May, 2015

article thumbnail

Please Help Spread The Word: IEEE Seeks Papers On Bio-inspired Cyber Security

CTOvision

Friend and CTOvision reader Sean Moore of Centripetal Networks is a proven engineer with experience developing technologies and leading tech focused businesses. He is highly regarded for his mastery of network cyber security, IP communications technology and TCP/IP networking. At Centripetal he leads product development on solutions proven to scale to the size of the Internet itself.

Security 289
article thumbnail

Liquid Web Names Former Cbeyond Head CEO, Receives Investment from Madison Dearborn Partners

Data Center Knowledge

Liquid Web has not disclosed the financial details of the investment but says the Chicago-based private equity firm has provided a “substantial investment” in the company. Read More.

Financial 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Reasons Why Citizen Developers May Be The Next Big Thing in Application Development

Social, Agile and Transformation

I must be behind the times because last week was the first time I heard the term "Citizen Developer", a term Gartner defines as a user who creates new business applications for consumption by others using. development and runtime environments sanctioned by corporate IT. They are referring to a business user and not a software developer in IT, and are careful to distinguish this from Rogue-IT.

article thumbnail

7 common mistakes in Go (2015)

SPF13

Given at GopherFest 2015. This is an updated version of the talk I gave in NYC Nov 14 at GothamGo. “We need to think about failure differently. Most people think mistakes are a necessary evil. Mistakes aren’t a necessary evil, they aren’t evil at all. They are an inevitable consequence of doing something new and as such should be seen as valuable. “ - Ed Catmull.

Examples 204
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Do You Know How To Do Strategic Planning CIO?

The Accidental Successful CIO

CIOs need to know how to go about creating a strategic plan for their company Image Credit: Kyle Van Horn. If you ask any CIO to participate in creating a strategic plan for his or her company, you’ll probably see their eyes light up. This is what they live for – getting a seat at the big table to help chart the course of the company. We all believe that we deserve this position because of the importance of information technology.

How To 175
article thumbnail

The most critical skill?

Eric D. Brown

I’m an avid reader. I tend to read a few books at a time (I read one depending on my ‘mood’ at the time). The other day, I was scrolling through the various sections in Amazon’s Kindle Unlimited program and somehow ended up in the ‘self-help’ section. Now, I’m not a fan of self-help books because they tend to try to tell people that they can follow a ‘recipe’ and then they’ll be ‘all better.’ Life doesn’t work this

Groups 153

More Trending

article thumbnail

How Cloud is Getting Security Right

Data Center Knowledge

We take a look at the modern cloud architecture and have to understand the underlying security that supports it. The good news is that cloud security has become a lot better. Now, find out where cloud is getting security right and how you benefit. Read More.

Cloud 215
article thumbnail

33 Bad Behaviors of Agile Developers and IT Operations

Social, Agile and Transformation

I recently published 20 Bad Behaviors of Agile Product Owners and decided not to leave this subject one sided. In trying to improve the organizational culture and more specifically, the culture in IT, the CIO and IT leadership must consider, review, and improve on its own behaviors. So this week I'm itemizing some of the bad behaviors in IT. Like my previous most, I haven't seen these.

Agile 200
article thumbnail

SAP/HANA Does Big Data for National Security

Cloud Musings

Carmen Krueger, SAP NS2 SVP & GM While SAP is globally renowned as a provider of enterprise management software, the name is hardly ever associated with the spooky world of intelligence. That is one reason why I jumped at the opportunity to talk with SAP executives responsible for the company’s work in that clandestine marketplace. SAP National Security Services, Inc.™ (SAP NS2™) is an independent U.S. subsidiary of the company and offers a full suite of SAP enterprise applications, analytic

SAP 137
article thumbnail

To Be Successful, CIOs Need To Implement Simplicity

The Accidental Successful CIO

Complexity Is Something That IT Can Do Without Image Credit: nerovivo. I don’t know about you, but whenever I see something that looks complicated, I am impressed. I mean, somebody took the time to make that and so based on the importance of information technology it must do something complicated very well. Well, it turns out that I’m wrong.

