September, 2015

article thumbnail

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a hacker already knows how to exploit the tech in every way possible.

Network 308
article thumbnail

Switch Claims Reno Site Will be World’s Largest Data Center

Data Center Knowledge

Says 150MW building will be first of up to seven massive data centers on Tahoe Reno campus Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Accessibility Is A CIO’s New Responsibility

The Accidental Successful CIO

CIOs need to start to consider the needs of disabled workers Image Credit: Leo Reynolds. CIOs need to understand that the environment in which their company operates is changing. Two important things are happening at the same time. The first is that a lot of us are becoming older. As we age, things like mobility and vision start to degrade and this means that we are starting to become more and more like disabled users and coworkers.

article thumbnail

How To Handle Difficult Agile Product Owners

Social, Agile and Transformation

There are many product owners that understand agile practices, enjoy collaborating with technologists and leverage data to make sound prioritization choices. But if you've practiced agile long enough you've probably experienced a dark product owner who's exhibited some of the bad behaviors of product owners that I posted a couple of months ago. At the extreme, these product owners only care.

Agile 199
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Cloud hosting: Look beyond cost savings and weigh pros, cons

Cloud Musings

Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud will almost guarantee failure. Some reasons that typically lead to cloud computing costing more include: Building and migrating to a private cloud, which will almost always cost more than staying in a traditional data center; Migrating legacy applications that weren’t designed to operate in a virtualized environment or are tied to

Cloud 132
article thumbnail

IBM tackles 'shadow IT' with a new cloud security tool for enterprises

ComputerWorld Consumerization IT

If there's one thing that can strike terror into a CIO's heart, it's the security implications of the cloud. If there's another, it's the "bring your own" technology trend. Combine the two, and you've got the motivation behind IBM's new Cloud Security Enforcer. Thanks to having set up used a private email server while U.S. Secretary of State, Hillary Clinton has become a poster child for "Shadow IT," or the phenomenon by which employees bring their own technologies into the workplace, but there'

IBM 113

More Trending

article thumbnail

Data Center Consolidation: a Manager’s Checklist

Data Center Knowledge

Smart data center and cloud providers learn to use what they have and make the absolute most out of every resource. Read More.

article thumbnail

CIOs And The Art Of Succession Planning

The Accidental Successful CIO

CIOs Need To Plan For Who Comes Next Image Credit: Xiaojun Deng. Wow – it sure was hard to get the CIO job. Just think for a moment about all of the various positions you had to rise through in order to finally obtain the top spot in IT. You do realize that you are not the last CIO that your company is ever going to have – because of the importance of information technology there will be others who follow behind you.

Social 164
article thumbnail

Two Questions To Ask Before Kicking Off a Digital Transformation

Social, Agile and Transformation

Take a look around and you'll find plenty of articles on Digital Transformation by the media, consulting services, and software companies. A recent articles by Steven Andriole suggest that it is more than just business process re-engineering while Scott Anthony sites examples of one Bank CEO deciding to lead by example and learned to code a mobile app.

Banking 185
article thumbnail

Personal email:Pathway to Cybersecurity Breaches

Cloud Musings

As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them admitted checking personal emails at work. The workers questioned in the poll estimated they spend 6.3 hours a day checking emails, with 3.2 hours devoted to work emails and 3.1 hours to personal messages.

Dell 129
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Apple watchOS 2 release date is finally here (it's about time)

ComputerWorld Consumerization IT

The Apple watchOS 2 release date is here. You can finally download the real thing, after the GM build was pulled due to unspecified bugginess. The new update adds native apps, new faces, a sideways "nightstand" mode, and a few other features. Apparently, it also tells the time. But don't be in a hurry, K? Reports from early installers say it's slow to update.

Apple 104
article thumbnail

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. The FBI led Internet Crime Complaint Center (IC3) is playing an increasingly important role in helping consumers and victims of fraud know the reality of the threats facing them from cyberspace.

Internet 288
article thumbnail

Cloudera Aims to Replace MapReduce With Spark as Default Hadoop Framework

Data Center Knowledge

Says One Platinum Initiative would formalize what is already a de facto standard Read More.

Big Data 218
article thumbnail

How CIOs Can Avoid Being Fired

The Accidental Successful CIO

In order to hold on to their jobs, CIOs need to know how to not get fired. Image Credit: Bill Alldredge. During my career, I’ve been fired twice. I can tell you from personal experience, it’s never a good feeling. As CIO, you have a highly visible position within the company and there is a lot riding on you. If you are not able to deliver what the company needs from you, there is a very good chance they are going to end up getting rid of you and replacing you with someone who can do

Resources 158
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Are You A Wolf CIO?

Social, Agile and Transformation

About four months ago, I attended a Gartner dinner and received a copy of The Wolf in CIO's Clothing from author Tina Nunno. I took the quiz right away (won't tell you my scoring, but let's just say I am not a lamb) but it's taken me awhile to finally read the book. If you're a CIO or aspire to be one, I suggest you download a copy. It's a quick read packed with key insights on managing.

153
153
article thumbnail

Data-centric Security: The New Must Have

Cloud Musings

Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere. Having your data and the data about you virtually everywhere is, in fact, key to the cloud computing business model. This means that traditional security concepts that focus in depth on infrastructure defense no longer apply.

