Mon.Aug 22, 2016

article thumbnail

Mixed reaction to Anderson review of bulk surveillance powers

Computer Weekly

While the Anderson review’s recommendation of a technical advisory panel has been welcomed, human rights groups say the opportunity to move to more targeted surveillance has been missed

Groups 138
article thumbnail

Ascending Tech Dominates S&P 500 Like No Time Since Dot-Com Bust

Data Center Knowledge

While the divergence between banks and tech rings warning bells for anyone who lived through the crash of 2000, tech’s ascent has its virtues Read More.

Banking 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European law enforcement seeking smart ways to fight cyber crime

Computer Weekly

Cyber crime continues to increase in volume and sophistication, but European law enforcement is fighting back, using collaboration and industry partnerships to compensate for a lack of resources

Resources 134
article thumbnail

HIPAA Breach Case Results in Record $5.5M Penalty

Data Center Knowledge

Growing financial penalties highlight the risks to providers of managed IT services who handle sensitive data for health care clients Read More.

Financial 137
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Strategies Beyond "In House" to Address Digital Transformation

Social, Agile and Transformation

This recent EY study on the Digital Deal Economy caught my attention. The survey of 600 non-tech corporate executives shows that 74% believe that digital transformation has either substantial or transformative impact on business operations, 66% on customer relationships and 59% on vendors and supply chain. The implications is that there are still a sizable number of executives that still "don't.

Strategy 122
article thumbnail

Peak 10 and GI Find Winning Formula in Secondary Data Center Markets

Data Center Knowledge

After a period of growth via acquisition, provider doubles down on its 10 markets with diverse portfolio of high-touch services Read More.

More Trending

article thumbnail

How Middle East CIOs can steer business strategy

Computer Weekly

The perception of the role of CIO at organisations in the Middle East is gradually shifting from back-end support to business enabler

Strategy 131
article thumbnail

Report: Beijing Bans Data Centers with High PUE

Data Center Knowledge

Industry group representative says new rules have already pushed some companies out Read More.

article thumbnail

Tools of the trade to drill into behavioural data

Computer Weekly

Data science toolkits enable organisations to extract, manipulate and interpret data to boost their business intelligence

Data 130
article thumbnail

Equinix Launches Its Fifth Australia Data Center in Sydney

Data Center Knowledge

Touts hundreds of customers on Sydney campus, access to submarine cables, peering nodes Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Australian census website failure spreads skepticism

Computer Weekly

The public post-mortem of the Australian census website meltdown continues as the IT industry gives its opinions

Industry 122
article thumbnail

The Best Tools to Predict and Manage Cloud Costs

Data Center Knowledge

Services like CloudSquare and PlanForCloud allow you to track how much your cloud computing infrastructure will cost, and how much you could save Read More.

Cloud 105
article thumbnail

Bangkok Hospital recognised for its use of electronic records

Computer Weekly

Private hospital in Thailand is recognised for its effective use of IT by a global accreditation body

126
126
article thumbnail

Cisco well positioned to dominate cybersecurity market

Network World

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

DWP digital experts brought in to help assess plans for Government Digital Service

Computer Weekly

The new GDS chief Kevin Cunnington has turned to his former DWP colleagues to help as he prepares his plans for the team

article thumbnail

Google killing Chrome apps for Windows, Mac, and Linux, but it's no cause for concern

Tech Republic Cloud

New Chrome apps will only be available to Windows, Mac, and Linux users in the form of web apps starting Later this year. Don't get too worried, though: You won't notice the change.

Linux 83
article thumbnail

Millions of devices are still vulnerable, says researcher who discovered Stagefright

Tech Republic Security

The Stagefright vulnerability on Android phones was one of the top security stories of 2015. Here's where it stands now and how users can protect their devices.

article thumbnail

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Network World

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data. That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.

Company 65
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Blockchain could bring electronic voting to Australia by 2017

Tech Republic Security

Australia's government-owned postal service recently announced plans to test digital voting via blockchain technology to increase efficiency.

article thumbnail

New products of the week 8.22.16

Network World

New products of the week Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Fortscale 2.7 Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically.

Network 64
article thumbnail

Does MariaDB's latest move show how hard it is to make money with open source?

Tech Republic Data Center

MariaDB founder Monty Widenius promised his software would always be open. Now it's not, and that says more about open source business than it does about him.

article thumbnail

Groups oppose US plan to collect social media info from visitors

Network World

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S. “This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Dep

Media 61
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CRM Phone Integration

Galido

Wouldn’t it be nice to make phone calls directly from your customer relationship manager (CRM) with just one click? Customer relationship managers contain a wealth of useful information for a company, but sometimes it can take a while to get in sync with the customer. Phone integration with your customer relationship manager helps to resolve this challenge.

VOIP 60
article thumbnail

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Network World

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency. The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.

article thumbnail

65 Business Jargon Phrases to Stop Using and What Do Use Instead

Database Star

If you’ve worked in an office for any length of time, you’ve probably heard one of these phrases. A phrase that makes no sense at all unless you explain it. A word that is used by management in not quite the correct way. A sentence that has a bunch of words but doesn’t really say […].

article thumbnail

Windows 10 Anniversary Update broke millions of webcams

Network World

If your webcam is freezing after about a minute when using Skype, or another app, then you can thank Microsoft. The Redmond giant meant to allow multiple apps to access the camera at the same time, but didn’t want users to suffer poor performance as those apps concurrently accessed the webcam and the MJPEG or H264 encoding processes. So Microsoft decided the best plan was to stop USB webcams from using MJPEG or H264 and instead to only support webcams that use YUY2 encoding.

Windows 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Tableau turns to AWS for a cloud-savvy CEO

ComputerWorld IT Management

Data visualization specialist Tableau Software is bringing in seasoned talent to help it compete in an increasingly cloud-based world. The company has hired longtime Amazon Web Services executive Adam Selipsky as its CEO, replacing cofounder Christian Chabot. Chabot, who has been CEO for 14 years, will continue to serve as chairman of Tableau’s board of directors.

Cloud 40
article thumbnail

The Need for Network Security Operations Automation

Network World

According to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago (note: I am an ESG employee). Why? Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago.

Network 60
article thumbnail

Three Principles to Follow for Bridging IT-Business Gaps

Future of CIO

Many of gaps bridging challenges in the organization are not exclusive to IT yet the symptoms are often more visible in IT. Technology is permeating into every corner of the organization, and the information is the lifeblood of the business. However, many IT organizations still get stuck in the lower level of maturity, with the reputation as a cost center, support desk, controller only, or even the bottleneck to slow the business speed.

article thumbnail

IDG Contributor Network: Mall developer insisting on tech for merchant tenants

ComputerWorld IT Management

Like newspapers, paper checks, drive-in movies and landlines, shopping malls are rapidly moving to the land of the quaint. It's possible that some will survive and even flourish, but that will require rapid technological advancements, plus far more customer service than most mall stores can handle. But one brand-new mall in New York City is showing that it understands the problem.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.