute this morning, once again I was struck by the beauty of Bloom Filters.

Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON

Network World

A month after the conference ended, the results are in: 47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests. Smart door locks, padlocks, thermostats, refrigerators, wheelchairs and even solar panel arrays were among the internet-of-things devices that fell to hackers during the IoT Village held at the DEF CON security conference in August.

Much ado about the ransomware scourge

Network World

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files.

Analytics 2014: Insights For Mission Impact


Interested in sponsorship opportunities for this workshop? By Bob Gourley. We are partnering with the highly regarded community-focused United States Geospatial Intelligence Foundation (USGIF) to coordinate this event.

The Future Cheetah


Harvard & MIT Workshops To Probe Cryptoledger Technology ( By Katie Kennedy. MIT has created a robotic cheetah that has the ability to run and jump like a real animal.

Join Women in Cybersecurity This Week in Dallas


The conference includes keynote presentations, workshops, poster competitions, mentoring sessions and a career fair. Katie Kennedy. Women in Cybersecurity (WiCyS) is hosting its third annual Women in Cybersecurity event on March 31 through April 2 at the Hyatt Regency DFW International Airport. WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry.

Adobe 86

Fed Tech Roundup November 9th


SAVE THE DATE: USGIF to Host SmallSats Workshop, Nov. The following are some of the hot topics in the federal technology ecosystem (from and ): Fed Tech Ticker. GE Unveils Dubai-Based Aviation Tech Support Hub; Jim Daily Comments. SAVE THE DATE: 2015 Technology “Good Scout” Award Luncheon, Nov. Amyx, Inc. Promotes Allen Ashourian, Paul Regazzi and Bill Cummings. Aerojet Rocketdyne’s Marvin Young Joins Air Force Scientific Advisory Board.

Tech News Roundup May 20


University of Washington will host first-ever White House workshop on artificial intelligence. Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Viv, Your Personal Assistant. Cooper Standard Adds Former General Dynamics Exec Sonya Sepahban to Board of Directors. 2016 FCW Rising Star Awards Call for Nominations Now Open - Press Release Rocket.

Tweets from Gartner Symposium 2012 - Social, Agile, and.

Social, Agile and Transformation

I went to several CIO workshops, round tables, and analyst presentations covering innovation, CIO leadership, big data, analytics, and financial management. Social, Agile, and Transformation. I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 and business transformation. Saturday, October 27, 2012.

Announcing People + Data Digest !


Kord is a recognized expert on data ethics and a frequent speaker, author and workshop facilitator on data topics. By Kord Davis. Our world is awash in data and information about it. And the impact to our individual lives is increasing every day.

Women in Cybersecurity: Reducing the Gender Gap Part I


The conference began with workshops with women professionals in the cybersecurity workforce. Katie Kennedy. This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31 st through April 2 nd , women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference.

The Influential CIO

Lundberg Media

This article is based on my Persuasive Communication and Influence workshop. The CIO role spans and must influence all parts of an organization without directly controlling them. Today’s trends — global, mobile, data-driven virtual business — increase the stakes and make CIO influence not only important for the CIO’s personal success but for the success […]. Change Management CIO Communication Leadership business technology change influence persuasion

Cloud Musings by Kevin L. Jackson: NJVC® Cloud Computing.

Cloud Musings

NJVC® Cloud Computing Expert Kevin Jackson to Speak at NIST Cloud Computing Forum & Workshop IV on Nov. Department of Defense (DoD) , is pleased to announce that Kevin Jackson, general manager, cloud services, will participate in the “Security Assumption Buster Panel” during the National Institute of Standards and Technology (NIST) Cloud Computing Forum & Workshop IV on Nov. This workshop will provide information on the U.S. Cloud Musings by Kevin L.

Cloud Musings by Kevin L. Jackson: Bahrain International.

Cloud Musings

Planned workshops include: ICT and Entrepreneurship. The workshop will also address the importance of ICT orientation and development in businesses through selective case studies and bring up critical factors affecting the growth of business enterprises in general.