Tue.Nov 29, 2016

article thumbnail

Plan Hybrid IT Like You Would Plan Your Family Vacation

Data Center Knowledge

It's 2016, and we want things to be efficient, safe and flawless. We plan our vacations around these requirements, why not plan our IT infrastructure the same way? Read More.

Industry 197
article thumbnail

Group litigation against Post Office in Horizon system dispute prepares for next stage

Computer Weekly

Postmasters’ legal case against the Post Office claims that computer system is to blame for losses, not false accounting or theft

System 209
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Mission Critical Cloud: Designing an Enterprise Cloud

Data Center Knowledge

As more organizations adopt enterprise cloud, it's become even more important to support the critical apps sitting on top. Now, find out the key considerations when designing your mission-critical enterprise cloud. Read More.

article thumbnail

Growing multi-cloud demand means providers must diversify to survive, warns 451 Research

Computer Weekly

Two reports from analyst house 451 Research suggest cloud providers must consider adding support for competing services to their portfolios in order to survive in the hybrid, multi-cloud era

Research 178
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Azure Stack in 6 Months, Says HPE Exec

Data Center Knowledge

The timeframe is finally tightening for the release of Microsoft’s long awaited data center operating platform, Azure Stack, based on the same platform that runs the company’s public cloud service — at least from the perspective of Microsoft’s partners. In remarks made during the Tuesday general.

article thumbnail

Deutsche Telekom botnet attack underlines infrastructure vulnerabilities

Computer Weekly

German telco says its broadband outages are linked to a botched attempt to hijack routers, which security experts say further underlines the cyber threat to internet connected infrastructure

Internet 178

More Trending

article thumbnail

How a London club enhanced its facilities with wireless charging

Computer Weekly

The Clubhouse, a London-based business club and meeting space, introduces wireless charging technology from startup Chargifi at its St James’ location as it bids to attract new clients

Wireless 172
article thumbnail

HPE to Offer Flash Storage ‘as-a-Service’ to Compete with the Cloud

Data Center Knowledge

In a kickoff announcement just prior to its annual Discover conference in London, HPE told attendees it has begun offering its 3PAR StoreServ flash-based on-premise storage platform on an “as-a-Service” basis, at prices starting at 3 cents per “usable gigabyte” per month. There are telltale.

Storage 171
article thumbnail

IBM blamed for Australian census website crash

Computer Weekly

Computer giant reportedly pays $30m to Australian government as reports are released from two inquiries into DDoS attacks on census website

IBM 184
article thumbnail

?Is the cloud really just someone else's computer?

Tech Republic Cloud

A popular meme is that the cloud is just "someone else's computer." Jack Wallen explains why the cloud is so much more complex than the meme would have you believe.

Cloud 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

BT and Openreach to split: but what will change as a result?

Computer Weekly

The telecoms industry has welcomed Ofcom’s decision to legally split BT and Openreach, but what, if anything, will actually change?

Industry 188
article thumbnail

5 steps for a successful large-scale cloud migration to AWS

Tech Republic Cloud

At the 2016 AWS re:Invent conference, a leader from Amazon Web Services discussed how executives can understand their readiness for a major move to the cloud.

Cloud 126
article thumbnail

Samsung Electronics considers split

Computer Weekly

Samsung Electronics is considering a proposal to simplify its structure under pressure from shareholders as it tries to deal with fallout from the Galaxy Note 7 recall

167
167
article thumbnail

Europe: NCTA CloudMASTER® Hotspot

Cloud Musings

The ongoing digital transformation continues to generate a steady demand for workers with increasingly sophisticated digital skills. This process is multi-dimensional and workers with these highly specialized skills are very much sought after. The European Union Commission estimates that there could be a shortage of around 800,000 information and communications technology (ICT) specialists in the EU by 2020.

Training 107
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Finnair digitises core business processes via Apple and IBM

Computer Weekly

Finnair is working with IBM to bring user-friendly apps to its internal workforce

IBM 214
article thumbnail

2016: A systems security disaster

Network World

This will likely make you angry. It made me livid. . It’s a report, 34 pages long, from the Identity Theft Resource Center of the known systems breaches just this year. Read it and rage. . It does not include the San Francisco Metro Transit Authority (SFMTA) hack from Thanksgiving weekend , where the SFMTA had to let passengers go free through the gates.

System 106
article thumbnail

HPE demos memory-driven architecture for next-generation IT

Computer Weekly

HPE aims to push the limits of computing by moving the memory bottleneck it claims is limiting the performance of application software

article thumbnail

How Harvard University secures its cloud network with Amazon

Tech Republic Security

Recently, at the AWS re:Invent conference, Harvard's manager of cloud architecture detailed the main investments that the university made in order to secure its cloud.

