Fri.Dec 02, 2016

article thumbnail

Quick Look On Report of the President’s Commission on Cybersecurity

CTOvision

Bob Gourley. The report of the President's Commission on Enhancing Cybersecurity has just been posted to the White House Website. You can download the report here ). My quick thoughts: If you are a technologist or a security expert or have been tracking security issues, you can skip the first 10 pages. You know the state of things. This section is not meant for you.

Report 242
article thumbnail

Developers: Will AI Run You Out Of Your Job?

Forrester IT

Much has been written about how artificial intelligence (AI) will put white-collar workers out of a job eventually. Will robots soon be able to do what programmers do best -- i.e., write software programs ? Actually, if you are or were a developer, you've probably already written or used software programs that can generate other software programs. That's called code generation; in the past, it was done through "next" generation programming languages (such as a second-, third-, fourth-, or even f

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The digital opportunity for CIOs

Computer Weekly

CIOs have a unique opportunity to lead the digital strategy in their organisations, but they have to move quickly to make sure they have the right skills and infrastructure in place

Strategy 201
article thumbnail

Amazon AWS’ Presence in Italy May Look Strangely Nuclear

Data Center Knowledge

The likely sale of two closed, fuel oil- and coal-firing power facilities by Italy’s largest electricity provider, Enel, to Amazon Web Services for repurposing as cloud data center facilities — as discovered by Reuters Wednesday — appears to actually have been in the works for some time. The.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Businesses forget disability and accessibility when buying IT

Computer Weekly

Both customer and supply side IT organisations need to consider the needs of disabled people when embarking on new procurements, according to a recent study

Study 201
article thumbnail

DCK Exclusive: Infomart President John Sheputis Talks Strategy

Data Center Knowledge

In an interview with Data Center Knowledge, Infomart President John Sheputis talks strategy and discusses plans for 35 megawatts of development slated for 2017. Read More.

Strategy 171

More Trending

article thumbnail

Juniper Networks to Acquire Cloud Monitoring Firm AppFormix

Data Center Knowledge

If Juniper and AppFormix work as well as one unit as they did as a pair of partnered firms, the modernization of data center architectures may have just gotten a much-needed shot in the arm. Read More.

Network 169
article thumbnail

UK helps dismantle Avalanche global cyber network

Computer Weekly

The UK's National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries

Network 184
article thumbnail

Chipmakers Tumble Most Since June on Report Apple Cut Orders

Data Center Knowledge

Chipmakers dropped the most in five months after a report that Apple Inc. is reducing orders for iPhone 7 parts reignited a post U.S.-election selloff in technology stocks. Read More.

Apple 161
article thumbnail

Academics link payment card vulnerability to Tesco Bank cyber heist

Computer Weekly

UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist

Banking 205
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Microsoft Teams: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers everything you need to know about the chat-based communication and collaboration platform Microsoft Teams.

Microsoft 131
article thumbnail

AWS on bringing machine learning and artificial intelligence to the cloud masses

Computer Weekly

Amazon Web Services used Re:Invent 2016 to stake its claim as an early adopter of machine learning, while revealing details of its plans to boost the technology's take-up among everyday developers

article thumbnail

How to use PowerShell to investigate Windows Defender's malware signature definitions database

Tech Republic Security

What malware does Windows Defender recognize? Learn how to use PowerShell's Defender cmdlets to peek inside the malware signature definitions database.

Malware 123
article thumbnail

Security veteran urges firms to prioritise spear phishing defence

Computer Weekly

UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran Peter Wood

Security 195
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Android Security Bulletin November 2016: What you need to know

Tech Republic Security

The Android Mediaserver is back in the critical column for vulnerabilities. Get the highlights of the November 2016 bulletin.

Security 128
article thumbnail

The NSA and Skilz: Turning spying on you into a video game

Network World

What could possibly be creepier than a government organization (such as the NSA) having nearly unlimited access to your private, personal information (including access to your webcam)? Turns out, the answer is: when it gets turned into a video game. And it appears, they have done this. On Dec. 1, 2016, Wikileaks released a collection of documents relating to the German parliament inquiry of the cooperation between the German foreign intelligence agency (the BND) and the United States’ NSA.

Video 106
article thumbnail

The cloud war moves to machine learning: Does Google have an edge?

