Join leaders in Boston on March 27 for an exclusive night of networking, insights, and conversation. Request an invite here. In a stunning turn of events, Sam Altman, the high-profile CEO of OpenAI, will be rejoining the company’s board of directors just months after being ousted amid concerns about his leadership. The move comes as […]
I've had the opportunity to visit several infrastructure and operations industry events already this year. Each targeted the same basic message: a return to innovation. But I have to wonder, are we really ready for innovation? The last 18 months have been marked by a consistent and constant effort to demonstrate return on investment (ROI). Why, as we now enter 2010, is there a sudden emphasis on innovation? The answer is what I refer to as "new shiny object syndrome."
A cyber-attack linked to Iran this week is the latest in a string of cyber-events that some say represents a new step in a shadowy and long-running war between the Iranian government and those who criticize it on the Internet.
Risk management has been thrust to ‘top of mind’ status for company boards, CEOs and CFOs. Events like the recent BP oil spill would surely be a wake up call for all CFOs that events perhaps seen as ‘external’ factors can no longer be considered from a do-nothing mindset.
If you are in the security profession long enough, you realize that security policies are generally a pendulum that you have to live with. While the recent Wikileaks incident will cause information sharing within the Department of Defense and US Government as a whole to swing back the other way, you can bet that in a few years, it will swing back to wholesale information sharing again. Like many aspects of the world, security practices are--unfortunately--driven by the most recent events.
A couple of recent events have shown how purposefully useless the U.S. government is with regard to cybersecurity. Every so often, the FBI parades some success stories through the media. Unfortunately, what's behind them are prosecutions for show rather than true demonstrations of tackling cybercrime.
Microsoft's Silverlight technology has streamed some high-profile live events lately, the inauguration of U.S. President Barack Obama and the 2008 Summer Olympics among them. But Silverlight's real promise for the business customer -- to improve user interfaces for day-to-day applications -- has been thwarted by tightening budgets.
Time: The second Tuesday of every month, 10:00 a.m. PST. Like clockwork, Microsoft releases a group of security patches. And like clockwork, that release sets in motion a flurry of events from businesses, security vendors, the media and even hackers.
As if enjoying San Diego's pleasant summer weather wouldn't be great enough, here are 8 more reasons why some 140,000 people are expected to attend the annual Comic-Con 2012 confab for comic book, graphic novel, anime, video game, action figure and TV/movie enthusiasts that kicks off Wednesday night. This is one of those events whose fans are so passionate about it that it gets away with running through the weekend.
How do organizations move from lagging in their IT security program to leading? They must put an effective strategy in place, consistently meet that strategy, and have good visibility into the security events in their infrastructure. Looks good on paper, but how do you get there? CISOs say it boils down to executive vision and support.
This year's Microsoft Technology Summit in Poland is set to become a stage for two major events - the world's first presentations of Windows 7 and Windows Server 2008 R2 in their RTM (ready to manufacture) versions.
The former Microsoft employee accused of stealing company information is disputing Microsoft's version of events, saying the lawsuit against him is "a desperate attempt" to force him to abandon a patent infringement case.
In the past, most enterprises defined a disaster as an act of nature--a hurricane, tornado, flood or fire that wipes out their ability to conduct business as usual. Today, with worldwide networks, 24/7 customer call centers and Web applications, a common electrical failure could spell disaster when communication is interrupted in the supply chain, online transactions are halted or networks are down. Online resource Dictionary.com has even added "business failure" to the list of calamitous events that defin
2008 was a huge year for Cisco in terms of product transitions, strategic initiatives and business imperatives against the backdrop of a global economic recession. The following is a lineup of key events for the company as it closes out one of the most eventful years in its history.
The IT security team predicts there will be millions of filtered 'events' - any abnormal computer system behavior - during the Games of the XXIX Olympiad in Beijing. This would be three times the frequency of computer issues for the Torino Winter Olympics.
The first half of 2012 was pretty bad -- from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches -- and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
CES is one of the few big techie events that I was at least moderately familiar with before I started working here at Network World, less than a year ago. I always thought of it as the nerd playground to end all nerd playgrounds, with years-from-release technology available to the eager gadgeteer.
As I've mentioned in the four-part textbook review in recent issues, one of the most important tools of quantitative risk management is the annualized loss expectancy. The ALE is calculated by using probabilities of events (as the name implied, calculated over a period of a year) and the expected costs associated with those events.
The only thing that seems clear today is that the U.S. is in a recession and possibly a bad one. No one is certain what will happen next. Events are changing almost by the hour. How much help will a federal bailout deliver to the nation's financial system, which has been hard-hit by the downturn? Will more financial institutions collapse, and how far down will the stock market go? Will you have a job?
The Federal government pulled the plug on the ca.gov Web domain used by the State of California on Tuesday, setting into motion a chain of events that threatened to grind government business to a standstill within the state.
After holding an invitation-only conference for key open-source developers and community members in each of the past two years, the Linux Foundation is expanding its events schedule to add a conference focused on a broader attendee base.
Reports of data losses and system breaches are almost becoming passe but from time to time events happen that take on a life of their own and have effects far beyond what the initial breach would normally represent.
Last Friday, a U.S. District Court in Alexandria, Va., issued an injunction against Vonage that limits its ability to offer service to new customers unless Vonage changes the way new customers’ calls are connected to the PSTN. However, the judge stayed the injunction for six days to allow Vonage time to appeal. The bad news for Vonage keeps coming. Here’s a chronology of events: