CxO CxO Podcasts, AI, Database, MFA, DevOps, Email, DDN, Cisco, Lenovo, Red Hat (294.3.Tuesday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
CxO Events
CxO Podcasts
AI
Database
MFA
DevOps
DDN News
Cisco News
Lenovo News
Red Hat News
CxO
In today's increasingly sophisticated threat landscape, an organization's cybersecurity readiness is key in keeping its business safe. Here's how CIOs assure board members that they have been making the right investments in cybersecurity.
With the threat landscape evolving to be more dangerous and sophisticated, board members may wonder where their own organizations stand when it comes to cybersecurity readiness against threats such as ransomware and data breaches. After all, board members have a duty to ensure their organization protects itself against cyberattacks and accidental data leak. ...?more
What is the role of a data manager today, what skills does the job require and what challenges do data managers face?
Data is continuing to explode. According to predictions, the amount of data created globally will surge to more than 180 zettabytes by 2025. This is a double-edged sword for businesses. While data helps to gain insights to serve customers better, ever-expanding amounts of information need to be properly managed and protected...?more
Preparing for your next digital transformation initiative? Let these five fundamental pillars support your strategy
Companies today need to continuously reimagine themselves to stay relevant. In a hypercompetitive, fast-moving business landscape, we cannot rest on our laurels or put off digital transformation projects for a better time. This mindset is critical to surviving at a time when digital transformation is flipping traditional business models to better enable digital engagement and the use of digital products and services ...?more
Managing cyber risk is already a big undertaking and today's talent shortages, evolving regulatory landscape, and an expanding threat surface are further adding to this complexity. How do CIOs balance cyber risks with market uncertainties?
These are challenging times to be a CIO. It was all talk about digital transformation to drive post-pandemic business recovery a few months ago. Now, the goalposts have shifted thanks to rising inflation, geopolitical uncertainty and the Great Resignation ...?more
Cyber security was never a purely technical problem; it is now a leadership imperative in many firms
For the past 20 years, cyber security - information security in its early days - has been seen primarily as a technical matter, to be solved by technologists using technology means...?more
CxO Events
Join the Coffee Chat to steer your cloud spending in the right direction. Explore how to continue investing in the cloud while boosting your efficiency.
As cloud costs are out of control, this is your time to rethink how you work
Companies today need a full understanding of cloud costs for better management and control, communication to stakeholders and to maximize success while moving to or operating in the cloud....?more
In this webinar you'll learn how TigerGraph is: Integrating Shoreline actions with Datadog alerts to repair common incidents; and Performing distributed repair actions across AWS EC2 clusters
TigerGraph Cloud is the most scalable graph database platform for advanced analytics and machine learning on the cloud for connected data. The parallel native graph database technology behind the platform can scale horizontally and vertically to hundreds of servers in the cloud....?more
To drive leadership and exploration of sustainable transformation and innovation, develop best practices, methodologies, benchmarks, education, and awareness needed to enable organizations and global networks to build resilient and energy efficient enterprise solutions that impact change.
BWG has partnered up with World Wide Technology to build The Sustainable Enterprise Technology Council! Our Mission is to promote the understanding, the ideals and the practical steps towards a more energy efficient enterprise technology environment!...?more
CxO Podcasts
Errol joins CXOTalk to share his insights about the current state of business and leadership and offer practical advice on leading transformation initiatives at large organizations.
Errol Gardner is Global Vice Chair for Consulting at EY, which has 350,000 people and is one of the largest professional services firms in the world ...?more
Ben Smith, Field CTO at NetWitness, and Charlene discuss how the Great Resignation creates 'The Great Vulnerability' in organizations. The video is below followed by a transcript of the conversation.
Charlene O'Hanlon: Hey, everybody. Welcome back to TechStrong TV. I am Charlene O'Hanlon, and I'm here now with Ben Smith, who is the Field CTO with Net Witness. Ben, thank you so much for joining me today. I do appreciate it...?more
AI
A new survey report by MIT Technology Review Insights highlights AI and data management as essential pillars to enterprise success, but found that the majority of survey respondents cited data mismanagement as a critical factor that could jeopardize their company's future AI success.
