Wed.Jul 20, 2016

article thumbnail

Unilever Buys Dollar Shave Club To Become Digital Direct

Forrester IT

Unilever is the latest in a long string of enterprise giants to acquire digital. It acquired the digital-native startup, Dollar Shave Club, for $1 billion. I've been telling the Dollar Shave story lately as a way to describe the disruption possible when a company uses digital technology to establish a direct relationship with a customer. Dollar Shave Club is in its customers' daily shower and conscienciousness.

Research 190
article thumbnail

The State of Digital Currency: A discussion with Ed Scheidt

CTOvision

Roger Hockenberry. A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt , former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency. He and I get together and typically it’s a free-ranging discussion that covers a lot of topics, math, current events, technology and life in general.

Insurance 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Netflix Closed Their Last Data Center – Should You Do The Same?

The Accidental Successful CIO

Netflix now runs everything in the cloud, should you be doing this? Image Credit: Televisione Streaming. The Netflix announcement back in August of 2015 wasn’t a very big deal. In fact it probably went unnoticed by most people. However, from the point of view of those of us with the CIO job, it was sorta like a bomb had gone off. The company sent an email out that announced that in a month they planned on shutting down their very last operational data center.

article thumbnail

Reinventing Bahrain’s Kanoo Group through digital technology

Computer Weekly

Kanoo Group IT director explains the company's IT transformation, including why implementing Office 365 across the business was his biggest career challenge

Groups 117
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tech’s Old Guard Is Fighting Back, By Making Profits: Gadfly

Data Center Knowledge

Zuckerberg may be a household name, but second-quarter results at SAP and Microsoft show that the old guard is doing alright Read More.

SAP 104
article thumbnail

Benelux CIO interview: Paul Elich, CIO at KLM

Computer Weekly

Paul Elich, CIO at Dutch airline KLM, tells Computer Weekly about building innovation into IT departments and the ongoing de-duplication of internal systems since its merger with Air France

Airlines 109

More Trending

article thumbnail

Tech is trendy now but hasn’t always been, says Techmums founder

Computer Weekly

Sue Black thinks the technology industry is gradually becoming more accessible, but the journey is still slow

Industry 134
article thumbnail

Why Data Center Provider Switch is Suing Nevada and NV Energy

Data Center Knowledge

Company believes its current renewable energy arrangement is a raw deal Read More.

Energy 111
article thumbnail

Williams F1 teams up with Thales cyber security

Computer Weekly

Williams Group seals technical partnership to protect its confidential high-value data in the competitive world of F1 racing

Security 124
article thumbnail

Google Launches Its First Cloud Data Center on West Coast

Data Center Knowledge

Says users in West Coast cities should expect much faster cloud Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

BT broadband users hit by UK-wide outage

Computer Weekly

Telecommunications giant incurs the wrath of BT broadband users after thousands struggle to get online, following power outage at third-party datacentre provider

article thumbnail

10 TB in a 1 cm space: Will chlorine atoms redefine storage?

Tech Republic Data Center

A team of Netherlands physicists recently created a rewritable storage device that uses chlorine atoms to store data. But, will it ever make it into the real world?

Storage 79
article thumbnail

DWP blames policy changes for a further shift in Universal Credit rollout

Computer Weekly

A Public Accounts Committee hearing coincided with news that the DWP is delaying the rollout of Universal Credit

Policies 124
article thumbnail

How to add email to your Nextcloud server

Tech Republic Cloud

Developers of the Nextcloud server have included the ability to add email to the platform. Follow these steps.

How To 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Insurance firm frees itself from legacy shackles

Computer Weekly

Insurance intermediary is moving its IT infrastructure into the cloud in a 12-month project that also sees it update its end-user computing technologies

Insurance 108
article thumbnail

Top 5 Supply Chain Management Myths In Order to Outperform Your Competitors

Galido

Supply chain management is often thought of as a cost factor and not a strategic process. That leads to grievances and lack of optimization. To be a better supply chain performer, you need to recheck certain facts often misunderstood. More importantly, it’s time to bust some myths and bring your organization up to speed. Myth 1: It’s all about lowering costs.

article thumbnail

Aster Group to implement ServiceNow

Computer Weekly

Housing developer to use cloud-based service across multiple business functions following succesful implementation for IT service desk

Groups 108
article thumbnail

Why Audit Software Source Code?

Galido

A software source code audit is a comprehensive deep analysis of source code in a programming project and is an important part of security. It is does with the intent of finding bugs, security breaches, violations of programming conventions and anything else to reduce errors prior to software being released. It may also be done post release prior to releasing future versions of software.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

UK falls behind most European countries in safe data storage rankings

Computer Weekly

A report based on independent data ranks the UK behind most major European countries as a safe location for storing data

Storage 112
article thumbnail

The history of ransomware

Network World

Suprisingly long history Image by Thinkstock Ransomware has been the most pervasive cyber threat since 2005. According to publicly available information, ransomware infections have outnumbered data breaches 7,694 to 6,013 over the past 11 years.

Data 69
article thumbnail

What CIOs should know about the Brexit

Computer Weekly

CIOs should start talking with other executives and their teams and beginning planning now for potential changes

113
113
article thumbnail

New HIPAA guidance addresses ransomware

Network World

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need for better education and regular backups, and confirms that a ransomware attack against plain-text health information is, in fact, a breach that must be disclosed. The guidance recommends that organizations identify the risks facing their patient information, create a plan to address those links, set up procedures to protect systems fro

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Home Office merges IT units

Computer Weekly

The Home Office is merging its IT units to create Home Office Digital, Data and Technology and has appointed CTO Sarah Wilkinson to lead it

CTO 103
article thumbnail

What CIOs need to know about SQL Server 2016

Network World

With SQL Server 2005 now out of support, if you haven’t already started migrating your older databases onto a newer, supported release to stay in compliance with regulations like PCI DSS, that’s now urgent. But even if you don’t have an urgent need to migrate, there are several reasons why you may want to consider SQL Server 2016. The new security options will be significant for many businesses.

Oracle 63
article thumbnail

Brexit offers chance for UK to become a ‘data haven’

Computer Weekly

Could the UK become a "data haven" after it leaves the EU?

Data 136
article thumbnail

Windows 10 personal data collection is excessive, French privacy watchdog warns

Network World

Windows 10 breaches French law by collecting too much personal information from users and failing to secure it adequately, according to the French National Data Protection Commission (CNIL). Some of the privacy failings identified can be remedied by users willing to delve deep into the Windows 10 settings, but one of the commission's gripes is that better privacy should be the default setting, not one users must fight for.

Windows 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Mobile data freebies spark controversy in Sweden

Computer Weekly

Telia’s offer of data freebies to customers has brought criticism from some that believe it breaches net neutrality rules

Mobile 106
article thumbnail

Petition urges Apple not to release technology for jamming phone cameras

Network World

Over 11,000 people have signed a petition asking Apple not to deploy technology that would allow third parties like the police to use it to disable cameras on user phones under certain circumstances. Apple got a patent for this infrared technology in June and bagging a patent does not necessarily mean that the company is going to use the technology in its new devices.

Apple 61
article thumbnail

BBC+ app tailors content to individuals

Computer Weekly

Users of BBC app can shape their experience based on the content they want to consume

116
116
article thumbnail

Cisco patches critical exposure in management software

Network World

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands. +More on Network World: Quick look: Cisco Tetration Analytics + Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.