Cloud 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ofcom to legally separate BT and Openreach

Computer Weekly

Telecoms regulator Ofcom is to push ahead with plans to require the legal separation of BT and Openreach

168
168
article thumbnail

Amazon employee jumped from building after sending email to co-workers and CEO

Network World

An Amazon employee sent out an email to “hundreds” of his co-workers and even Amazon top dog CEO Jeff Bezos. Then he went to the roof of the building and jumped in what appears to be an attempted suicide. A spokesperson for the Seattle Fire Department told SeattlePI that a man did jump from the “rooftop at an Amazon building at Ninth Avenue North and Thomas Street.

Google 98
article thumbnail

iCalendar users: Noticing spam invitations? Here's what's happening and how to fix it

Tech Republic Security

The problem is unique to iCalendar users and it stems from Apple's desire to make things easier for us. Luckily there is a way to get rid of those random, often unintelligible, invites.

How To 95
article thumbnail

Goodbye SIEM, Hello SOAPA

Network World

Security Information and Event Management (SIEM) systems have been around for a dozen years or so. During that timeframe, SIEMs evolved from perimeter security event correlation tools, to GRC platforms, to security analytics systems. Early vendors like eSecurity, GuardedNet, Intellitactics, and NetForensics, are distant memories, today’s SIEM market is now dominated by a few leaders: LogRhythm, McAfee (aka: Nitro Security), HP (aka: ArcSight), IBM (aka: QRadar), and Splunk.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Security Jobs In IT: Reasons why very few people are willing to fill it

Galido

Cybersecurity, the protection of online systems and documents is well on its way to having a crisis. There are currently more jobs available than there are qualified people to fill them. Research and general opinion both agree that this issue is likely to become steadily worse over the next few years. One of the clearest signs of the impending issue was visible at the recent Black Hat Cybersecurity conference.

article thumbnail

Isolation technologies create an “air gap” to eliminate the risk of malware

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Like the threat landscape itself, web gateways have changed over the years. Back in the 1990s, organizations primarily used them to prevent employees from wasting time surfing the web – or worse, from visiting gambling, adult and other unauthorized websites.

Malware 94
article thumbnail

5 architectural principles for building big data systems on AWS

Tech Republic Big Data

If your company is looking to make a bet on big data in the cloud, follow these best practices to find out what technologies will be best for your AWS deployment.

article thumbnail

The new Mirai strain has gone far beyond Deutsche Telekom

Network World

The latest strain of Mirai, the malware that’s been infecting internet routers from Germany’s Deutsche Telekom, has spread to devices in at least 10 other countries, according to security firm Flashpoint. The company has detected the new Mirai strain infecting internet routers and modems across the globe, including in the U.K., Brazil, Iran and Thailand.

Malware 93
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Privacy advocates rejoice: A new way to anonymize data might actually work

Tech Republic Big Data

Researchers at Radboud University have developed an anonymization process using polymorphic encryption and pseudonymisation. Applications may include securing healthcare and IoT data.

article thumbnail

DARPA building space consortium to set standards for safe robotic maneuvers

Network World

DARPA next month will talk about a proposed consortium of industry players that will research, develop, and publish standards for safe commercial robotic servicing operations in Earth’s orbit. Specifically, DARPA said it wants to create the Consortium for Execution of Rendezvous and Servicing Operations or CONFERS that looks to establish a forum that would use best practices from government and industry to research, develop and publish non-binding, consensus-derived technical and safety standard

article thumbnail

Thoughts on AWS re:Invent Day 1

Scott Lowe

As I wrap up Day 1 of AWS re:Invent 2016 in Las Vegas (can I consider today to be day 1?), I wanted to capture a quick summary of thoughts about the sessions, the content, the attendees, and the event (not necessarily in that order). First, here are some links to the liveblogs I posted from today’s sessions: Liveblog: Scaling to Your First 10 Million Users.

Hotels 65
article thumbnail

Senators plan last-ditch push to curb US law-enforcement hacking power

Network World

Unless Congress takes 11th-hour action, the FBI and other law enforcement agencies will gain new authority this week to hack into remote computers during criminal investigations. Proposed changes to Rule 41 , the search and seizure provision in the Federal Rules of Criminal Procedure, would give U.S. law enforcement agencies the authority to cross jurisdictional lines and hack computers anywhere in the world during criminal investigations.

87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.