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Innovation needs process change

Eric D. Brown

Jeffrey Philips currently wrote a nice piece titled “ Innovate your processes before innovating your products ” over on his excellent Innovate on Purpose blog. In that article, Jeffrey argues that before a company can innovate its products/services, it must innovate its processes if it hopes to build a sustainable edge via innovation over its competition.

Groups 144
article thumbnail

Thwarting the Risk of Malicious Attacks on Medical Devices

CTOvision

Wearers and users of medical devices may not be aware of their risk of having their device hacked. The software used to operate medical devices is vulnerable to malicious attacks. According to one recent report in particular, the attacks might: impede or alter a device’s function, leak sensitive data, or otherwise cause the device to depart from its specified behavior.

Software 265
article thumbnail

Virtualization – A Look to the Future

Data Center Knowledge

The data center industry has moved way beyond simple server virtualization, and is exploring new avenues to make virtualization an even more powerful platform. Let’s take a look at some of these newer approaches to virtualization. Read More.

article thumbnail

Transforming Technology Organizations By Investing in Culture and Practices

Social, Agile and Transformation

Should IT only be a services organization to the Business? Should it only provide a services catalog around incidents and requests and a PMO to oversee projects when required? Will perfecting service levels and project execution be good enough for the Business to compete when innovation and data driven practices are so critical for competitiveness? Will IT be able to consider optimal solutions.

Data 192
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. 1 cloud computing business concern. Although the apprehension is absolutely valid, cloud computing business decision and strategies are all too often driven by the many broadly shared misconceptions and misunderstandings. They include: Public cloud is more easily breached that a private cloud Any infrastructure that you manage or own is more secure than any cloud computing infrastructure Cloud-hosted applications are technically no different than enterprise-hosted

Industry 128
article thumbnail

Back-to-Basics Weekend Reading - Survey of Local Algorithms

All Things Distributed

As we know the run time of most algorithms increases when the input set increases in size. There is one noticeable exception: there is a class of distributed algorithms, dubbed local algorithms, that run in constant time, independently of the size of the network. Being highly scalable and fault tolerant, such algorithms are ideal in the operation of large-scale distributed systems.

Survey 103
article thumbnail

…and then what?

Eric D. Brown

I just finished reading a great article titled “ The Most Important Question You Can Ask: Then What? ” In the article, the author writes: The great art of life is in balancing the short term and the long term, so that one can have enjoyment with integrity – pleasure with purpose. But in most areas of life, we pay strict attention to the immediate consequences of things.

Groups 141
article thumbnail

Complying With Health Insurance Portability and Accountability Act (HIPAA) Security Rules

CTOvision

HIPAA was enacted in 1996, and by April 2005 security standards were required to be in place for most covered entities. In 2013 key portions of this law were updated. This post provides an overview of key elements we believe security and technology professionals (and most citizens) should be tracking. The technology and security communities focus largely on Title II of HIPAA, which provides changes to the law designed to reduce health care fraud and abuse while protecting privacy and enhancing s

Insurance 248
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

5 Tips for Securing Your Cloud Computing System

Data Center Knowledge

As much as cloud computing has helped with the storage of data, it has created the need for increased security. Without testing, backups and proper access permissions, data can be easily hacked or stolen. Here are five tips for ensuring your data is protected. Read More.

Cloud 210
article thumbnail

Agile Culture - Are You Developing Solutions or Solving for Business Opportunities?

Social, Agile and Transformation

Here is the hardest problem for a performing agile development team - Can you build me something that does A, B, and C for Users X and Y and have it completed within the next couple of weeks What is the problem with this form of requirement? Many of you might start with the obvious that you need more details around A, B, and C to gain a shared understanding with the product owner or.

