Wed.Sep 21, 2016

article thumbnail

Deep Learning and Its Role in the Advancement of Video Analytics

CTOvision

Rick Delgado. Video cameras are everywhere these days. Research from IHS Technology estimates that up to 245 million cameras were operational, and that was only at the end of 2014. That number has only increased since then. People and organizations have used video surveillance for many use cases, most of which we are all familiar with. Video cameras are used to help deter crime and help find criminals after a crime, for example.

Video 247
article thumbnail

Many don’t test disaster recovery plans properly, survey finds

Computer Weekly

Nearly 40% of UK organisations do not test disaster recovery plans properly, mainly because of concerns about disruption to production operations

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DDOS Trends Report 2016

CTOvision

Marty Meehan. The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. DDoS attacks are a real threat for today’s web-reliant organizations.

Trends 220
article thumbnail

IBM opens first Nordic cloud datacentre

Computer Weekly

Oslo datacentre is IBM’s 12th in Europe and 48th globally and will target large and small enterprises and startups to offer services

IBM 211
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Art of the Possible: Meeting Innovation Demands in the Public Sector

CTOvision

Roger Hockenberry. Government agencies face increasing pressure to be “innovative,” but as is the case with most big ideas, defining exactly what that means is difficult, at best. Most don’t consider that innovation doesn’t necessarily mean creating something new, but can simply mean doing something you already do, differently. For most enterprises, innovation is really about increasing effectiveness.

Meeting 218
article thumbnail

Mobile connectivity still costing businesses billions

Computer Weekly

Despite efforts to bring down the cost of mobile connectivity for business users, a report from iPass shows business travellers are incurring hundreds of pounds of charges every month

Mobile 182

More Trending

article thumbnail

$81m cyber heist highlights gap between attacker and defenders, says Swift

Computer Weekly

Secure messaging service Swift was surprised by the gaps in banks’ cyber security practises highlighted by mega cyber heist, says CISO Alain Desausoi

Banking 192
article thumbnail

New CEO Charged With Taking Peak 10 to the Next Level

Data Center Knowledge

Inside the data center provider's decision to put former Telx chief Chris Downie a the helm Read More.

article thumbnail

Finland’s OP Financial Group outlines digital ambitions

Computer Weekly

Chief digital officer at financial services group describes how new technology is fundamentally changing the business

Financial 211
article thumbnail

Nutanix Continues to Tease Us with IPO Rumors

Data Center Knowledge

A year ago, we started hearing rumors that Nutanix was going to file for an IPO. Read More.

167
167
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Virtual Instruments extends VirtualWisdom to NAS testing

Computer Weekly

Storage performance monitoring and analysis provider extends capability to NAS testing for the first time as customer use of file access for virtualisation brings storage issues

article thumbnail

Cisco Talos: Spam at levels not seen since 2010

Network World

Spam is back in a big way – levels that have not been seen since 201o in fact. That’s according to a blog post today form Cisco Talos that stated the main culprit of the increase is largely the handiwork of the Necurs botnet, stated the blog’s author Jaeson Schultz. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!

Network 108
article thumbnail

Ellison slams AWS at Oracle Open World 2016

Computer Weekly

Oracle CTO Larry Ellison criticises Amazon Web Services as a cloud database environment at Oracle Open World 2016, fleshing out earlier critique

Oracle 189
article thumbnail

Which political party is more cybersecure?

Tech Republic Security

Cybersecurity expert Tim Bandos reveals which political party is most vulnerable, common hacking techniques, and what companies can learn from watching how the DNC and RNC respond to cyberthreats.

Company 105
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Local authorities must collaborate to survive

Computer Weekly

Councils need to seek opportunities to work with their peers if they are to take advantage of digital transformation at a time when budgets are squeezed

Budget 184
article thumbnail

How to install and run Dropbox from a headless Linux server

Tech Republic Cloud

If you have a headless Linux server that needs access to files from a Dropbox account, here's what to do.

Linux 166
article thumbnail

London Capital Group improves service deployment with SDN

Computer Weekly

Online trading firm has revitalised its service delivery after switching a legacy physical network for VMware NSX SDN

Groups 196
article thumbnail

Education needs to study up on fighting ransomware

Network World

It should surprise no one that ransomware is on the rise, but it may be news that education -- not healthcare -- is outstripping other industries for rate of infection, according to a study by security ratings firm BitSight. Organizations in education had the highest rate of infection, with at least one in 10 experiencing ransomware on their networks, according to “The Rising Face of Cyber Crime: Ransomware” report.

