Guide to Facebook’s Open Source Data Center Hardware
Data Center Knowledge
APRIL 28, 2016
Mark Zuckerberg’s social networking giant is the world’s biggest open source hardware design factory Read More.
Data Center Knowledge
APRIL 28, 2016
Mark Zuckerberg’s social networking giant is the world’s biggest open source hardware design factory Read More.
CTOvision
APRIL 16, 2016
Bob Gourley. Mark Zuckerberg walked through Facebook's 10 year plan during the keynote of the F8 conference on 12 April 2016. This roadmap is grounded in reality but very exciting. And it starts with a great articulation of Facebook's mission. Facebook is focused clearly on connecting all people and allowing anyone to share anything with anyone. If you are a decision-maker in business or government I recommend you watch the entire presentation for many reasons (businesses especially need to see
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Social, Agile and Transformation
APRIL 24, 2016
I've worked with some excellent agile product owners that have developed new products, delighted customers, grown revenue, and collaborated well with their agile teams. I've also worked with other product owners that have some very bad behaviors reflecting in poor under performing products and angry team members. So I thought to share some of the behaviors and practices that make product owners.
Tech Republic Cloud
APRIL 17, 2016
This comprehensive guide covers the common use cases of Slack, its technical benefits and limitations, and what to know before adopting the cloud-based collaboration tool.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
CIO Musings
APRIL 6, 2016
Unix has always fascinated me. I was hired to be a Unix communications programmer in 1986. I taught myself C, learned the X.25 protocol, HDLC, the seven layer ISO model and started struggling with the bourne shell. By this time I had been coding for 11 years, having started with BASIC in 7th grade. What stuck with me through all the years and versions and languages and floppy disks is the incredible versatility of Unix.
Eric D. Brown
APRIL 27, 2016
People often say that if you work hard and apply yourself, you’ll succeed. But lets be realistic… that isn’t always true, especially because everybody has a different definition of ‘succeed.’ Sure, you can work hard and apply yourself and become better than you were, but it doesn’t mean you’ll become the ‘best’ at something.
Information Technology Zone brings together the best content for IT professionals from the widest variety of industry thought leaders.
CTOvision
APRIL 12, 2016
Katie Kennedy. This post is the first in a three part series on the Women in Cybersecurity Conference. On March 31 st through April 2 nd , women from academia, government, and industry from around the globe gathered in Dallas, Texas for Women in Cybersecurity (WiCyS) Conference. This three-day long event was designed to both enhance the state of cyber security and to raise awareness about the importance and nature of a cybersecurity career.
Social, Agile and Transformation
APRIL 11, 2016
It sounds like a simple question. You have to load several data sets, implement some data cleansing, perform some matching to third party data, compute several aggregates, develop some rankings, group several dimensions, benchmark against another data set, analyze for trends and then normalize the data for multiple data visualizations. In all likelihood, the algorithms that perform these.
The Accidental Successful CIO
APRIL 6, 2016
Security only works if people take it seriously Image Credit: Holly Victoria Norval. As the person with the CIO job, you realize the importance of information technology and just how important it is to keep your company’s network secure from all of the bad people out there in the world who are always trying to get in. You make investments in firewalls, intrusion detection devices, and highly paid IT security staff.
Tech Republic Security
APRIL 21, 2016
Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.
Advertiser: Procom Services
Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda
Eric D. Brown
APRIL 20, 2016
I just finished reading an article over on Fast Company titled “ How Designers Are Helping HIV Researchers Find A Vaccine.” The story related in this article is a perfect example of what ‘good’ data science looks like. The data scientists and designers worked together to build a platform that made it easy for anyone to dive into data sets, find answers – and more importantly – find more questions.
Data Center Knowledge
APRIL 29, 2016
REITs under pressure to deliver lots of capacity in top markets for hyperscale cloud giants Read More.
CTOvision
APRIL 9, 2016
Bob Gourley. An operational fleet of robotic trucks just demonstrated their safety and efficiency by autonomously moving across Europe. In an article titled " A fleet of trucks just drove themselves across Europe ," Joon Ian Wong writes that: About a dozen trucks from major manufacturers like Volvo and Daimler just completed a week of largely autonomous driving across Europe, the first such major exercise on the continent.