Tech Republic Cloud

AWS has been relatively quiet until lately on its machine and deep learning story. Has this given Google a beachhead?

Google 112
article thumbnail

‘Distributed guessing’ attack lets hackers verify Visa card details

Network World

Add credit card fraud to the list of things that distributed processing can speed up. An e-commerce site will typically block a credit card number after 10 or 20 failed attempts to enter the corresponding expiry date and CVV (card verification value), making life difficult for fraudsters who don't have a full set of credentials. But there are plenty of e-commerce sites out there, and it's possible to obtain missing account details by submitting slightly different payment requests to hundreds of

Research 100
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

What are banks telling to their investors about FinTech?

Dataconomy

Interest in fintech disruption is at an all-time high, but who will be the winners and who the losers is far from clear. Banks themselves have been sending mixed messages. As a particularly high profile example, JP Morgan Chase CEO Jamie Dimon famously raised the alarm when he said in. The post What are banks telling to their investors about FinTech?

Banking 78
article thumbnail

Russia claims it foiled a cyber attack from a foreign spy service

Network World

The Russian government claims to have foiled a "large-scale" cyber attack from foreign intelligence services meant to destabilize the country’s financial system. The government’s Federal Security Service made the statement on Friday without blaming a specific country, but said the attack was meant to be carried out on Dec. 5 against a number of major Russian banks.

article thumbnail

Oracle SIN Function with Examples

Database Star

In this article, I’ll explain what the Oracle SIN function is and show you some examples. Purpose of the Oracle SIN Function The purpose of the SIN function is to calculate the sine of a number. The sine is the ratio of the length of the side of the triangle opposite the angle to the […].

Oracle 46
article thumbnail

Remote management app exposes millions of Android users to hacking

Network World

Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks. According to researchers from mobile security firm Zimperium, the AirDroid screen sharing and remote control application sends authentication information encrypted with a hard-coded key. This information could allow man-in-the-middle attackers to push out malicious AirDroid add-on updates, which would then gain the permissions of the app

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

IT Performance Measurement Pitfalls

Future of CIO

PEOPLE DO WHAT YOU INSPECT, NOT WHAT YOU EXPECT! Today’s IT organization intends to become the business’s growth engine, rather than just a maintenance back-office, the problem is that the IT folks tend to see IT value in things that aren't as important to the business. Performance Indicators for IT need to be defined in keeping the view of the corporate objectives and put into a mix of other performance measures.

article thumbnail

IDG Contributor Network: Solution to JIT-ROP cyber attacks: Scramble code quickly

Network World

A new software development technique promises to end destructive exploits from hackers. The concept is to continually, and repeatedly, rearrange the program’s code while it’s running—and do it very quickly. Doing that shuts down the hacker’s “window of opportunity” because he doesn’t know where to find bugs to hit with his poisonous attack. The scrambling occurs over milliseconds.

Network 94
article thumbnail

Foto Friday – Bridge across the Animas River

Eric D. Brown

This is a time lapse + multiple exposures of the Animas River in Durango CO. Captured with Canon 5DsR and Canon 16-45 f/4 L. See more photos in my flickr photostream and/or my 500px portfolio. If you like my photography , feel free to support my addiction habit by purchasing a copy for your wall and/or visiting Amazon (affiliate link) to purchase new or used photographic gear.

122
122
article thumbnail

Researchers find a way bypass the iOS activation lock

Network World

Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner. The first report came Sunday from an Indian security researcher named Hemanth Joseph, who started investigating possible bypasses after being confronted with a locked iPad he acquired from eBay.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Windows 10 data collection trades privacy for security

Network World

Windows 10’s aggressive data-collection capabilities may concern users about corporate spying, but enterprises have control that consumer-edition Windows users do not: Administrators can decide how much information gets sent back to Microsoft. But enterprises need to think twice before turning off Windows telemetry to increase corporate privacy. That’s because doing so can decrease the effectiveness of Windows 10’s security features. [ InfoWorld’s deep look: Why (and how) you should manage Windo

Windows 65
article thumbnail

Trump Cybersecurity Do’s and Don’ts

Network World

President-elect Donald Trump ran a campaign focused on national security and making America great again through economic reform. Clearly both goals should include policies and programs to bolster the nation’s cybersecurity capabilities. This shouldn’t be an abstract concept to Mr. Trump after an election cycle featuring Russian hacks and WikiLeaks posts.

Survey 95