Achieving Success as a CTO
The only true way to measure the success of a CTO is to look at the success of the enterprise. A CTO is successful if he or she effectively supports and enables the business of the company. The way to do that is to understand how technology is going to impact the business. The CTO can measure effectiveness using the same metrics that are used to measure the business
Security data mining techniques to weed through data overload
Security professionals must constantly deal with great amounts of information, which is generated from such systems as firewalls and intrusion detection. Not only is time a factor, but budgets and resources cause concern with so much information being generated, because these can sometimes barely cover what's needed to sort through the data. This special video presentation ... explores issues IT security managers face when weeding through copious amounts of data to find and solve core compliance problems.
Review: The best network monitoring system on earth
EM7 has so many features and capabilities, it's hard to do it justice. Setup is easy, and the initial learning curve isn't too painful. It scales like crazy and distributes the load across lots of collectors and database appliances, physical or virtual. You can add any number of collectors -- one for every subnet, if you want -- as part of the license. Best of all, EM7 can be extended through templates and scripting to do just about anything you could possibly want from a management system, even if you don't have a full MIB for the device.
The data black hole that could suck the life out of the internet economy
The internet's reliance on an unending stream of free data could be unwise, according to analysts Ovum. ... This hardening of consumer attitudes towards sharing data, coupled with tightening regulation, could diminish personal data supply lines and have a considerable impact on targeted advertising, CRM, big data analytics, and other digital industries — opening up a data black hole underneath the internet economy.
Four variations on a CTO theme
Many organizations have decoupled the “I” for information from the “T” for technology and created two separate roles with distinct accountabilities and deliverables. But there are many different models – with variations depending on industry sector, maturity of company and of course the attitude and approach of the executive leadership team to technology as a strategic asset. We have been engaged in hiring both CIOs and chief technology officers (CTOs) for leading global organizations and believe the CTO profile has four major variations.
Facebook deleted EU facial recognition data, regulators say
"We recently reviewed the source code and execution process used in the deletion process and can confirm that we were satisfied with the processes used by Facebook to delete the templates in line with its commitment," said Ciara O'Sullivan, spokeswoman for the Office of the Irish Data Protection Commissioner (DPC), in an email. Facebook's international headquarters is in Ireland, making the company subject to Irish, and European Union, data protection laws (and also to Ireland's advantageous corporate tax rate).
Persistent Myths About Predictive Analytics And Big Data
Predictive analytics are calculations that are based on current and historical data that delivers predictions about upcoming events. It has been around for a while, although, as Doug points out, it has only recently become reliable and affordable for most companies, especially SMEs. Nonetheless, there are still a few myths that need to be corrected.
Will Security Features Of New DataStax Enterprise Boost NoSQL Adoption?
Apart from the features that are provided to the entire Cassandra NoSQL community, the product also provides certain advanced security features to the Enterprises. External authentication allows DSE to provide single sign on capability to all Cassandra, Hadoop, and Solr nodes in a DSE cluster. Transparent data encryption and data auditing enable enterprises to keep the data from falling into wrong hands. Visual management of clusters and database objects eases the work of administrators to a great extent.
Banks Using Big Data to Discover ‘New Silk Roads’
Information about checking accounts, mortgages and wealth management for the same individual were contained in independent information management systems, preventing banks from leveraging considerable analytic capabilities that could have helped account representatives provide customers with better service.
Interpreting Technology Hype
When new technologies make bold promises, how do you discern the hype from what’s commercially viable? And when will such claims pay off, if at all? ... Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.
Why People Adopt Or Wait For New Technology
Instead of thinking about ‘early adopters’ and ‘normals’ as if they are two homogeneous groups, I think it’s better to look at the motivations that trigger someone to buy into a new technology or solution at various points in the release timeline. Here’s some of our research findings, as we try to understand when people take to new stuff:
Quote for the day:
"Man does not weave this web of life. He is merely a strand of it. Whatever he does to the web, he does to himself." -- Chief Seattle
The only true way to measure the success of a CTO is to look at the success of the enterprise. A CTO is successful if he or she effectively supports and enables the business of the company. The way to do that is to understand how technology is going to impact the business. The CTO can measure effectiveness using the same metrics that are used to measure the business
Security data mining techniques to weed through data overload
Security professionals must constantly deal with great amounts of information, which is generated from such systems as firewalls and intrusion detection. Not only is time a factor, but budgets and resources cause concern with so much information being generated, because these can sometimes barely cover what's needed to sort through the data. This special video presentation ... explores issues IT security managers face when weeding through copious amounts of data to find and solve core compliance problems.
Review: The best network monitoring system on earth
EM7 has so many features and capabilities, it's hard to do it justice. Setup is easy, and the initial learning curve isn't too painful. It scales like crazy and distributes the load across lots of collectors and database appliances, physical or virtual. You can add any number of collectors -- one for every subnet, if you want -- as part of the license. Best of all, EM7 can be extended through templates and scripting to do just about anything you could possibly want from a management system, even if you don't have a full MIB for the device.
The data black hole that could suck the life out of the internet economy
The internet's reliance on an unending stream of free data could be unwise, according to analysts Ovum. ... This hardening of consumer attitudes towards sharing data, coupled with tightening regulation, could diminish personal data supply lines and have a considerable impact on targeted advertising, CRM, big data analytics, and other digital industries — opening up a data black hole underneath the internet economy.
Four variations on a CTO theme
Many organizations have decoupled the “I” for information from the “T” for technology and created two separate roles with distinct accountabilities and deliverables. But there are many different models – with variations depending on industry sector, maturity of company and of course the attitude and approach of the executive leadership team to technology as a strategic asset. We have been engaged in hiring both CIOs and chief technology officers (CTOs) for leading global organizations and believe the CTO profile has four major variations.
Facebook deleted EU facial recognition data, regulators say
"We recently reviewed the source code and execution process used in the deletion process and can confirm that we were satisfied with the processes used by Facebook to delete the templates in line with its commitment," said Ciara O'Sullivan, spokeswoman for the Office of the Irish Data Protection Commissioner (DPC), in an email. Facebook's international headquarters is in Ireland, making the company subject to Irish, and European Union, data protection laws (and also to Ireland's advantageous corporate tax rate).
Persistent Myths About Predictive Analytics And Big Data
Predictive analytics are calculations that are based on current and historical data that delivers predictions about upcoming events. It has been around for a while, although, as Doug points out, it has only recently become reliable and affordable for most companies, especially SMEs. Nonetheless, there are still a few myths that need to be corrected.
Will Security Features Of New DataStax Enterprise Boost NoSQL Adoption?
Apart from the features that are provided to the entire Cassandra NoSQL community, the product also provides certain advanced security features to the Enterprises. External authentication allows DSE to provide single sign on capability to all Cassandra, Hadoop, and Solr nodes in a DSE cluster. Transparent data encryption and data auditing enable enterprises to keep the data from falling into wrong hands. Visual management of clusters and database objects eases the work of administrators to a great extent.
Banks Using Big Data to Discover ‘New Silk Roads’
Information about checking accounts, mortgages and wealth management for the same individual were contained in independent information management systems, preventing banks from leveraging considerable analytic capabilities that could have helped account representatives provide customers with better service.
Interpreting Technology Hype
When new technologies make bold promises, how do you discern the hype from what’s commercially viable? And when will such claims pay off, if at all? ... Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.
Why People Adopt Or Wait For New Technology
Instead of thinking about ‘early adopters’ and ‘normals’ as if they are two homogeneous groups, I think it’s better to look at the motivations that trigger someone to buy into a new technology or solution at various points in the release timeline. Here’s some of our research findings, as we try to understand when people take to new stuff:
Quote for the day:
"Man does not weave this web of life. He is merely a strand of it. Whatever he does to the web, he does to himself." -- Chief Seattle
No comments:
Post a Comment