Wed.Nov 30, 2016

article thumbnail

Why Smart Manufacturing is a Dumb Idea

CTOvision

Steven Blue. Someone asked me recently my thoughts on Smart Manufacturing. The so-called IT revolution in the factory. They couldn’t believe that I didn’t see Smart Manufacturing as the salvation of American manufacturing. Don’t misunderstand me. Smart Manufacturing has a place in reviving American manufacturing. I have a smart factory. We employ the latest in pick to light systems, automated CNC machines and seamless integration from order inquiry to accounts receivable.

Study 221
article thumbnail

BP to go all-in on public cloud to cut datacentre upkeep costs

Computer Weekly

Oil giant BP uses first day of AWS Re:Invent to outline how it is cushioning itself against falling oil prices by using cloud to cut costs

Cloud 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Preparing for Today’s Changing Tech Needs at Re:Invent 2016

Data Center Knowledge

There are several cloud topics that will dominate AWS Re:Invent such as getting ahead of the rampant increase in data breaches and how to monitor in the cloud. Read More.

Cloud 163
article thumbnail

HPE fleshes out IoT strategy

Computer Weekly

HPE is moving from IT to operational technology with a set of products and tie-ups to target industrial internet of things applications

Strategy 193
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

‘Deep Tech’ Dominates Plateauing European Venture Capital

Data Center Knowledge

The kind of artificial intelligence developed by Google’s DeepMind, or typing prediction from Microsoft-acquired SwiftKey are drawing an increasing share of European venture funding. Read More.

article thumbnail

Mastercard uses artificial intelligence for transaction approval

Computer Weekly

Mastercard is using artificial intelligence to reduce the number of transactions that are wrongly declined, while maintaining security

More Trending

article thumbnail

Transport Scotland turns to IoT mapping to keep roads clear in cold snap

Computer Weekly

Scottish transport authority is using Esri’s location technology to keep tabs on its gritters in icy weather

article thumbnail

HPE Dumps OpenStack, Cloud Foundry Assets Onto SUSE

Data Center Knowledge

HPE has agreed to hand over its interest in both the OpenStack hybrid cloud platform and Cloud Foundry cloud-native apps platform. Read More.

Cloud 174
article thumbnail

Thousands of National Lottery accounts hacked

Computer Weekly

National Lottery operator Camelot says the log-in details of thousands of people who do the lottery online have been stolen

196
196
article thumbnail

Five Things You Need to Know About the U.K.’s Mass Surveillance Law

Data Center Knowledge

Whatever the merits of the Act, it has significant implications for service providers in the cloud and web hosting industry. Read More.

Industry 172
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Security Think Tank: Managing cyber risk requires genuine understanding

Computer Weekly

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

Security 189
article thumbnail

How to install VirtualBox Guest Additions on a GUI-less Ubuntu server host

Tech Republic Data Center

The VirtualBox Guest Additions gives a performance boost and extra features to your hosts. Follow these steps to install this package on a GUI-less Ubuntu server guest.

How To 130
article thumbnail

Blockchain-based gold trading planned for 2017

Computer Weekly

Thousand-year-old organisation The Royal Mint is the latest financial services business to harness blockchain technology

Financial 183
article thumbnail

Amazon unveils new data center hardware to get you securely into the cloud

Tech Republic Data Center

At the 2016 re:Invent conference, AWS CEO Andy Jassy unveiled two new products, the Snowball Edge and Snowmobile, to make it even easier to get your data into the cloud.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Marriott Hotels offers virtual site tours

Computer Weekly

Hotel chain has enlisted London mobility startup GoInStore to offer visitors to its website virtual facility tours

Hotels 176
article thumbnail

Microsoft adds real-time collaboration to PowerPoint and Outlook cloud attachments

Tech Republic Cloud

Four new Microsoft Office 365 updates aim to help enterprise users collaborate better. The most useful one may be a powerful new capability in OneDrive.

