Wed.Oct 26, 2016

article thumbnail

Videoconferencing Delays Cost You Millions

Forrester IT

Videoconferencing technology has the awesome power to connect teams separated by oceans or internal silos, but it's still not frictionless. Technical difficulties that delay videoconferences account for millions of dollars a year in lost productivity. In our brief Start Your Videoconferences On Time , we take a look at some best practices to avoid productivity loss.

Video 273
article thumbnail

CIO interview: Alan Crawford, City & Guilds Group

Computer Weekly

Four months into his role as CIO of City & Guilds, Alan Crawford opens up about the challenges of tending to the needs of a company that has hit the acquisition trail with aplomb in recent years

Groups 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Era of the Smart Data Center

Data Center Knowledge

Businesses are rethinking their needs and are looking for solutions that use the latest virtualization technologies in an environment they can trust. Carrier-neutral edge colocation is emerging as the preferred solution. Read More.

article thumbnail

Property firm flips to Azure to mobilise business processes

Computer Weekly

Property consultancy Strutt and Parker engaged cloud services provider 3GI to upgrade its IT systems to Microsoft Azure as more clients demanded a mobile-first approach

Mobile 186
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Dark Side Of Cloud Computing

The Accidental Successful CIO

CIOs need to understand that cloud computing is changing Image Credit: Cory M. Grenier. I suspect that by now just like most CIOs you have heard a great deal about the promises offered by cloud computing and if you have not already taken the plunge and dived into cloud computing, then at least you have a plan to do so in the near future because you understand the importance of information technology.

Cloud 147
article thumbnail

US Treasury tells banks to provide more cyber attack information

Computer Weekly

The US government is calling on financial institutions to share more cyber attack information as concerns grow about the sector's vulnerability

Banking 200

More Trending

article thumbnail

Ultrafast York UFO broadband network to go citywide

Computer Weekly

Following successful trials in a number of York neighbourhoods, UFO broadband backers CityFibre, Sky and TalkTalk have agreed to roll out the service across the city

Network 186
article thumbnail

10 programs to help you break into a cybersecurity career

Tech Republic Security

Eighty-two percent of IT professionals report a shortage of cybersecurity skills at their company. Here are 10 programs spanning all education levels to help you get your start in the field.

article thumbnail

SAP steps up data privacy in Europe

Computer Weekly

SAP guarantees technicians outside of Europe will not be able to access companies’ sensitive personnel and other records

SAP 213
article thumbnail

Report: Mirai Botnet DDoSed 17 Dyn Data Centers Globally

Data Center Knowledge

That's all but three of the DNS service provider's sites. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Botched IT migration cost Vodafone customers thousands

Computer Weekly

Ofcom imposes multimillion-pound fine on mobile operator after an investigation uncovered multiple failings arising from a problematic IT systems migration

Mobile 180
article thumbnail

Dear Patient, the Database Will See You Now

Data Center Knowledge

Watson is using Big Data to build a better digital doctor Read More.

Big Data 165
article thumbnail

John Lewis chooses three retail tech startups to receive 2016 JLab funding

Computer Weekly

Department store retailer John Lewis selects three retail tech startups to receive their share of the £200,000 JLab funding pot

Retail 191
article thumbnail

3 inexpensive steps to secure IoT

Tech Republic Security

IoT devices powered the attack against Dyn, causing major disruptions to certain web properties. Follow these three steps to secure your IoT devices.

Security 122
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Apple highlights record services revenue as iPhone sales fall

Computer Weekly

For a second quarter in a row, Apple plays up growing services revenues as iPhone sales continue to fall

Apple 186
article thumbnail

5 best practices for switching your site to HTTPS for improved security

Tech Republic Security

Chrome is starting to flag more pages as insecure. Here are five things every webmaster should know about HTTPS.

Security 129
article thumbnail

Startup Nubeva pitches Security as a Service in the cloud

Network World

A team made up of executives from Aruba Networks and Panzura are out with a new self-funded startup this week that aims to deploy security tools that enterprises use in their campus and extend it to the cloud. The idea of Nubeva is to create a Security as a Service platform that takes existing security tools and controls that organizations use in their data centers and other on premises infrastructure and mirror that same stack of security tools in the public cloud.

Security 102
article thumbnail

ARM Gets OK to Spend Big on New Markets Under SoftBank Ownership

Data Center Knowledge

SoftBank CEO urges ARM to make long-term bets on new markets. Read More.

Internet 130
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhones

Network World

The FBI today said it had arrested a group of men in connection with the theft of 23,000 Apple iPhones from a cargo area at the Miami International Airport in April. The stolen iPhones were worth approximately $6.7 million and the arrests of Yoan Perez, 33; Rodolfo Urra, 36; Misael Cabrera, 37; Rasiel Perez, 45; and Eloy Garcia, 42 were all made at the suspect’s residences throughout Miami Dade County, the FBI said.

