This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The evolution of agile development The agile manifesto was released in 2001 and, since then, the development philosophy has steadily gained over the previous waterfall style of software development. But things are going to get really interesting when agents start talking to each other, says Babak Hodjat, CTO of AI at Cognizant.
By Siva Sreeraman VP, CTO and Modernization Tribe Leader at Mphasis. Containerization originated in 2001 as a project that allowed several general-purpose Linux servers to run on a single box with autonomy and security. This technology has since been improved by Red Hat, IBM, and Docker. How we got here.
Altogether, SAP NS2 will deliver a valuable day of learning and networking to advance the mission and business performance of its customers. The 43rd President of the United States (2001-2009). Extending insight from the analyst workstation to the tactical edge via the cloud. Frances Townsend.
It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Cyberterrorism is the convergence of terrorism and cyberspace. This is absurd.
There were a number of excellent other speakers at the events, including Tennis Australia CIO Samir Mahir , Australian Government CTO John Sheridan , Forrester VP John Brand , IDC NZ country head Ullrich Loeffler , and head of Deakin University’s School of Information Systems Dineli Mather.
Yes, there can be a “neighborhood watch-like” network effect in sharing threat intelligence. But all of that sharing will be for naught if it doesn’t lead to some kind of effective action – across people, process, and technology. Analysis CTO Cyber Security endgame' Yes, our security is only as good as the data we have.
He remembers Microsoft’s chieftechnologyofficer at the time convincing him to join the company with quite possibly the nerdiest recruiting pitch ever — playing on Horvitz’s devotion back then to Bayesian Networks, graphical AI models that predated the deep neural networks that have fueled the recent generative AI boom. “My
Since about 2001, Egenera has been selling its high-end hardware/software combination that unified re-purposing of physical and virtual servers. PAN stood for Processing Area Network, akin to a SAN in its ability to logically re-allocate CPUs, and its ability to provide ultra-high reliability. Egenera PAN now available on Dell blades.
Just in case you want a "preview" of what Cisco is expected to announce on March 16th, you might want to compare their unified computing model to Egeneras Infrastructure Orchestration technology it has been shipping for about 7 years. It all sounds pretty familiar to what Vern Brownell conceived-of back in 2001.
That got him thinking about the ways he could use technology to improve work experiences for others by helping people engage with their colleagues. He perused his professional and personal network and realized that his childhood friend Chris Watts had made a tool that randomly matched people to connect for lunches.
The principle has been known as that of a "computing fabric," first conceived by Vern Brownell , the then-CTO of Goldman Sachs, and later productized by Egenera. Both of these technologies instantly resulted in additional hardware on the motherboard: The Network Interface Card (NIC) for connection to Ethernet, etc.,
I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Business minded, Agile CIO with strong Big Data, Business Intelligence, Search, and Social Networking background.
Yes, I needed to replatform my blog, but I also needed a web presence for my new fractional CTOing entity. In the end, I found a name that I think works well for both (ask me again in 5 years): Crafty CTO / craftycto.com for the entity, with the blog living at CraftyCTO.com/blog. Ghost and Squarespace are … CMSs.
million budget provides $2 million to support the City website www.seattle.gov which won the “Best Municipal Web Portal” award from the Center for Digital Government in 2001 and 2006 , $2.4 million to support a public safety radio network of over 5,000 radios which is up 99.999% of the time, and $3.4
The City of Seattle has multiple data centers, but our main one, constructed in 2001, has well over $15 million of stuff in it. Halloween seems like a perfect time to confront a few of our most frightful fears, and here are a few of mine. Or Fire followed by Water. In my data center. And about 500 mid-range servers.
The Mardi-Gras riots of 2001. And the one headline I’ve received in five years as CTO is about a botched e-mailing to 2000 cable television customers (which was, indeed, the fault of my department). for me, Government Technology Magazine , Network World, Computerworld) is considerably more positive.
Hence, if the higher government and industry estimates of the economic costs of data theft are correct, the US is suffering the economic equivalent of a 9/11/2001 terrorist attack every year. Even the lower estimates correspond to the total losses suffered by the City of New York in 2001. Regrettably this is already happening.
Aug 11 - " On the Naming and Binding of Network Destinations ", Saltzer, J. In Proceedings of the Eighteenth Symposium on Operating Systems Principles (SOSP-18), Banff, Canada, October, 2001. Nov 9 - Using Encryption for Authentication in Large Networks of Computers , Roger M. CTO - Amazon.com. RFC 1498, August 1993.
based game development shop, once part of the tech giant, drove the success of the original Xbox in 2001 with Halo: Combat Evolved. Next Tech Titan, presented by Stifel Winner: Flexe Deirdre Runnette, chief people officer/general counsel at Flexe, accepts the Next Tech Titan Award at the 2023 GeekWire Awards. The Bellevue-Wash.-based
Yet his life profoundly changed the direction of information technology as it is used in City, County, State and the Federal government. Indeed, my own life is vastly different than it would have been if the World Trade Center towers had not been destroyed on September 11, 2001. nuclear urine yellow) system. We are more vigilant.
in ML and neural networks) and access to vast amounts of data. Dharmesh Shah, HubSpot CTO and Founder, tells us that Amazon Lex enabled sophisticated natural language processing capabilities on GrowthBot to provide a more intuitive UI for customers.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content