April, 2016

article thumbnail

Guide to Facebook’s Open Source Data Center Hardware

Data Center Knowledge

Mark Zuckerberg’s social networking giant is the world’s biggest open source hardware design factory Read More.

article thumbnail

If You Are In Business Or Government You Need To Understand The Facebook Vision In This Video

CTOvision

Bob Gourley. Mark Zuckerberg walked through Facebook's 10 year plan during the keynote of the F8 conference on 12 April 2016. This roadmap is grounded in reality but very exciting. And it starts with a great articulation of Facebook's mission. Facebook is focused clearly on connecting all people and allowing anyone to share anything with anyone. If you are a decision-maker in business or government I recommend you watch the entire presentation for many reasons (businesses especially need to see

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Practices of Strong Agile Product Owners

Social, Agile and Transformation

I've worked with some excellent agile product owners that have developed new products, delighted customers, grown revenue, and collaborated well with their agile teams. I've also worked with other product owners that have some very bad behaviors reflecting in poor under performing products and angry team members. So I thought to share some of the behaviors and practices that make product owners.

Agile 155
article thumbnail

Slack: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers the common use cases of Slack, its technical benefits and limitations, and what to know before adopting the cloud-based collaboration tool.

Tools 151
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Fun Linux Things

CIO Musings

Unix has always fascinated me. I was hired to be a Unix communications programmer in 1986. I taught myself C, learned the X.25 protocol, HDLC, the seven layer ISO model and started struggling with the bourne shell. By this time I had been coding for 11 years, having started with BASIC in 7th grade. What stuck with me through all the years and versions and languages and floppy disks is the incredible versatility of Unix.

Linux 150
article thumbnail

Can you really win if you aren’t the best?

Eric D. Brown

People often say that if you work hard and apply yourself, you’ll succeed. But lets be realistic… that isn’t always true, especially because everybody has a different definition of ‘succeed.’ Sure, you can work hard and apply yourself and become better than you were, but it doesn’t mean you’ll become the ‘best’ at something.

Analysis 136

More Trending

article thumbnail

Women in Cybersecurity: Reducing the Gender Gap Part I

CTOvision

Katie Kennedy. This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31 st through April 2 nd , women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference. This three-day long event was designed to both enhance the state of cyber security and to raise awareness about the importance and nature of a cybersecurity career.

article thumbnail

Where are you Implementing your Big Data Algorithms?

Social, Agile and Transformation

It sounds like a simple question. You have to load several data sets, implement some data cleansing, perform some matching to third party data, compute several aggregates, develop some rankings, group several dimensions, benchmark against another data set, analyze for trends and then normalize the data for multiple data visualizations. In all likelihood, the algorithms that perform these.

Big Data 140
article thumbnail

3 Ways To Get Your Company To Take Digital Security Seriously

The Accidental Successful CIO

Security only works if people take it seriously Image Credit: Holly Victoria Norval. As the person with the CIO job, you realize the importance of information technology and just how important it is to keep your company’s network secure from all of the bad people out there in the world who are always trying to get in. You make investments in firewalls, intrusion detection devices, and highly paid IT security staff.

Security 126
article thumbnail

How to use Signal for encrypted SMS messages

Tech Republic Security

Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.

How To 120
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Good data science isn’t about finding answers to questions

Eric D. Brown

I just finished reading an article over on Fast Company titled “ How Designers Are Helping HIV Researchers Find A Vaccine.” The story related in this article is a perfect example of what ‘good’ data science looks like. The data scientists and designers worked together to build a platform that made it easy for anyone to dive into data sets, find answers – and more importantly – find more questions.

Data 122
article thumbnail

CoreSite Shares Spike as Cloud Data Center Leasing Accelerates

Data Center Knowledge

REITs under pressure to deliver lots of capacity in top markets for hyperscale cloud giants Read More.

article thumbnail

Warning Meat Puppets: Robotic Trucks Drive Across Europe In Demonstration Of What Is Possible Today

CTOvision

Bob Gourley. An operational fleet of robotic trucks just demonstrated their safety and efficiency by autonomously moving across Europe. In an article titled " A fleet of trucks just drove themselves across Europe ," Joon Ian Wong writes that: About a dozen trucks from major manufacturers like Volvo and Daimler just completed a week of largely autonomous driving across Europe, the first such major exercise on the continent.

article thumbnail

Analyzing real WordPress hacking attempts

Network World

In my last few posts I’ve pondered the issue of how insecure WordPress installations have become. Here’s an interesting thing to try if you run a Wordpress site; install the 404 to 301 plugin and in its settings check the “Email notifications” option and enter an email address in the “Email address” field. Now, whenever a nonexistent URL is requested, you’ll get notified and, at least for me, it’s been pretty interesting to see how hackers attempt to enter my WordPress installations.

