Tue.Oct 25, 2016

article thumbnail

The AT&T Merger With Time Warner Opens A New Chapter For The Telco Industry

Forrester IT

With Laura Koetzle. On October 22, 2016, AT&T announced its intention to acquire Time Warner for an equity value of $85.4 billion. The deal is essentially about the combination of quality content and content distribution, as it transforms AT&T into a content producer and owner -- rather than just a distributor of content. Many telecom regulators restrict revenue growth opportunities for telcos in highly regulated telco markets.

Industry 289
article thumbnail

Machine Learning May Be The Solution To Enterprise Security Woes

CTOvision

Bob Gourley. For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of millions of logins for their company’s services are freely available on hacker forums.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How collaboration will feature in the future of digital supermarkets

Computer Weekly

Morrisons’ new deal with Ocado has helped the supermarket chain expand its online capabilities, but will we see more collaboration between retailers and digital service providers in the future?

Retail 190
article thumbnail

15 under 15: Rising stars in cybersecurity

CTOvision

Bob Gourley. The Christian Science Monitor's Passcode traveled across the country to meet 15 kids under 15 years old who are fighting off the growing threat of cyberattacks. They are part of a new generation of tinkerers and boundary pushers – many still lugging school backpacks and wearing braces – who are mastering the numerical codes that underpin the digital world.

Travel 233
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Pioneers take flash storage to analytics and big data use cases

Computer Weekly

Flash storage is now being applied to big data and analytics workloads as array makers exploit flash performance for rapid access and high throughput for big datasets

Big Data 190
article thumbnail

How Connected-Cars Could Cost You Your Privacy

CTOvision

Jeremy Sutter. Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile, and they could be on the road within a decade. They present many exciting opportunities, but also new threats to our privacy and security. In this post, we'll dive into exactly what lies behind the connected car concept and what it means for privacy.

Internet 218

More Trending

article thumbnail

These Data Center Providers Use Most Renewable Energy

Data Center Knowledge

Digital Realty and Equinix lead the pack of data center providers but still use much less renewable energy than some hardware and cloud giants. Read More.

article thumbnail

Mobile apps to take over HR technology

Computer Weekly

Smartphone apps are the next frontier for human resources technology, according to HR technology analyst Josh Bersin

Mobile 216
article thumbnail

What MSPs Should Learn from the Dyn Internet Attack

Data Center Knowledge

The Dyn network outage, which was made possible by default login credentials on IoT devices, underscores the responsibility of MSPs to understand and fix security risks like these for their users. Read More.

Internet 166
article thumbnail

DevOps largely failing to improve security, study shows

Computer Weekly

Despite the promise of improved application security, DevOps is failing to deliver due to some key barriers, an HPE study shows

Devops 196
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cloud Giants Likely to Beef Up Bandwidth to Fight IoT Botnets

Data Center Knowledge

Attack on Dyn shows the door is now open for DDoS of unprecedented scale. Read More.

Cloud 202
article thumbnail

Malaysian insurer partners IT supplier to tailor cyber security policies

Computer Weekly

Partnership is in response to requests from AIG customers for a more comprehensive risk management approach to cyber insurance

Insurance 196
article thumbnail

Report: OpenStack Deployments Move Beyond Test and Dev

Data Center Knowledge

Study also finds open source cloud infrastructure software deployments aren't limited to large enterprise Read More.

article thumbnail

CIO interview: Björn Ekstedt, PostNord

Computer Weekly

For PostNord, one of the Nordic’s largest logistics companies, the rise of e-commerce means the continual digital rehaul of its business models

Company 183
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cockcroft, the Man Behind Netflix’s Move to AWS, Joins AWS

Data Center Knowledge

Part of his role will be advising Amazon Web Services customers on their cloud architecture. Read More.

article thumbnail

Scale drops three-node minimum for HC3 hyper-converged

Computer Weekly

Scale Computing customers no longer need to deploy a minimum of three hyper-converged nodes and can now implement only one at SMEs and Robos

180
180
article thumbnail

Hackable heart implants: St. Jude comes under fire for security risks

Tech Republic Security

In an ongoing legal battle between St. Jude and Muddy Waters and MedSec, new filings claim that devices created for heart issues are vulnerable to cyberattacks.