Education 101
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Skills gaps and ill-defined strategies hold back cloud adoption, suggests IDC research

Computer Weekly

Cisco-backed research into cloud adoption trends suggests few enterprises have perfected their off-premise IT strategies

Research 192
article thumbnail

ACLU: Cops accidentally recorded themselves making up bogus criminal charges

Network World

If cops are going to do something shady, something as unethical and illegal as violating a citizen’s First Amendment rights to free speech and his Fourth Amendment rights against warrantless seizure, then they definitely don’t want their actions being recorded. Yet that is exactly what happened when Connecticut State Police troopers seized a camera belonging to a protestor and the camera continued to film while they conspired on which bogus charges to level against him.

Film 100
article thumbnail

Brussels proposes new rules to stop abuse of roaming charge rules

Computer Weekly

The European College of Commissioners has proposed new rules to help prevent abuse of the end of mobile roaming charges across the EU

Mobile 183
article thumbnail

Google Allo: What business users need to know

Tech Republic Security

Google recently released its new messaging app, Allo. Here are the security and productivity features that professionals will find useful.

Google 110
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

IDG Contributor Network: 3D printers hackable via smartphone

Network World

A smartphone’s built-in sensors can be used to swipe important intellectual property, such as product models and prototypes, by reading a combination of acoustic traces and electromagnetic energy as a 3D printer’s print head moves across a platen. New research discovered that it’s not just the sounds that the nozzle makes as it prints the model that gives the game away, as was previously thought.

3D 98
article thumbnail

National Software Reference Library: An important digital tool for forensic investigators

Tech Republic Security

Why would the National Institute of Standards and Technology (NIST) be remotely interested in old video games and software? Keep reading to find out.

Software 104
article thumbnail

Cisco CEO Robbins: Wait til you see what’s in our innovation pipeline

Network World

It’s been a little over a year since Chuck Robbins took the reins at Cisco from the venerated John Chambers. In that time, the face and pace of the IT realm has transformed -- from Dell buying EMC and HP splitting up to the swift rise of IoT and harsh impact of security challenges. Robbins has embraced this rapid change and, he says in this wide-ranging interview, moved the company forward with relentless speed to address everything from hyperconvergence to application-centric infrastructures.

HP 95
article thumbnail

Why Amazon can't possibly be the only cloud winner

Tech Republic Cloud

The enterprise is too big and complex for one cloud to dominate, argues Cloud Foundry Foundation CEO Sam Ramji.

Cloud 126
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IDG Contributor Network: IoT security: Intel EPID simplifies authentication of IoT devices

Network World

Did you know that over 75 million tourists visit the United States every year? Or that the Transport Security Administration (TSA) screens over 2 million people daily? The TSA processes 150 passengers per security lane. Imagine the public outrage if it took 20 minutes to screen a passenger and the process publicly disclosed personal information. That’s the average time and result of installing an IoT device today.

article thumbnail

IT workers brace for outsourcing, layoffs at health insurer

ComputerWorld IT Management

A major health insurer, Health Care Service Corporation (HCSC), is planning to outsource part of its information technology operation. The employees don’t have all the details about what’s in store for them, but this may be a large IT layoff. Employees were recently informed that 70% of the positions in the IT group, mostly in the area of infrastructure, will be outsourced, according to two IT workers who requested anonymity.

article thumbnail

How to watch the 2016 Ig Nobels

Network World

If you can't make it to the annual Ig Nobel ceremony at Harvard University on Thursday night to celebrate the most unusual and imaginative breakthroughs in science, you can follow along online instead. That includes right here, we're we've embedded code for the live webcast, which starts at 6pm, EST, Sept. 22.

How To 95
article thumbnail

Download our report: IT Security's Looming Tipping Point

ComputerWorld IT Management

Given the rash of high-profile data breaches that have exposed customers' personal information, created PR nightmares and cost C-level executives their jobs, IT and business leaders should have security at the top of their priority list. But while businesses are saying the right things about giving IT security more attention and budget, is that talk being put into useful action?

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.