The report, 'CIO vision 2025: Bridging the gap between BI and AI,' was conducted in May and June 2022 in association with Databricks, pioneer of the lakehouse architecture. The findings of the report are based on a survey of 600 global CIOs, CDOs, and CTOs from 14 industries and interviews with C-level executives from top enterprises to understand how leaders are thinking about challenges in data management and business value realisation as they work to unleash the power of AI in their enterprises ...?more
领英推荐
Alphabet Inc.'s DeepMind unit debuted Sparrow, an artificial intelligence-powered chatbot described as a milestone in the industry effort to develop safer machine learning systems.
According to DeepMind, Sparrow can produce plausible answers to user questions more frequently than earlier neural networks. Furthermore, the chatbot includes features that significantly reduce the risk of biased and toxic answers. DeepMind hopes the methods it used to build Sparrow will facilitate the development of safer AI systems...?more
The company behind DALL-E and GPT has made its automatic speech recognition system, called Whisper, and is letting developers and researchers use it.
OpenAI, the company behind image-generation and meme-spawning program DALL-E and the powerful text autocomplete engine GPT-3, has launched a new, open-source neural network meant to transcribe audio into written text (via TechCrunch). It's called Whisper, and the company says it 'approaches human level robustness and accuracy on English speech recognition' and that it can also automatically recognize, transcribe, and translate other languages like Spanish, Italian, and Japanese. ...?more
Database
This is part of Solutions Review's Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Instaclustr's VP & Global Head of Data Solutions Anil Inamdar offers a comparison between PostgreSQL vs. MySQL and reveals his evaluation criteria.
If your organization is currently weighing the pros and cons of adopting PostgreSQL versus MySQL and looking for advice, I'm here to explain why in my mind there's little debate. For those that need a proven enterprise-grade SQL database with every advanced capability out there-and one available as a true open source solution at no cost to run-PostgreSQL offers an extremely compelling option...?more
MFA
LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.
Credential compromise has been one of the top causes for network security breaches for a long time, which has prompted more organizations to adopt multi-factor authentication (MFA) as a defense. While enabling MFA for all accounts is highly encouraged and a best practice, the implementation details matter because attackers are finding ways around it. ..?more
None of the accounts broken into had MFA enabled, which could have stopped the attack from progressing so fast.
Microsoft has exposed a crafty case of OAuth app abuse that allowed the attackers to reconfigure the victim's Exchange server to send spam ...?more
DevOps
With the seminal IT conference DevOps World 2022 in Orlando September 26 to September 29 upon us, I think about the pivotal industry conferences and events critical to my path to the cloud, DevOps and cloud-native. It brings me to this brief retrospective, highlighting some of the most significant influences that still guide my path today.
I highlight these for you as conferences, books, emerging development tools, and changes in infrastructure delivery all played critical roles in my completely rethinking of how we create software through DevOps.While leading IT for a global R&D industry consortium from 2010 to 2016, I was unknowingly in the middle of a significant shift from designing network protocols to entirely moving to the cloud, creating self-service development portals and automating the development process. ...?more
If you want to reach a large audience to inform them about a product launch or exclusive offers, the email blast (eBlast) is the method that can be of great help.
Even in this era of social media, the effectiveness of email marketing is still on. An email can reach the inbox of the recipients, making it a fruitful marketing channel for large businesses...?more
Email signatures ostensibly make your communiques look like they're wearing a nice suit, but really, it's just an extra part of the email that we can't help but read. No one likes to read more emails than they have to.
You may have seen them embedded at the bottom of an incoming email like a business card you didn't ask for. Sometimes they feature contact information, sometimes there's also a website URL and logo, and sometimes email signatures are longer than the email itself, telling you the whole journey of that person and their email, with a motivational quote or company slogan, a Hallmark-type picture, and something else that thankfully doesn't load. ...?more
Understanding what SPF is and bringing it into use is important for technology-driven businesses as the number of phishing and spoofing attacks rise.
