May, 2015

article thumbnail

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet itself.

Security 289
article thumbnail

Compass Piloting Wearable Technology In The Data Center

Data Center Knowledge

The futuristic pilot project combines mobile and wearable technology for smooth data center operation Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

4 Reasons Why Citizen Developers May Be The Next Big Thing in Application Development

Social, Agile and Transformation

I must be behind the times because last week was the first time I heard the term "Citizen Developer", a term Gartner defines as a user who creates new business applications for consumption by others using. development and runtime environments sanctioned by corporate IT. They are referring to a business user and not a software developer in IT, and are careful to distinguish this from Rogue-IT.

article thumbnail

7 common mistakes in Go (2015)

SPF13

Given at GopherFest 2015. This is an updated version of the talk I gave in NYC Nov 14 at GothamGo. “We need to think about failure differently. Most people think mistakes are a necessary evil. Mistakes aren’t a necessary evil, they aren’t evil at all. They are an inevitable consequence of doing something new and as such should be seen as valuable. “ - Ed Catmull.

Examples 204
article thumbnail

Activating Intent Data for Sales and Marketing

Sales and marketing leaders have reached a tipping point when it comes to using intent data — and they’re not looking back. More than half of all B2B marketers are already using intent data to increase sales, and Gartner predicts this figure will grow to 70 percent. The reason is clear: intent can provide you with massive amounts of data that reveal sales opportunities earlier than ever before.

article thumbnail

Do You Know How To Do Strategic Planning CIO?

The Accidental Successful CIO

CIOs need to know how to go about creating a strategic plan for their company Image Credit: Kyle Van Horn. If you ask any CIO to participate in creating a strategic plan for his or her company, you’ll probably see their eyes light up. This is what they live for – getting a seat at the big table to help chart the course of the company. We all believe that we deserve this position because of the importance of information technology.

How To 175
article thumbnail

The most critical skill?

Eric D. Brown

I’m an avid reader. I tend to read a few books at a time (I read one depending on my ‘mood’ at the time). The other day, I was scrolling through the various sections in Amazon’s Kindle Unlimited program and somehow ended up in the ‘self-help’ section. Now, I’m not a fan of self-help books because they tend to try to tell people that they can follow a ‘recipe’ and then they’ll be ‘all better.’ Life doesn’t work this

Groups 153

More Trending

article thumbnail

CoreOS Gives Up Control of Non-Docker Linux Container Standard

Data Center Knowledge

Creates foundation, secures support from Google, VMware, and Red Hat Read More.

Linux 219
article thumbnail

33 Bad Behaviors of Agile Developers and IT Operations

Social, Agile and Transformation

I recently published 20 Bad Behaviors of Agile Product Owners and decided not to leave this subject one sided. In trying to improve the organizational culture and more specifically, the culture in IT, the CIO and IT leadership must consider, review, and improve on its own behaviors. So this week I'm itemizing some of the bad behaviors in IT. Like my previous most, I haven't seen these.

Agile 194
article thumbnail

SAP/HANA Does Big Data for National Security

Cloud Musings

Carmen Krueger, SAP NS2 SVP & GM While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestine marketplace. SAP National Security Services, Inc.™ (SAP NS2™) is an independent U.S. subsidiary of the company and offers a full suite of SAP enterprise applications, analytic

SAP 137
article thumbnail

To Be Successful, CIOs Need To Implement Simplicity

The Accidental Successful CIO

Complexity Is Something That IT Can Do Without Image Credit: nerovivo. I don’t know about you, but whenever I see something that looks complicated, I am impressed. I mean, somebody took the time to make that and so based on the importance of information technology it must do something complicated very well. Well, it turns out that I’m wrong.

article thumbnail

GEP Outlook Report 2025

For years, you and your team have fought an uphill battle. Supply disruptions. Cost pressures. ESG compliance. You name it, and you’ve had to navigate it. In 2025, many challenges will persist, but procurement and supply chain teams have a powerful tool with rapidly advancing capabilities to tackle them — artificial intelligence (AI). The GEP Outlook 2025 report examines the disruptive transformation AI is driving in procurement and supply chains, alongside other key trends and the macroeconomic

article thumbnail

Innovation needs process change

Eric D. Brown

Jeffrey Philips currently wrote a nice piece titled “ Innovate your processes before innovating your products ” over on his excellent Innovate on Purpose blog. In that article, Jeffrey argues that before a company can innovate its products/services, it must innovate its processes if it hopes to build a sustainable edge via innovation over its competition.

