![]() |
|
CIOs Worry About Gen AI - For All The Right Reasons CIO, Wednesday, September 20,2023
Many CIOs are wringing their hands over generative AI. No, the apocalyptic visions of the groundbreaking new technology replacing us - even destroying us - aren't keeping them up at night.
Rather, they're worried about how best to arm their employees as quickly and safely as possible with what could turn out to be the most consequential information technology of the decade. Generative AI chatbots like OpenAI's ChatGPT are emerging as the ultimate no-code content-generation tools, with the capability to empower virtually any employee to produce drafts of budgets and customer proposals - even advertising jingles and presentation art - in just seconds. Many of the chatbots can even generate code on the fly in programming languages like C++ and Python.
more
|
|
|
CISO CheckList for 2024 CXOtoday.com, Monday, September 18,2023
Chief Information Security Officers (CISO) have their task cutout as smart innovations at the workplace bring the issue around orchestrating a harmonious convergence of technology, strategic acumen, and foresight to safeguard enterprise data. In addition to unparalleled insights into emerging trends, the security officer requires dependable statistics, practical cyber security frameworks, solutions and tactics, and more.
In order to develop a security roadmap for 2024 that empowers the CISO and team to build out an even more relevant and actionable approach than what's available currently, these notes could come in handy. Having this ready-reckoner at hand could help enhance stakeholder satisfaction, stronger security outcomes, and greater alignment between cybersecurity and business objectives.
more
|
|
|
How Zero Trust can help align the CIO and CISO CIO, Wednesday, September 20,2023
While both positions are crucial in their own way, the top priorities for CIO and CISO can often differ. In this article, we will explore the top five priorities for CIOs and CISOs and how Zero Trust can help them align by addressing the challenges they face, including ransomware threats.
more
|
|
|
Enterprise IT Search CIO, Wednesday, September 20,2023
There is no single standard for enterprise-class, but it usually emphasizes reliability, availability, serviceability, compatibility and security.
The IT needs of a large, enterprise-sized organization are quite different than the needs of a consumer or a small business. Small businesses often make purchasing decisions based primarily on cost and expediency, essentially how fast and how cheap they can get what they need. In large organizations, other factors are more important than the upfront cost of an item.
more
|
|
|
Changing Role Of The CISO: A Holistic Approach Drives The Future DARKReading, Wednesday, September 20,2023
In the modern enterprise, the responsibility for security culture, technology, and posture is the purview of the chief information security officer (CISO). This role isn't an easy one. While senior business leaders and boards of directors understand that cybersecurity is a critical risk, they face challenges in determining how it compares to other factors such as credit, liquidity, and market risk. It's no longer enough to identify risk; now security leaders must be armed with information that allows them to justify investments, work hours, and importantly - budget.
Let's examine the various ways CISOs can support themselves to better deal with these priorities, including why I believe a more holistic approach to evaluation and prevention is the path forward.
more
|
|
Determining Full Cost And Sustainability Impact Of Flash Vs. Spinning Disk StorageNewsletter.com, Friday, September 22,2023
Lately there's been a lot of discussion in the industry purporting to compare the cost and 'eco-friendliness' of HDDs and SSDs using metrics that frankly are not relevant for enterprises looking to deploy storage systems at scale. In this blog I'd like to point out how these discussions are doing a disservice to enterprises looking to deploy the most cost-effective and sustainable storage infrastructure and suggest the relevant metrics.
I'm all for using performance and storage density, energy and floorspace consumption, and TCO metrics to compare enterprise storage solutions, but you can't get a relevant analysis for an enterprise by comparing a single HDD to a single SSD. As an IT manager building an enterprise - class storage system, you aren't buying a single storage device - you're buying a system that will have anywhere from tens to hundreds (or even thousands) of storage devices.
more
|
|
Gartner Predicts 80% Of Large Enterprise Finance Teams Will Use Internal AI Platforms By 2026 Gartner News, Monday, September 18,2023
By 2026, 80% of large enterprise finance teams will rely on internally managed and owned generative AI platforms trained with proprietary business data, according to Gartner, Inc.