Security 118
article thumbnail

Virgin Atlantic finds community benefit with Salesforce

Computer Weekly

Airline’s business-to-business and cargo divisions have found Salesforce CRM to offer a “family feel” beyond the software

Software 188
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Jamboard: New 55-inch digital whiteboard for conference rooms

Tech Republic Cloud

Google recently announced Jamboard, its newest hardware project that acts as a digital whiteboard for cloud collaboration among business users.

Google 114
article thumbnail

Insurers are joining fintech party

Computer Weekly

Insurers are held back from digital transformation by legacy systems, but insurance-focused IT startups offer them hope

Insurance 188
article thumbnail

DoJ: What does it take to prosecute federal computer crimes?

Network World

The need for vigorous criminal enforcement of cybercrime laws will only become more important as networked computers and the criminals who target them grow. That was how the Department of Justice started a blog post this week that defined how it decides whether or not to prosecute a federal computer-related crime.

article thumbnail

Australian IT spending to be near A$85bn in 2017

Computer Weekly

Australian CIOs must plan digital platforms that can connect to customer and business networks – or risk losing customers

Network 186
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cybersecurity staffing issues may be putting you at risk

Network World

A study from Spiceworks found that even though 80 percent of organizations experienced a "security incident" in 2015, only 29 percent of companies have a cybersecurity expert working in their IT department and only 7 percent have a cybersecurity expert on their executive team. And a majority -- 55 percent to be exact - said that their business didn't have "regular access" to any IT security experts at all, internal or third-party, with the majority of companies also reporting they had no plans t

Study 97
article thumbnail

Hundreds of thousands of public sector jobs automated by 2030

Computer Weekly

Repetitive roles in the UK public sector will be decimated as organisations replace people with automation technology

185
185
article thumbnail

Dyn attack: US Senator wants to know why IoT security is so anemic

Network World

The security around the development of Internet of Things products is weak and U.S. Sen. Mark R. Warner (D-Va.) today sent a letter to the Federal Communications Commission (FCC), the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS) to ask why and what can be done to fix the problem. Sen. Mark Warner (D-VA). In the letter Warner, who is member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus , asked questions

article thumbnail

Acquiring public sector software systems – an alternative role for GDS?

Computer Weekly

Controlling and measuring software systems in government is notoriously difficult, so could a healthcare model offer a better alternative?

Software 173
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IDG Contributor Network: Residential routers easy to hack

Network World

The infamous “admin” user ID and hackable, weak passwords are prevalent on large numbers of home routers, says a security firm. That’s despite the public's increasing awareness of vulnerabilities and associated hacking. Researchers at ESET recently tested more than 12,000 home routers and found that many of the devices are insecure. Firmware was flawed in some cases. + Also on Network World: Answers to ‘Is the internet broken?

Network 95
article thumbnail

IFS 16: CEO Sorbie vaunts digital transformation, capped with IoT play

Computer Weekly

IFS’s CEO, Alastair Sorbie, opened the company’s annual customer conference in Gothenburg by announcing an internet-of-things service

article thumbnail

Was the Dyn DDoS attack actually a script kiddie v. PSN?

Network World

The massive DDoS attack that disrupted the internet address-lookup service Dyn last week was perhaps pulled off by a script kiddie targeting PlayStation Network and using Mirai malware to assemble a massive IoT botnet, according to research by Flashpoint. “Flashpoint assesses with moderate confidence that the most recent Mirai attacks are likely connected to the English-language hacking forum community, specifically uses and reads of the forum “hackforums.net,” according to a blog by Allison Nix

Malware 95
article thumbnail

Twitter plans to cut hundreds of jobs

Computer Weekly

Twitter is expected to reduce costs by further trimming its staff, after the company failed in its bid to secure a buyer

Security 177
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.