Groups 144
article thumbnail

Thwarting the Risk of Malicious Attacks on Medical Devices

CTOvision

Wearers and users of medical devices may not be aware of their risk of having their device hacked. The software used to operate medical devices is vulnerable to malicious attacks. According to one recent report in particular, the attacks might: impede or alter a device’s function, leak sensitive data, or otherwise cause the device to depart from its specified behavior.

Software 265
article thumbnail

Amazon Piloting Tesla Batteries to Power Cloud Data Center

Data Center Knowledge

Publicly committed to 100-percent-renewable operations, company says energy storage helps use more renewable energy, improve reliability Read More.

article thumbnail

Transforming Technology Organizations By Investing in Culture and Practices

Social, Agile and Transformation

Should IT only be a services organization to the Business? Should it only provide a services catalog around incidents and requests and a PMO to oversee projects when required? Will perfecting service levels and project execution be good enough for the Business to compete when innovation and data driven practices are so critical for competitiveness? Will IT be able to consider optimal solutions.

Data 186
article thumbnail

4 HR Priorities for 2025 to Supercharge Your Employee Experience

Speaker: Carolyn Clark and Miriam Connaughton

Forget predictions, let’s focus on priorities for the year and explore how to supercharge your employee experience. Join Miriam Connaughton and Carolyn Clark as they discuss key HR trends for 2025—and how to turn them into actionable strategies for your organization. In this dynamic webinar, our esteemed speakers will share expert insights and practical tips to help your employee experience adapt and thrive.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. They include: Public cloud is more easily breached that a private cloud Any infrastructure that you manage or own is more secure than any cloud computing infrastructure Cloud-hosted applications are technically no different than enterprise-hosted

Industry 128
article thumbnail

Back-to-Basics Weekend Reading - Survey of Local Algorithms

All Things Distributed

As we know the run time of most algorithms increases when the input set increases in size. There is one noticeable exception: there is a class of distributed algorithms, dubbed local algorithms, that run in constant time, independently of the size of the network. Being highly scalable and fault tolerant, such algorithms are ideal in the operation of large-scale distributed systems.

Survey 92
article thumbnail

…and then what?

Eric D. Brown

I just finished reading a great article titled “ The Most Important Question You Can Ask: Then What? ” In the article, the author writes: The great art of life is in balancing the short term and the long term, so that one can have enjoyment with integrity – pleasure with purpose. But in most areas of life, we pay strict attention to the immediate consequences of things.

Groups 141
article thumbnail

Complying With Health Insurance Portability and Accountability Act (HIPAA) Security Rules

CTOvision

HIPAA was enacted in 1996, and by April 2005 security standards were required to be in place for most covered entities. In 2013 key portions of this law were updated. This post provides an overview of key elements we believe security and technology professionals (and most citizens) should be tracking. The technology and security communities focus largely on Title II of HIPAA, which provides changes to the law designed to reduce health care fraud and abuse while protecting privacy and enhancing s

Insurance 248
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Liquid Web Names Former Cbeyond Head CEO, Receives Investment from Madison Dearborn Partners

Data Center Knowledge

Liquid Web has not disclosed the financial details of the investment but says the Chicago-based private equity firm has provided a “substantial investment” in the company. Read More.

Financial 217
article thumbnail

Agile Culture - Are You Developing Solutions or Solving for Business Opportunities?

Social, Agile and Transformation

Here is the hardest problem for a performing agile development team - Can you build me something that does A, B, and C for Users X and Y and have it completed within the next couple of weeks What is the problem with this form of requirement? Many of you might start with the obvious that you need more details around A, B, and C to gain a shared understanding with the product owner or.