Gartner analysts are discussing the characteristics and best practices of finance organizations that have successfully introduced AI during the Gartner CFO & Finance Executive Conference which is taking place here through Tuesday.
more
|
|
|
Data Governance In The Age Of Generative AI Dataversity, Monday, September 18,2023
Most (90%) of enterprises allow some level of AI adoption by employees, according to my company's 2023 Unstructured Data Management Report. In the same vein, the Salesforce State of IT report found that 86% of IT leaders believe generative AI will have a prominent role in their organization soon. Yet, there are many potential hazards inherent in this new form of AI, from privacy and security risks to ethics concerns, inaccuracy, data bias, and malicious actors. Government and business leaders are analyzing the issues and weighing solutions for safely and successfully adopting AI.
This article reviews the latest research on AI as it pertains to unstructured data management and enterprise IT plans.
more
|
|
|
Generative AI Report insideBIGDATA, Tuesday, September 19,2023
We've been receiving so many cool news items relating to applications and deployments centered on large language models (LLMs), we thought it would be a timely service for readers to start a new channel along these lines. The combination of a LLM, fine tuned on proprietary data equals an AI application, and this is what these innovative companies are creating. The field of AI is accelerating at such fast rate, we want to help our loyal global audience keep pace.
more
|
|
Intel Aims To Boost Processor Speeds With New Glass Substrate Technology SiliconANGLE , Monday, September 18,2023
The chipmaker detailed the plan today ahead of its annual Intel Innovation event, which is dedicated to new semiconductor technologies. At the center of the development effort is a component known as a glass substrate. The component, which took more than 10 years and $1 billion to develop, is expected to start shipping with Intel chips in the second half of this decade.
'After a decade of research, Intel has achieved industry-leading glass substrates for advanced packaging,' said Intel Senior Vice President Babak Sabi. 'We look forward to delivering these cutting-edge technologies that will benefit our key players and foundry customers for decades to come.'
more
|
|
|
Sambanova Tackles Generative AI With New Chip And New Approach The Next Platform, Wednesday, September 20,2023
Finding $1 billion, of which maybe $800 million will end up going to Nvidia, is only one of those problems. Finding someone to sell you the 20,000 or so of Nvidia's 'Hopper' H100 GPUs is another problem, and if you can't do that, then getting the budget together to pay even more to rent those GPUs on a public cloud and lining up the capacity is also a huge problem.
Luckily for the Global 2000, not a single one needs to train their own LLM from scratch. And what is true of these upper echelon companies is also true of what we would call all bust a handful of the Global 50,000, the list of organizations that include large enterprises, HPC centers, hyperscalers and cloud builders, national and regional governments, and large academic institutions on planet Earth.
more
|
|
|
4 Emerging Technologies for CIOs to Watch in 2023 ITProToday, Monday, September 18,2023
CIOs have a responsibility to pay attention to emerging technologies and trends to find opportunities to improve productivity and enhance operational efficiency. Investing in emerging technologies can allow CIOs to create a competitive advantage. Yet while many emerging technologies offer potentially transformational benefits, CIOs must also be aware of the challenges they may pose, such as security and privacy concerns or operational complexity.
more
|
|
|
What Is Data Compression & How Does It Work? Datamation, Tuesday, September 19,2023
By reducing the size of files, data compression minimizes the network bandwidth required to share them and the capacity needed to store them, lowering costs. This guide offers an in-depth exploration of how data compression works and why it is valuable as well as the most common methodologies, advantages, challenges, applications, and more.
more
|
|
|
AMD Finishes Out The Zen 4 Server CPUs With Edgy 'Siena' The Next Platform, Monday, September 18,2023
What makes 2023 different from 2003 is that these differences in the salient characteristics and packaging of these processors is more explicit and arguably more rich. With today's launch of the 'Siena' Epyc 8004 processors, based on the Zen 4c cores, AMD has completed the set, and soon all attention will turn to the 'Turin' Zen 5 generation due in 2024 and we are already hearing rumblings about the 'Venice' Zen 6 that we expect in 2025.
As we detailed back in June when the 'Bergamo' Epyc server variants debuted with the Zen 4c cores, the basic difference between the Zen 4 and the Zen 4c core that the former has 4 MB of L3 cache per core and the latter cuts that back to 2 MB of L3 cache per core.
more
|
|
The Future Of ERP: With Composable ERP, Interoperability And Integration Are Not Optional CIO, Tuesday, September 19,2023
There are many facets to interoperability and integration, and any of them can derail your success with composable ERP.