Security 129
article thumbnail

Microsoft extends Azure Active Directory to support Facebook, Google

ComputerWorld Consumerization IT

Microsoft’s Azure Active Directory identity management platform now allows businesses to authenticate customers using popular consumer applications, such as Facebook and Google’s suite of services. + MORE AT NETWORK WORLD : 11 Reasons you should upgrade to iPhone 6s +. Research firm Gartner’s recent Magic Quadrant named Azure AD one of the leading products for businesses to verify the identity of their employees.

Microsoft 101
article thumbnail

New DoD Rules For Contractors Focus On Enhancing Security and Incident Response

CTOvision

On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: Download “DoD Rules On Protecting Data In Contractor Systems” 26-Aug-Federal-Registrar-New-DoD-Rules-For-Cyber.pdf – Downloaded 8 times – 290 kB.

Security 277
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Latency, Bandwidth, Disaster Recovery: Selecting the Right Data Center

Data Center Knowledge

The process to select a good data center has to involve not only the physical elements of the facility but the workload to be delivered as well. Read More.

article thumbnail

Cut Costs Or Grow Profits: What Should A CIO Do?

The Accidental Successful CIO

What is more important to a CIO: costs or profits? Image Credit: Susy Morris. Here’s a quick question for you: what is more important for a CIO to do – cut costs or boost revenues? I think that it’s fair to say that because of the importance of information technology, we are called on to do both at the same time; however, they can’t both be of equal value.

Research 152
article thumbnail

Font Installation Script

Mick's IT Blog

I had a bunch of fonts that need to be installed during the build of the golden image. I wrote this script to install them as a task sequence, but also to be able to deploy the fonts easily through SCCM. This script will install all fonts of the specified font type from the specified directory location. All of the fonts you want installed are to be placed in the specified directory location.

80
article thumbnail

IEEE Cloud Computing: Legal Clouds

Cloud Musings

The new issue of IEEE Cloud Computing is now available! This special issue looks at how to balance privacy with legitimate surveillance and lawful data access. Some of the specific areas covered are: Balancing Privacy and Surveillance in the Cloud; Data Flow Management and Compliance in Cloud Computing; Anonymous Credential-Based Access Control Scheme for Clouds; and End-to-End Privacy for Open Big Data Markets.

Cloud 120
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

The Startup Experience at AWS re:Invent

All Things Distributed

AWS re:Invent is just over one week away—as I prepare to head to Vegas, I’m pumped up about the chance to interact with AWS-powered startups from around the world. One of my favorite parts of the week is being able to host three startup-focused sessions Thursday afternoon: The Startup Scene in 2016: a Visionary Panel [Thursday, 2:45PM]. In this session, I’ll moderate a diverse panel of technology experts who’ll discuss emerging trends all startups should be aware of, including how local governme

article thumbnail

What Is The Difference Between Data Governance and Big Data Governance?

CTOvision

The video at this link and embedded below starts with a great question: What is the difference between data governance and big data governance? Well we all know that the theory should be that there should be no difference. But the reality is that Hadoop and Spark and the many new approaches around those platforms require more thought and actions to optimize data governance.

Big Data 270
article thumbnail

Amazon Data Center Outage Affects Netflix, Heroku, Others

Data Center Knowledge

DynamoDB goes down causing high error rates for other services that rely on it Read More.

article thumbnail

The Dynamic Thinking Mind

Future of CIO

A dynamic mind takes more time to self-reflect, not less. Everything is composed of energy, even our thoughts, and feelings. We can't see oxygen, but it is essential to life. We can't see our thoughts and feelings, but only the effect thoughts and feelings have an impact on our life on a daily basis. The result of all these activities is the mind: without the brain, there can be no individual mind, yet it is conceivable that the brain produces something that is greater than itself, and this is t

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Using PowerShell to retrieve the Bitlocker Recovery Key from Active Directory

Mick's IT Blog

I wanted an easy way to find the bitlocker recovery key in the even MBAM was down and as a backup. We use MBAM, but also use Active Directory as a backup for the keys. This script makes it easy to find the key without having to go into AD. I tested this script on user profiles both with and without permissions to the bitlocker recovery keys. If a user does not have permissions to view the key, then the script returns the message no key exists.

Backup 80
article thumbnail

John Mayer At Dell World 2015!! (Oh, I'll be there too.)

Cloud Musings

An artist who defies all boundaries, John Mayer has won seven Grammy Awards and sold more than 17 million albums worldwide. The singer, songwriter and guitarist’s skills have been widely acknowledged by some of the world’s greatest musicians. Mayer has collaborated with an extraordinary range of artists from the worlds of rock, blues, hip-hop, jazz, and country including Eric Clapton, BB King, Buddy Guy, Dixie Chicks, Jay Z, Alicia Keys and many more.

Dell 102
article thumbnail

The AWS Pop-up Lofts are opening in London and Berlin

All Things Distributed

Amazon Web Services (AWS) has been working closely with the startup community in London, and Europe, since we launched back in 2006. We have grown substantially in that time and today more than two thirds of the UK’s startups with valuations of over a billion dollars , including Skyscanner, JustEat, Powa, Fanduel and Shazam, are all leveraging our platform to deliver innovative services to customers around the world.

article thumbnail

The Impact of Cloud Robotics on Artificial Intelligence

CTOvision

Look at any science-fiction vision of our technological future and you’ll find a world dominated by artificial intelligence. Some of these visions may go for the more dystopian angle, where humanity has been displaced by self-aware robots that now rule the world. Other, more optimistic views look at AI as a great benefit to our species, helping us in exploration and furthering the advances of scientific endeavors.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.