Agile 156
article thumbnail

The Science and Art of Business Leadership

Cloud Musings

Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of business is best learned from real practitioners. That is why I jumped at the chance to meet Dimension Data ’s Steve Nola during the company’s analyst event, Perspectives 2015, in Prague, Czech Republic.

Cloud 128
article thumbnail

Getting Back to Basics

A CIO's Voice

As a CIO, I rarely if ever do basic technology troubleshooting. Not because I don’t want too, but my staff usually discourages me from touching things these days. Yesterday was an usually slow day for me. So I decided to catch up on some personal housekeeping and organizing. So I decided to move my computer and to relocate to a new jack which was not lit.

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Foto Friday – Towhee at the Water Fountain

Eric D. Brown

While visiting the Palo Duro Canyon in near Amarillo TX, we found a nice little secluded bird blind. After sitting there a few minutes, this Towhee jumped out of the brush and began to take a bath. This is my first capture of a Towhee. Captured with Canon 7D Mark II and Canon 100-400 L Mark II handheld.

136
136
article thumbnail

Cybersecurity Standards and Your Enterprise

CTOvision

As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity. We encounter so many standards in the corporate world that in so many cases they become totally ineffective. This is an area requiring continued technical leadership or it will have little impact.

article thumbnail

Microsoft Invests In Several Submarine Cables In Support Of Cloud Services

Data Center Knowledge

Microsoft is investing in several submarine cables to better connect its data centers and boost its cloud services connectivity worldwide. Read More.

Microsoft 216
article thumbnail

The potential of microservices within the data center

Virtualized Greek

Server SAN vendor Springpath is leveraging Docker Containers to provide storage services as part of its architecture. The implementation shows microservices the potential in the traditional data center. Springpath takes a completely abstracted approach to their storage service. Individual Virtual.

article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Packing My Bags For Prague and Dimension Data #Perspectives2015

Cloud Musings

Prague is a beautiful city! My last time was in June 2010 when Jeremy Geelan invited me to speak at CloudExpo Europe (see my blog post and video from that trip at " CloudExpo Europe 2010: Not Your Father's Prague "). And yes, that is the same Jeremy Geelan that is currently enduring the terrible earthquakes in Nepal (see my recent post on that in " Tweeps Are People Too!!

Data 118
article thumbnail

The AWS Pop-up Loft opens in New York City

All Things Distributed

Over a year ago the AWS team opened a "pop-up loft" in San Francisco at 925 Market Street. The goal of opening the loft was to give developers an opportunity to get in-person support and education on AWS, to network, get some work done, or just hang out with peers. It became a great success; every time when I visit the loft there is a great buzz with people getting advice from our solution architects, getting training or attending talks and demos.

article thumbnail

AFCEA and NIP and the USN Present Navy Information Dominance Day 11 June 2015

CTOvision

n June 11, 2015, AFCEA Intelligence and the Naval Intelligence Professionals, in collaboration with the Office of the Deputy Chief of Naval Operations for Information Dominance, will present a classified forum examining the state of Information Dominance in the U.S. Navy. . If you have attended any of the previous sold-out Navy Information Dominance Industry Days, you know these events provide invaluable business intelligence in the context of the Navy’s Strategy for Achieving Information Domina

article thumbnail

Review Lessons Learned in Big Data 21 May: SAS and Apache Hadoop Architecture Review

CTOvision

SAS and Hadoop work together in ways supportive to enterprise missions. Analysts are able to leverage comprehensive enterprise data stores by use of familiar interfaces and methods and with the well engineered SAS and Hadoop architecture can dramatically improve their results for mission. SAS Business Analytics software is focused on delivering actionable value from enterprise data holdings.

Big Data 240
article thumbnail

Predicting the Future of Sales: How AI and Automation Will Revolutionize Strategies

In this exploration, we're diving into predictions about the future of sales. We're talking about a complete shake-up powered by automation and artificial intelligence (AI). These aren't just fancy tools — they're real game-changers. Automation and AI are here to redefine every interaction, making them smarter, faster, and more meaningful. From personalized customer journeys to streamlined sales processes, the goal is to make every moment count, enhancing both efficiency and connection.