Groups 101
article thumbnail

SCCM Mapped Drives Report

Mick's IT Blog

Recently, we wanted to start keeping track of users with mapped drives due to cryptolocker vulnerabilities. There are a few applications we have that require mapped drives, so we have certain users with them. Once again, I must say thank you to Sapien Technology for PowerShell Studio ! That tool makes writing these PowerShell scripts a breeze. This script will scan all user profiles on a machine and report users with mapped drives.

Report 91
article thumbnail

IDG Contributor Network: OwnBackup: Don't rely on SaaS vendors to do their own backup and recovery

Network World

Back when Salesforce and its ilk invented software as a service (SaaS), there was much wailing and gnashing of the teeth about the security around these new, as-yet-unproven approaches to delivering software. Many people suggested that these vendors were fly-by-nighters—that they would fail and customers’ data would be lost forever. A decade or so later, and apart from some high-profile cases (who remembers Magnol.ia?

Backup 98
article thumbnail

New data reveals early voting trends in key swing states

Tech Republic Big Data

As the presidential race enters its penultimate week, passionate early voters are hitting the polls. Big data firm L2 Political analyzed election trends from the most important swing states.

Trends 87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cybersecurity Isn’t Always a “Boardroom Issue”

Network World

We’ve all heard or read the rhetoric that “cybersecurity has become a boardroom issue.” I certainly agree that we are trending in this direction but is this true today or nothing more than marketing hype? ESG recently published a new research report in collaboration with the Information Systems Security Association ( ISSA ) titled, The State of Cyber Security Professional Careers , to ask a number of questions and truly capture the voice of cybersecurity professionals.

Trends 97
article thumbnail

IDG Contributor Network: Platform business models: A primer

ComputerWorld IT Management

Platform business models are gaining a lot of attention lately, but not everyone knows precisely what they are. These business models, which allow enterprises to set up powerful ecosystems for value exchange and innovation among participants, can be used across industries and are fast becoming a dominant business model for the digital economy.

Network 63
article thumbnail

Friday's DDoS attack came from 100,000 infected devices

Network World

Friday's massive internet disruption came from hackers using an estimated 100,000 devices, many of which have been infected with a notorious malware that can take over cameras and DVRs, said DNS provider Dyn. "We are able to confirm that a significant volume of attack traffic originated from Mirai-based botnets," Dyn said in a Wednesday blog post. The malware known as Mirai had already been blamed for causing at least part of Friday's distributed denial-of-service attack , which targeted Dyn and

Malware 97
article thumbnail

3 Steps Data-Savvy Innovators use to Retain Customers

Dataconomy

Subscription box businesses are more popular than ever, with average site visits growing by 3,000% over the past three years and revenue skyrocketing (Loot Crate, a DataScience customer, was ranked No.1 on the Inc 5000 fastest growing companies list this year with a whopping 66,789% growth in revenue since 2013). The post 3 Steps Data-Savvy Innovators use to Retain Customers appeared first on Dataconomy.

Data 76
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Samy Kamkar hacks IoT security camera to show exploitable dangers to enterprise

Network World

ForeScout Technologies released an “IoT Enterprise Risk Report” ( pdf ) which identified seven IoT devices that can be hacked in as little as three minutes: IP-connected security systems, smart HVACs and energy meters, VoIP phones, connected printers, video conferencing systems, smart light bulbs and smart refrigerators. Although the hack might only take a few minutes to pull off, it might take weeks to find and fix.

VOIP 96
article thumbnail

The Race for IT Relevance

Future of CIO

The race for IT relevance is still on, be alert to identify blind spots, be flexible to adjust the planning, be open to listening to the different points of views and be determined when you have to make tough choices. Due to the changing nature of technology, the saying about the demise of the internal IT has been around for years. In reality, the majority of IT organizations get stuck in the lower level of maturity, slow to change.

article thumbnail

DDoS attack overwhelmed Dyn despite mitigation efforts

Network World

Dyn says that the DDoS attack that swamped its DNS resolution service last week was backed by far fewer internet of things (IoT) devices than it thought before. Previously it said it was hit by traffic from tens of millions of IP addresses, some of which were likely spoofed, making the actual number of bots involved far fewer. “We are still working on analyzing the data but the estimate at the time of this report is up to 100,000 malicious endpoints,” the company says in a status update.

article thumbnail

Lessons learned from the DYN attack

Network World

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors. The large scale DDoS attack on DYN last week interrupted access to many major web sites, and while the specifics of the attack have been widely analyzed, here are the important lessons learned: * DDoS attacks are alive and well: A few years ago DDoS attacks were hot news, but reports died down as the focus shifted to news about social engineering attack

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.