- IT Strategy
- EA / SOA / BPM
- IT Innovation Briefings
- IT Due Diligence
- Vendor Selection
- Executive IT Seminars
- Cloud Computing
- Grid Computing
- Security Maturity
- Knowledge Strategy
- Technical Communities
- Knowledge Capture
- Enterprise Social Networking
|Forward this newsletter to colleagues and friends: use the "forward email" link below at left, rather than "Forward" in your email software, to preserve your privacy, give the recipient more options (their own unsubscribe link, etc.) and to give us better click-through data from ConstantContact. Thanks!||
|AIIM "Social Business" Virtual Conference|
|AIIM will hold a virtual conference on Social Business on Sept. 8 from 11:00 a.m. to 5:00 p.m. Eastern US time. After two keynotes, including one by Andrew McAfee, who coined the phrase "Enterprise 2.0," the event will split into three tracks: Strategies, Use Cases, Governance. The cost for the event is $95, and includes access to the recorded presentations for one month afterwards.|
Click here for more information and registration.
|At the ISACA Calgary Spring Conference in May, Robert Gusnowski (Principal, Alberta IT Management Services Ltd.) gave a talk on "The Growing Need for IT Governance." In fact, he focused so much on the information governance aspect that, while this is certainly a big part of the problem, the title is slightly misleading. Nonetheless, you may find the slides, which are accompanied by substantial notes, quite interesting.|
|Greplin: a Narcissistic Google?|
|We put so many pieces of information about ourselves and our topics of interest on the Internet that it becomes hard to remember where we put what. Is this reference something I sent in an e-mail, discussed on LinkedIn, etc.? Greplin, launched last September, is "a personal search engine that allows you to search all your online data in one easy place." When you register, you connect Greplin to your accounts on Gmail, LinkedIn, Facebook, Google Docs, Twitter, etc., and it indexes your data, then allows you to search them and present the results on a single page.|
Narcissistic? Certainly. Useful? Probably. The next Google, as some bloggers claim? Too early to tell.
|Universidad Polit�cnica de Madrid (UPM) quintupled its computing power with the installation of an IBM POWER7-based supercomputer called Magerit, which has a peak performance exceeding 100 teraflops and a sustained performance of 72 teraflops.|
Meanwhile, Japan and China hold the top two spots on the list of the top 500 supercomputers in the world. Japan's K Computer has a peak performance of 8 petaflops (that's 80 times the power of Magerit), and China's Tianhe-1A reaches about 2.5 petaflops.
While Japan and China have pushed the U.S. out of the top 4 slots in these rankings, a machine being built at the University of Illinois at Urbana-Champaign should give the current Japanese record holder serious competition and may even recover the top spot.
|Fasten Your Cloud Seatbelts|
|A recent study from the Fraunhofer Institute and the University of Darmstadt in Germany found that many security vulnerabilities in Amazon Cloud Services implementations are due to the users not following the recommendations provided by the supplier. One-third of the public Amazon Machine Images were reported to have serious vulnerabilities.|
"The best minds of my generation are thinking about how to make people click ads. That sucks."
-- Jeff Hammerbacher, Cloudera, via @leebryant on Twitter
"How many times must I say it: 'A product list is not an architecture.' Get a clue already."
-- Brenda Michelson, ElementalLinks, @bmichelson on Twitter