Interoperability embodies the ability of solution components to exchange and use data. Not only must the ability to integrate (pass data back and forth) exist, but data must be usable by the various components - and not onerously so! Interoperability risk occurs as each new component is added to the solution portfolio. While integration and interoperability issues can arise in data, security, process, or governance, the following are critical to get right:
more
|
|
5 Ways Building Monitoring Analytics Can Improve Data Center Operations DataCenter Knowledge, Tuesday, September 19,2023
Smart building monitoring devices are nothing new. You need not be a futurist to know it's now possible to collect a wealth of information from sensors within buildings, then analyze it for a variety of purposes. But how, exactly, can data centers benefit from building monitoring? Which use cases is building monitoring analytics for data centers best suited to address? Related: AI and Cloud Workloads Drive Data Center Demand
To unpack those questions, let's look at the current state of building monitoring for data centers and the ways that data center operators can put them to use.
more
|
|
|
7 Common Data Center Migration Challenges To Avoid Search Data Center, Monday, September 18,2023
Data center migration can be challenging, but proper planning can prevent some issues and pitfalls. Organizations should be aware of the most common problems in data center migration to avoid excess cost, delays and potential data loss.
With plenty of planning, a practice run and careful execution, any organization can successfully migrate its data center. Consider the following seven challenges to plan around and prevent issues during the migration process.
more
|
|
|
Schneider Electric Warns That Existing Datacenters Aren't Buff Enough For AI The Register, Tuesday, September 19,2023
The infrastructure behind popular AI workloads is so demanding that Schneider Electric has suggested it may be time to reevaluate the way we build datacenters. In a recent white paper [PDF], the French multinational broke down several of the factors that make accommodating AI workloads so challenging and offered its guidance for how future datacenters could be optimized for them. The bad news is some of the recommendations may not make sense for existing facilities.
The problem boils down to the fact that AI workloads often require low-latency, high-bandwidth networking to operate efficiently, which forces densification of racks, and ultimately puts pressure on existing datacenters' power delivery and thermal management systems.
more
|
IT News - Security |
|
|
How Security Leaders Think About Data Security Governance Cyral, Tuesday, September 19,2023
We have an extended board of advisers, investors, and customers who were very generous with their time, and helped us develop a thorough model of data security and how it pertains to different types of structured and unstructured data.
Our team thought it would be a good idea to share some of these insights back with the community. This blog post summarizes results from an open-ended survey we shared with close to 100 security leaders. We hope that this benefits security practitioners across the board.
more
|
|
|
Role-Based Security Awareness Training: Planning & Delivering To Manage Risks Click Armor, Monday, September 18,2023
For example, your higher-level executives are more likely to be spear-phished, so your role-based training would include specialized spear-phishing training for each C-level. Then, your marketing team handles a lot of passwords, so you also have additional training for the marketing team focused on passwords.
But, the question is: Does role-based training work? And is it feasible for smaller businesses? In our twenty-third live Cyber Security Awareness Forum, I brought together a panel of cyber security experts to answer these questions.
more
|
|
|
How NIST Cybersecurity Framework 2.0 Tackles Risk Managemen Security Intelligence, Monday, September 18,2023
The updated CSF is being aligned with the Biden Administration's National Cybersecurity Strategy, according to Cherilyn Pascoe, senior technology policy advisor with NIST, at the 2023 RSA Conference. This sets up the new CSF to build risk management strategies.
When used as a risk management resource, the CSF can be applied in the context of the National Cybersecurity Strategy's five pillars, Pascoe said.
more
|
|
|
XDR vs SIEM vs SOAR: Choosing The Best Security Solution Security Boulevard, Wednesday, September 20,2023
When it comes to coverage and capabilities, many believe that extended detection and response (XDR) is ahead of its field. However, does it really supersede the traditional incident response platforms like SIEM and SOAR? Is it suitable for all types of cybersecurity attacks and incidents? What sets XDR apart? Are these even the right questions to be asking in order to select a solution that will maximize ROI and SOC outcomes?
more
|
|
|
What Is Continuous Threat Exposure Management (CTEM)? Security Boulevard, Tuesday, September 19,2023
In practical terms, CTEM focuses on exposing corporations and organizations to the threats that pose the most significant risks to their information security through continuous processes and frequent assessment of existing threat protection measures. What Is Continuous Threat Exposure Management (CTEM)?
Continuous Threat Exposure Management (CTEM) is the process of identifying, measuring, and prioritizing risks to critical assets.
more
|
|
Linux Networking: A Simplified Guide To IP Addresses And Routing Linux Journal, Thursday, September 21,2023
Understanding Basic Networking Concepts
What is an IP address? Every device connected to a network has a unique identifier known as an IP address. This serves as its 'address' in the vast interconnected world of the Internet.
Subnet Masks and Gateways ...
more
|
|
How To Create A Multi-Cloud Strategy Enterprise Storage Forum, Wednesday, September 20,2023
Cloud services can be engaged to provide more computing power and storage, to scale capacity while only paying for resources you use, as part of a disaster recovery and failover plan, or simply to avoid vendor lock-in with a single cloud provider. Whatever the reason, businesses need a formal strategy for managing their operations in a multi-cloud environment. This article explains how to create such a strategy and looks at the benefits and challenges of a multi-cloud approach.
more
|
|
|
Pillars Of Cloud Security Security Boulevard, Tuesday, September 19,2023
In fact, nearly two-thirds of organizations are using the same security approach for their on-premises and cloud networks.
'We don't want to treat cloud security in a silo, but we don't want to 'copy and paste' our security approach from on-premises to cloud,' said Will Silverstone, senior security consultant, Mandiant, during a session at Google Next23.
more
|
|
|
On-Premises Data Centers Play Key Role In Distributed Clouds Search Cloud Computing, Tuesday, September 19,2023
As organizations strive to transform into digital businesses and sell more digital products and services, tey tend to become more data-centric, speed up their operations with AI-based automation and use several public cloud service providers, according to a recent survey by TechTarget's Enterprise Strategy Group.
But a multi-cloud approach -- an essential component of transformation -- is fraught with complexity. Organizations named network interconnection, integrating with legacy environments and meeting performance expectations among the significant challenges.
more
|
|
|
3 Rules To Avoid High Multi-Cloud Integration Costs Search Cloud Computing, Thursday, September 21,2023
Enterprises that adopt cloud computing often find themselves with multiple cloud providers due to geographic coverage of providers, differences in available features or the desire to avoid lock-in. Multi-cloud is usually more expensive, and the way multiple clouds integrate with each other and data centers can significantly affect costs.
The key step when reviewing multi-cloud integration is to consider workflows. Most enterprises would have little difficulty with integration if multi-cloud strategies affected only hosting costs. The problem is that cloud-based applications move data in workflows that link application components. When these workflows cross cloud boundaries, they almost always generate ingress and egress charges.
more
|
|
Engineering-Grade Ot Protection DARKReading, Tuesday, September 19,2023
Much has been written about the differences between conventional IT networks and operational technology (OT) or industrial control system (ICS) networks: patching is harder in OT networks, antivirus is harder, OT networks use very old protocols and computers, and there is enormous resistance to change from the people who manage these networks. These differences are, however, all superficial. The intrinsic difference between these two kinds of networks is consequences: most often, the worst-case consequences of cyberattacks are sharply, qualitatively different on IT versus OT networks.
more
|
|
Guide To IoT In 2023: What's New And Why It Matters? Small Biz EPP, Monday, September 18,2023
The rise of IoT signifies a monumental shift in the technological landscape. It represents the convergence of the physical and digital realms, where everyday objects are imbued with the power of the internet, allowing them to communicate, analyze, and act. This seamless integration offers unprecedented opportunities, especially for businesses looking to harness the potential of real-time data analytics, supply chain optimization, and enhanced customer experiences.
more
|
|
|
IoT Security Best Practices: 2023 Guide To Safeguard Your Devices Endpoint Security, Wednesday, September 20,2023
From smart thermostats regulating our home temperatures to intricate sensors optimizing supply chains, IoT devices have seamlessly woven themselves into the fabric of our daily lives. As highlighted in Guide to IoT, the evolution of IoT has been nothing short of transformative, with billions of devices now interconnected, communicating, and sharing data in real-time. It is critical to consider what the best practices for IoT security are.