Network World
APRIL 23, 2016
In my last few posts I’ve pondered the issue of how insecure WordPress installations have become. Here’s an interesting thing to try if you run a Wordpress site; install the 404 to 301 plugin and in its settings check the “Email notifications” option and enter an email address in the “Email address” field. Now, whenever a nonexistent URL is requested, you’ll get notified and, at least for me, it’s been pretty interesting to see how hackers attempt to enter my WordPress installations.
Advertisement
For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.
The Accidental Successful CIO
APRIL 27, 2016
CIOs need to know when to make use of encryption Image Credit: Yuri Samoilov. Due to the importance of information technology, the person with the CIO job has been handed the responsibility of keeping the company’s information assets safe. This involves a number of different things including preventing the wrong people from gaining access to the company’s networks, etc.
Tech Republic Security
APRIL 18, 2016
Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.
Tech Republic Cloud
APRIL 19, 2016
Save To Google is the Chrome extension you've been looking for, says Jack Wallen. Here's how to use this must-have Google tool.
Data Center Knowledge
APRIL 25, 2016
Here’s what infrastructure pros need to know when making the most important decisions of their career Read More.
Speaker: Miriam Connaughton and Donald Knight
As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.
CTOvision
APRIL 14, 2016
Katie Kennedy. Fabio Trojani, a Professor of Finance at the Geneva Finance Research Institute (GFRI) of the University of Geneva and a Senior Chair of the Swiss Finance Institute, oversees a quantitative research team that carries out research in various areas of Financial Economics, Financial Econometrics and Statistics. The projects Professor Trojani works on, need to be powered by a significant HPC infrastructure.
Network World
APRIL 28, 2016
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins.
The Accidental Successful CIO
APRIL 20, 2016
CIOs need to learn how to use the HEAD decision making technique Image Credit: Ten Aku. As the person with the CIO job you have access to a great deal of information. In fact, some would say that you have access to too much information. Making a decision about the importance of information technology can be a very difficult thing to do. You have a great deal of information sitting at your disposal, but a lot of it may be contradictory.
Eric D. Brown
APRIL 5, 2016
I spend a lot of time talking to companies about big data and data science. Many conversations are with people at the CxO level (CEO’s, COO’s, CFO’s, etc etc) and usually revolve around basic discussions of big data and data analytics. One of the things that has surprised me a little from these discussions is that these CxO level people have the same basic questions about big data.
Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage
Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.
Tech Republic Cloud
APRIL 12, 2016
If you're a Facebook Messenger and Dropbox user, you'll be glad to know that the apps have been integrated so you can add files to Messenger threads from Dropbox with ease.
Data Center Knowledge
APRIL 5, 2016
Taking a critical look at HyperFlex, Cisco's first major hyperconvergence play Read More.
CTOvision
APRIL 20, 2016
Bob Gourley. Verisign and Cognitio are hosting an action-oriented Cyber Strategy Seminar focused on establishing a framework for resilient cybersecurity in the public sector on Tuesday, May 3, 2016. The seminar will include a facilitated dialog in which we will explore the need to expand the security framework from the ground up and design for the changing computing landscape.
Network World
APRIL 27, 2016
Cybersecurity – and security breaches – continues to be a hot topic. And small ecommerce businesses, especially ones using an open source platform, are particularly susceptible to hacks and breaches. So what can small ecommerce shops do to protect their sites as well as any sensitive (customer) data? Following are 10 suggestions from ecommerce security experts.
Advertisement
There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h
The Accidental Successful CIO
APRIL 13, 2016
Combining airlines can teach CIO some lessons Image Credit: Luke Ma. The day-to-day challenges of being a CIO and teaching the rest of the company about the importance of information technology are enough to keep most of us fully busy. Just imagine if you were handed the additional responsibility of creating a plan to merge the IT operations of two large airlines.
Tech Republic Data Center
APRIL 4, 2016
How exactly do you run applications without servers? Keith Townsend explains how AWS' Lambda service and Microsoft's Azure Service Fabric move away from the OS-centric view of computing.
Tech Republic Security
APRIL 27, 2016
If you find the default VPN options on Ubuntu Touch lacking, here's how to expand the available options with the help of a third-party click package.
Data Center Knowledge
APRIL 22, 2016
Computing infrastructure is changing, and Intel is fighting to remain at the forefront of the change Read More.
Advertisement
IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.
Let's personalize your content