113
113
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

What A CIO Needs To Know About Encryption

The Accidental Successful CIO

CIOs need to know when to make use of encryption Image Credit: Yuri Samoilov. Due to the importance of information technology, the person with the CIO job has been handed the responsibility of keeping the company’s information assets safe. This involves a number of different things including preventing the wrong people from gaining access to the company’s networks, etc.

Company 122
article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

Strategy 112
article thumbnail

How to save images and web pages to your Google cloud account with one click

Tech Republic Cloud

Save To Google is the Chrome extension you've been looking for, says Jack Wallen. Here's how to use this must-have Google tool.

Google 110
article thumbnail

Build or Lease? Creating the Best Data Center Strategy

Data Center Knowledge

Here’s what infrastructure pros need to know when making the most important decisions of their career Read More.

article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

How to Achieve Elastic High Performance Computing in the Cloud: A Case Study with Bright Computing

CTOvision

Katie Kennedy. Fabio Trojani, a Professor of Finance at the Geneva Finance Research Institute (GFRI) of the University of Geneva and a Senior Chair of the Swiss Finance Institute, oversees a quantitative research team that carries out research in various areas of Financial Economics, Financial Econometrics and Statistics. The projects Professor Trojani works on, need to be powered by a significant HPC infrastructure.

article thumbnail

With some advanced preparation, you can survive a ransomware attack  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins.

Malware 113
article thumbnail

CIOs Need To Learn To Play HEAD Games

The Accidental Successful CIO

CIOs need to learn how to use the HEAD decision making technique Image Credit: Ten Aku. As the person with the CIO job you have access to a great deal of information. In fact, some would say that you have access to too much information. Making a decision about the importance of information technology can be a very difficult thing to do. You have a great deal of information sitting at your disposal, but a lot of it may be contradictory.

How To 122
article thumbnail

Five things the CEO wants to know about Big Data

Eric D. Brown

I spend a lot of time talking to companies about big data and data science. Many conversations are with people at the CxO level (CEO’s, COO’s, CFO’s, etc etc) and usually revolve around basic discussions of big data and data analytics. One of the things that has surprised me a little from these discussions is that these CxO level people have the same basic questions about big data.

Big Data 109
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

How to expand the Facebook Messenger app with Dropbox

Tech Republic Cloud

If you're a Facebook Messenger and Dropbox user, you'll be glad to know that the apps have been integrated so you can add files to Messenger threads from Dropbox with ease.

How To 105
article thumbnail

What Cisco’s New Hyperconverged Infrastructure Is and Isn’t Good At

Data Center Knowledge

Taking a critical look at HyperFlex, Cisco's first major hyperconvergence play Read More.

article thumbnail

Join Cognitio and Verisign In An Examination Of Cyber Defense Strategies For Public Sector Agencies

CTOvision

Bob Gourley. Verisign and Cognitio are hosting an action-oriented Cyber Strategy Seminar focused on establishing a framework for resilient cybersecurity in the public sector on Tuesday, May 3, 2016. The seminar will include a facilitated dialog in which we will explore the need to expand the security framework from the ground up and design for the changing computing landscape.

Strategy 155
article thumbnail

How to keep your small business safe from data breaches and hacks

Network World

Cybersecurity – and security breaches – continues to be a hot topic. And small ecommerce businesses, especially ones using an open source platform, are particularly susceptible to hacks and breaches. So what can small ecommerce shops do to protect their sites as well as any sensitive (customer) data? Following are 10 suggestions from ecommerce security experts.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Airline CIOs Show How To Move From The Old To The New

The Accidental Successful CIO

Combining airlines can teach CIO some lessons Image Credit: Luke Ma. The day-to-day challenges of being a CIO and teaching the rest of the company about the importance of information technology are enough to keep most of us fully busy. Just imagine if you were handed the additional responsibility of creating a plan to merge the IT operations of two large airlines.

Airlines 116
article thumbnail

AWS vs Microsoft Azure: Understanding the serverless application trend

Tech Republic Data Center

How exactly do you run applications without servers? Keith Townsend explains how AWS' Lambda service and Microsoft's Azure Service Fabric move away from the OS-centric view of computing.

article thumbnail

How to add more VPN setup options on your Ubuntu Touch device

Tech Republic Security

If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.

How To 102
article thumbnail

Intel: World Will Switch to “Scale” Data Centers by 2025

Data Center Knowledge

Computing infrastructure is changing, and Intel is fighting to remain at the forefront of the change Read More.

Intel 153
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.