Agile 163
article thumbnail

The Science and Art of Business Leadership

Cloud Musings

Business leadership is both science and art. The scientific aspects revolve around finance, organization, products and service. Artistic aspects include relationships, market trajectories and business strategies. While many focus on the science through books and training, the art of business is best learned from real practitioners. That is why I jumped at the chance to meet Dimension Data ’s Steve Nola during the company’s analyst event, Perspectives 2015, in Prague, Czech Republic.

Cloud 128
article thumbnail

The potential of microservices within the data center

Virtualized Greek

Server SAN vendor Springpath is leveraging Docker Containers to provide storage services as part of its architecture. The implementation shows microservices the potential in the traditional data center. Springpath takes a completely abstracted approach to their storage service. Individual Virtual.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

VMware vCloud Air Server StorageIOlab Test Drive with videos

Storage IO Blog

VMware vCloud Air provides a platform similar to those just mentioned among others for your applications and their underlying resource needs (compute, memory, storage, networking) to be fulfilled. In addition, it should not be a surprise that VMware vCloud Air shares many common themes, philosophies and user experiences with the traditional on-premise based VMware solutions you may be familiar with.

Vmware 67
article thumbnail

Cybersecurity Standards and Your Enterprise

CTOvision

As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity. We encounter so many standards in the corporate world that in so many cases they become totally ineffective. This is an area requiring continued technical leadership or it will have little impact.

article thumbnail

Next-Generation Cloud and the Power of the Data Center

Data Center Knowledge

With more reliance on the data center, find out how consolidation, going greener, and new ways to network are creating a more powerful cloud architecture Read More.

article thumbnail

The Internet of First Responder Things (IoFRT)

Chief Seattle Greek Blog

The “Internet of Things” or IoT is a common buzzword in the technology community these days. It refers to the increasingly prevalent distribution of sensors throughout the natural world, and the connection of those sensors – as well as other machines – to the Internet. The running joke is that IoT is about putting your home refrigerator, thermostat, washer, dryer, microwave, range, TVs, computers, smart phones and even toasters on the Internet, or at least connecting them so they can talk

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Packing My Bags For Prague and Dimension Data #Perspectives2015

Cloud Musings

Prague is a beautiful city! My last time was in June 2010 when Jeremy Geelan invited me to speak at CloudExpo Europe (see my blog post and video from that trip at " CloudExpo Europe 2010: Not Your Father's Prague "). And yes, that is the same Jeremy Geelan that is currently enduring the terrible earthquakes in Nepal (see my recent post on that in " Tweeps Are People Too!!

Data 118
article thumbnail

TT 16: The death of software-defined

Virtualized Greek

In a little over a year, I believe we will see the term Software-Defined disappear. Hear my thoughts on what will happen to software-defined solutions by looking at Cisco’s ACI. In a little over a year, I believe we will see the term Software-Defined disappear. Hear my thoughts on what will happen to software-defined solutions by looking at Cisco's ACI.

article thumbnail

Modernizing Data Protection = Using new and old things in new ways

Storage IO Blog

Keep in mind that a fundamental goal of an Information Technology (IT) organization is to protect, preserve and serve data and information in a cost-effective as well as productive way when needed. There is no such thing as an information recession with more data being generated and processed. In addition to more of it, data is also getting larger, having more dependencies on it being available as well as living longer (e.g. retention).

Data 61
article thumbnail

AFCEA and NIP and the USN Present Navy Information Dominance Day 11 June 2015

CTOvision

n June 11, 2015, AFCEA Intelligence and the Naval Intelligence Professionals, in collaboration with the Office of the Deputy Chief of Naval Operations for Information Dominance, will present a classified forum examining the state of Information Dominance in the U.S. Navy. . If you have attended any of the previous sold-out Navy Information Dominance Industry Days, you know these events provide invaluable business intelligence in the context of the Navy’s Strategy for Achieving Information Domina

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.