How To Ask A Question At A Conference

question-mark-706906_1280

The last time you went to a conference, did you ask any questions? Were you curious about a technology and wanted to know more? Was there something that you didn’t quite get and needed an explanation? Congratulations. You’re in a quiet group of people that ask questions for knowledge. More and more, we are seeing questions becoming a vehicle for more than just knowledge acquisition. If you want to learn how to ask a proper question at a conference, read on.

1. Have A Question

I know it goes without saying, but if you’re going to raise your hand at a conference to ask a question, you should actually have a question in mind. Some people grab a microphone without thinking through what they’re going to say. This leads to stammering and broken thoughts that usually culminate in a random question mark here or there. This makes it difficult for the speaker to figure out what you’re trying to ask.

If you’re going to raise your hand, jot some notes down first. Bullet points help as does making a note or two. This is especially true if the speaker is answering questions before yours. If they answer part of your Continue reading

Getting Hyper About Converged Storage, And Then Some

There is no question that information technology is always too complex, and that people have been complaining about this for over five decades now. It keeps us employed, so perhaps we should not point this out, and moreover, perhaps we should not be so eager to automate ourselves out of jobs. But if the advance of computing from mainframes to artificial intelligence teach us anything, it is that we always want to make IT simpler to get people out of the way of doing business or research.

The founders of hyperconverged systems maker Nutanix learned its lessons from hyperscalers like

Getting Hyper About Converged Storage, And Then Some was written by Timothy Prickett Morgan at The Next Platform.

IBM package brings Watson smarts to everything IoT

IBM has released an experimental program developers can use to embed Watson cognitive intelligence features in all manner of IoT systems from robots and drones to sensors and avatars.IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users.  Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated.To read this article in full or to leave a comment, please click here

IBM package brings Watson smarts to everything IoT

IBM has released an experimental program developers can use to embed Watson cognitive intelligence features in all manner of IoT systems from robots and drones to sensors and avatars.IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users.  Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated.To read this article in full or to leave a comment, please click here

Microsoft launches ‘Feature Pack’ for SharePoint 2016

The traditional update to a major product release is a service pack, which is mostly bug fixes and maybe a few new features. But Microsoft is doing something a little different with the release of "Feature Pack 1" for SharePoint 2016. + Also on Network World: Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical + Microsoft released SharePoint Server 2016 in May, along with mobile apps for iOS and Android shortly thereafter. Mobile access was one of the major emphasis points in SharePoint 2016, along with hybrid cloud support and Office 365 support. To read this article in full or to leave a comment, please click here

Why employee experience trumps company culture

There's been a lot of talk about engagement in the workplace -- whether or not employees are happy and satisfied, and what that means for their work performance. In a two-year study of the American Workplace, Gallup found that as much as 70 percent of the U.S. workforce is not engaged at work. This isn't a recent trend, either. The report indicates that over the past 15 years, engagement has consistently held under 33 percent.Engagement is often tied to company culture -- the idea being that providing the right perks and environment for your workers will boost engagement. But the stats suggest that the past few years of focusing on company culture hasn't done much to boost engagement. That's why Aye Moah, chief of product at Boomerang, a company focused on productivity software, suggests backing off company culture and focusing on the "employee experience."To read this article in full or to leave a comment, please click here

Why Microsoft is going all-in on AI

Microsoft is betting on artificial intelligence (AI) with the creation at the end of September of a new AI and Research Group. This newly formed group brings together Microsoft's research organization and more than 5,000 computer scientists and engineers focused on AI and is now the fourth major division in the company, on par with the Windows, Office and Cloud divisions.The job of the AI and Research Group will be to work on four overarching initiatives: Harnessing AI through agents such as Cortana, the company's digital personal assistant Infusing AI into Skype, Office 365 and every other Microsoft application Making cognitive capabilities such as vision and speech and machine analytics available to external developers Using Azure to build a powerful AI supercomputer in the cloud to provide "AI as a Service” [ Get ready for the bot revolution]To read this article in full or to leave a comment, please click here

The scary state of the cybersecurity profession

Most discussions about cybersecurity tend to go right to technology, and these days they usually start with the words “next generation” as in next-generation firewalls, IPS, endpoint security, etc. I get it, since innovative technology is sexy, but it’s important to realize that skilled cybersecurity professionals anchor cybersecurity best practices.  We depend on actual people to configure controls, sort through data minutiae to detect problems, and remediate issues in a timely manner.+ Also on Network World: Recruiting and retaining cybersecurity talent + Since these folks protect all our digital assets daily, it’s only natural that we’d be curious as to how they are doing. To measure these feelings, ESG teamed up with the Information Systems Security Association (ISSA) and conducted a survey of 437 global cybersecurity professionals. This project resulted in a recently published research report. To read this article in full or to leave a comment, please click here

The scary state of the cybersecurity profession

Most discussions about cybersecurity tend to go right to technology, and these days they usually start with the words “next generation” as in next-generation firewalls, IPS, endpoint security, etc. I get it, since innovative technology is sexy, but it’s important to realize that skilled cybersecurity professionals anchor cybersecurity best practices.  We depend on actual people to configure controls, sort through data minutiae to detect problems, and remediate issues in a timely manner.+ Also on Network World: Recruiting and retaining cybersecurity talent + Since these folks protect all our digital assets daily, it’s only natural that we’d be curious as to how they are doing. To measure these feelings, ESG teamed up with the Information Systems Security Association (ISSA) and conducted a survey of 437 global cybersecurity professionals. This project resulted in a recently published research report. To read this article in full or to leave a comment, please click here

The best PC hardware we’re using now and why we love it

We heart this hardwareWe love all our gear, from our desktop PCs to every last one of our high-tech gadgets, but some pieces of kit hold a very special place in our hearts. It can’t be helped. A component either fulfills its performance promise so spectacularly, or it perfectly satisfies a particular need, or we’re just plain attached to it out of well-worn habit.To read this article in full or to leave a comment, please click here

The best PC hardware we’re using now and why we love it

We heart this hardwareWe love all our gear, from our desktop PCs to every last one of our high-tech gadgets, but some pieces of kit hold a very special place in our hearts. It can’t be helped. A component either fulfills its performance promise so spectacularly, or it perfectly satisfies a particular need, or we’re just plain attached to it out of well-worn habit.To read this article in full or to leave a comment, please click here

Review: Microsoft takes on TensorFlow

Like Google, Microsoft has been differentiating its products by adding machine learning features. In the case of Cortana, those features are speech recognition and language parsing. In the case of Bing, speech recognition and language parsing are joined by image recognition. Google’s underlying machine learning technology is TensorFlow. Microsoft’s is the Cognitive Toolkit. To read this article in full or to leave a comment, please click here(Insider Story)

Los Angeles: Warm weather, movie stars — and 100 million monthly cyber attacks

Los Angeles is famous for its warm weather and movie stars. But what may not be as well known is that it's also one of the largest targets for cyber attacks in the world.The city's infrastructure in highways, water and power -- and all the data behind it -- supports 4 million residents in the nation's second largest city. The city also collects data about Los Angeles International Airport as well as about the largest shipping port in the western hemisphere, where 43% of imported goods enter the U.S. The city government is even responsible for data related to elections, including yesterday's national election.It's not difficult to see the enormity of the city's security challenge, which includes protecting the personal data of city workers and residents.To read this article in full or to leave a comment, please click here