SPF or the Sender Policy Framework record is necessary for DMARC compliance as well. Both protocols work together to avert email forgery of your domain or email account. ...?more
DDN News
With Thousands of NVIDIA DGX Systems Already Supported by DDN A3I Storage, Enterprises Are Now Able to Supercharge AI; DDN's New AI Storage Solutions Streamline and Simplify On-Premises, Hybrid and Public Cloud Infrastructures
DDN announced its next generation of reference architectures for NVIDIA DGX BasePOD and NVIDIA DGX SuperPOD. These new AI-enabled data storage solutions enhance DDN's position as the leader for enterprise digital transformation at scale, while simplifying by 10X the deployment and management of systems of all sizes, from proof of concept to production and expansion...?more
Cisco News
I am incredibly excited to announce that Cisco DNA Spaces is now Cisco Spaces.
Cisco Spaces is the go-to-platform that connects Cisco networking, and collaboration products (Catalyst, Meraki, Webex), aggregating data into a single cloud platform, to turn any building into a smart space. This evolution is triggered by purpose and sparked by a market inflection point that changed the way the world works. ...?more
Before my career in information technology, I was an educator. I began teaching inner-city kids in a summer camp, where I learned, practiced and taught many valuable lessons, including the importance of having fun and in keeping a positive daily routine.
Later, I taught for the government and was inspired by the use of technology to save lives (both government and civilian). This was a catalyst for leading me back to computer technology (I was a programmer and technophile as a child). Finally, after earning a Master's in Education and while teaching aboard, I learned how to utilize Information and Communications Technology (ICT) in a daily routine, in order to transfer knowledge to students. Essentially using some of the very technologies which serve to distract them, to teach them. And, to provide them the tools to teach themselves. ...?more
In the first blog of this series, we saw just how easy it was to deploy a X210c Compute Node with Cisco Intersight.
Last week, we showed how X-Series can deliver outstanding performance for Oracle databases. Today, we are going to go a bit deeper on configuration and show how easy it is to get great performance with very little effort. ...?more
Lenovo News
New Comprehensive Infrastructure Portfolio Delivers Scalable Solutions to Accelerate the New Era of IT
Lenovo announced the most comprehensive portfolio enhancement in its history, unveiling new end-to-end infrastructure solutions and services optimized to accelerate global IT modernization with advanced performance, security and sustainable computing capabilities. The new Lenovo Infrastructure Solutions V3 portfolio delivers industry-leading innovations to help companies of all sizes more easily deploy and manage hybrid multi-cloud and edge environments, as well as traditional and artificial intelligence (AI) workloads across retail, manufacturing, financial, healthcare, telecom industries and more. ...?more
The first major update to Windows 11 since launch last year. Microsoft has announced the Windows 11 2022 Update, with a renewed focus on 'making the everyday easier.'
With this new update, everything users love about Windows is now easier to use, sporting a cleaner new design and smarter features, more efficient ways to be effective along with increased performance and security. Here are some of the highlight features coming to Lenovo Windows devices. ...?more
Red Hat News
The automotive industry's pendulum of innovation continues to swing towards open source.
Historically speaking, it has been challenging to accelerate innovation within the automotive space due to lengthy development cycles, stringent safety certifications, and proprietary software. To combat this, automotive leaders are working to modernize and standardize practices in order to bring customers the latest and greatest in features and services while designing for functional safety. ...?more
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
...?more
In this month's customer success highlights, learn how three companies are making use of Red Hat OpenShift, Red Hat Ansible Automation Platform and Red Hat Satellite to save money, enhance customer experience and improve both uptime and security posture.
Bank Mandiri, Indonesia's largest bank by assets, provides a range of financial products and services to millions of customers, including small and medium-sized enterprises (SMEs), large corporations and government entities. ...?more