more
|
|
|
Why IoT Raises Concerns About Identity Theft ForgeRock, Tuesday, September 19,2023
We are all familiar with consumers' acceptance of IoT technology, and part of that is due to convenient capabilities, such as learning and adapting without direct instruction. For example, smart devices, such as IoT-equipped vacuum cleaners, can map a room and avoid obstacles while cleaning. But convenience is just the beginning. A smart device can call the police if an intruder is detected or alert a doctor when a patient is exhibiting certain symptoms, such as heart arrhythmia.
On the business side, IoT technology can create a variety of tangible benefits, such as cost savings, revenue growth, and improved customer experiences. Companies can use smart fixtures like lights and air conditioning units to conserve energy and reduce costs. They can use IoT sensors to monitor inventory and address supply-chain issues before sales are impacted. And they can use IoT platforms that provide real-time support for customers with simple questions.
more
|
|
The 'Great Retraining': IT Upskills For The Future CIO, Monday, September 18,2023
Maggie Chavarin is no stranger to reinventing her career. She joined Synchrony more than a decade ago in a Merchants Services role that allowed her to be a work-from-home mom. When the timing was right, Chavarin honed her skills to do training and coaching work and eventually got her first taste of technology as a member of Synchrony's intelligent virtual assistant (IVA) team, writing human responses to the text-based questions posed to chatbots.
more
|
|
Install VirtualBox On Windows [So That You Can Run Linux VM] It's FOSS, Monday, September 18,2023
We have covered a tutorial to install VirtualBox on Ubuntu. Let me highlight the steps for a Windows system. > The steps will be the same for the latest Windows 10 or 11 and older. Two easy ways to get Oracle VirtualBox installed on Windows:
> Download the installer for Windows and follow the on-screen instructions
Use the winget tool
more
|
|
10 Best Practices For Effective Data Management In 2023 Datamation, Thursday, September 21,2023
Proper data management practices should be a foundational component of every enterprise strategy. This article outlines the top 10 data management best practices that can help businesses harness the power of their data for better decision-making, compliance, and overall efficiency.
more
|
|
|
Top 15 Data Management Platforms Available Today CIO, Friday, September 22,2023
A data management platform (DMP) is a suite of tools that helps organizations to collect and manage data from a wide array of first-, second-, and third-party sources and to create reports and build customer profiles as part of targeted personalization campaigns. Deploying a DMP can be a great way for companies to navigate a business world dominated by data, and these platforms have become the lifeblood of digital marketing today.
more
|
|
Java News Roundup: JCP 25th Anniversary, Foreign Function & Memory API, Eclipse Epicyro InfoQ, Monday, September 18,2023
OpenJDK
JEP 454, Foreign Function & Memory API, has been promoted from its JEP Draft 8310626 to Candidate status this past week. This JEP proposes to finalize this feature after two rounds of incubation and three rounds of preview: JEP 412, Foreign Function & Memory API (Incubator), delivered in JDK 17; JEP 419, Foreign Function & Memory API (Second Incubator), delivered in JDK 18; JEP 424, Foreign Function & Memory API (Preview), delivered in JDK 19; JEP 434, Foreign Function & Memory API (Second Preview), delivered in JDK 20; and JEP 442, Foreign Function & Memory API (Third Preview), to be delivered in the upcoming GA release of JDK 21.
more
|
|
|
Java 21 Gets 15 Major Enhancements And Long-Term Support SiliconANGLE , Tuesday, September 19,2023
Introduced 28 years ago, Java is the world's fourth most widely used programming language, according to Tiobe Software BV, and is especially popular with enterprise developers. Oracle said there are 60 billion active Java virtual machines in use, with 38 billion of them in the cloud.
'We hear time and time again that customers' choice to invest in Java has paid dividends because it navigates to where they want it to be,' said Georges Saab, senior vice president of development for the Java platform and chairman of the OpenJDK Governing Board. 'Not only do the updates come when intended but the work on new features is very transparent. They can see every change as it's going in. They can see the code reviews that are done and the questions that people are asking.'
more
|