Microsoft 123
article thumbnail

CityFibre targets underserved businesses with fibre broadband

Computer Weekly

Urban fibre supplier CityFibre is to connect 500 business parks across its 40-city UK network footprint to full-fibre services

Network 168
article thumbnail

Security products are among the most vulnerability-riddled software products

Network World

Why do you spend the big bucks for security products? For protection, right? But many of the top security vendors utilize open-source or third-party components and libraries which are seemingly packed with vulnerabilities. While this is something you already know, a new report found that security products are some of the most vulnerable software. Flexera Software, which acquired Secunia in 2015, noted that between August and October of 2016, 46 products made it to the top 20 most vulnerable prod

Software 114
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Disaster recovery testing: A vital part of the DR plan

Computer Weekly

Disaster recovery provision is worthless unless you test out your plans.

article thumbnail

Five essential cybersecurity audiobooks

Tech Republic Security

A curated list of cybersecurity audiobooks to help you better understand the history of computing, who hacks and why, and the future of cyber-defense.

120
120
article thumbnail

IBM warns of rising VoIP cyber-attacks

Network World

Cyber-attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months, according to a report from IBM’s Security Intelligence group this week. “SIP is one of the most commonly used application layer protocols in VoIP technology… we found that there has been an upward trend in attacks targeting the SIP protocol, with the most notable uptick occurring in the second half of 2016,” IBM

VOIP 96
article thumbnail

Video: 3 considerations IT must make before moving to the cloud

Tech Republic Data Center

Jay Kreps, CEO of Confluent, said that businesses should consider how gradual their move to the cloud will be, if they want to be cloud agnostic, and how they'll orchestrate apps in the cloud.

Cloud 72
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What’s in store for tech in 2017

Network World

Top tech predictions for 2017 It's the time of year for tech predictions. We've rounded up a slew of ideas from industry watchers who track IT budgets, cybersecurity, hiring, infrastructure management, IoT, virtual reality and more. Here are their predictions, projections and prognostications. IT spending set to rise 2.9% Growth in software and IT services revenue will drive an increase in worldwide IT spending, which Gartner forecasts will climb 2.9% to $3.5 trillion in 2017.

Budget 95
article thumbnail

Amazon goes all-in on AI and big data at AWS re:Invent 2016

Tech Republic Big Data

At the 2016 AWS re:Invent conference, CEO Andy Jassy unveiled new updates to compute, analytics, and artificial intelligence tools.

article thumbnail

IDG Contributor Network: 8 security tips for retailers and consumers this holiday season

Network World

It’s the time of year for holiday cheer. Hot chocolate, cookies, presents and other festivities abound. Shops dress up their windows in exotic displays, and festive lights can be seen everywhere. Yes, it’s the time of year when everything is grander and everyone seems happier. But it’s not always sunshine and roses during the holiday season. Trouble often lurks in the shadows—preying on both retailers and consumers.

Retail 95
article thumbnail

Liveblog: Introduction to Managed Database Services on AWS

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “Introduction to Managed Database Services on AWS” (DAT307). The speakers for the session are Steve Hunt, Alan Murray, and Robin Spira, all of FanDuel; and Darin Briskman, from AWS Database Services. Briskman kicks off the session with a quick review of AWS’ managed database offerings. These fall into four categories, which Briskman reviewed so quickly I couldn’t capture.

SOA 65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication

Network World

SecureAuth is in the business of adaptive access control. What that means in plain (or at least more plain) English is that the company offers security solutions that balance strength with ease of use and that adapt to different use cases. An example of adaptive access control might be requiring a simple username and password for regular access, but requiring a higher level of authentication when the user (for example) logs in from another geography. + Also on Network World: 5 trends shaking up

article thumbnail

Tech Forecast 2017: IT sharpens its focus

ComputerWorld IT Management

Tech executives are optimistic as they head into 2017. One of the biggest reasons for the hopeful outlook is the fact that business and IT are finally on the same page, with planned technology projects and overall strategic business goals closely aligned for the upcoming year.

63
article thumbnail

Android malware steals access to more than 1 million Google accounts

Network World

A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint. “We believe that it is the largest Google account breach to date,” the security firm said in Wednesday blog post. The malware, called Gooligan, has been preying on devices running older versions of Android, from 4.1 to 5.1, which are still used widely, especially in Asia.

Malware 93
article thumbnail

IDG Contributor Network: 25 tech certifications earning the highest cash premiums right now

ComputerWorld IT Management

[Author's Note: This is the second in a series highlighting the highest paying and fastest growing certified and noncertified tech skills at 3,000 U.S. and Canadian employers.] Why would an employer pay its tech workers extra cash for a skill or certification if they're already getting a salary and annual bonus? This is always the key question when it comes to understanding pay premiums for certified and noncertified tech skills.

Network 62
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.