Mon.Dec 11, 2017

article thumbnail

The American Way of War Is Based On Tech: Don’t Let It Be Our Downfall!

CTOvision

If you have not read it yet, I would like to bring your attention to the incredibly prescient science fiction short story by Arthur C. Clarke titled "Superiority" (available in the collection: The Collected Stories of Arthur C. Clarke). Written in 1951, this is such a great read because it captures some key, apparently enduring qualities […].

article thumbnail

Innovation key to halt cyber attacks

Computer Weekly

In the light of the number of cyber breaches taking place, innovative security systems are required, according to the UK National Cyber Security Centre (NCSC)

Security 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Developing a Strategy for Putting People First in Transformation Programs

Social, Agile and Transformation

If you are driving a transformation program, motivating and aligning people is a critical success factor Most leaders now understand how important it is to put people before process and technology when it comes to instrumenting large scale organizational change. That being said, many in technology leadership roles are not versed in methodologies to instrument change and some are not.

article thumbnail

Cloud-to-cloud backup: What it is and why you need it

Computer Weekly

Applications that run in the cloud are protected, but only so much.

Backup 266
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Expanding the AWS Cloud: Introducing the AWS China (Ningxia) Region

All Things Distributed

Today, I am happy to announce the general availability of AWS China (Ningxia) Region, operated by Ningxia Western Cloud Data Technology Co. Ltd. (NWCD). This is our 17th Region globally, and the second in China. To comply with China's legal and regulatory requirements, AWS has formed a strategic technology collaboration with NWCD to operate and provide services from the AWS China (Ningxia) Region.

Cloud 67
article thumbnail

Perth airport security plans stolen by Vietnamese hacker

Computer Weekly

Australian authorities have named a Vietnamese hacker they say was able to break into the IT systems at Perth International Airport and steal security information

Security 170

More Trending

article thumbnail

Security Think Tank: Use policy and guidance to help secure messaging apps

Computer Weekly

What criteria should organisations use to assess the security of smartphone messaging apps and how can they ensure only approved apps are used by employees?

Security 146
article thumbnail

Perks of Unemployment

IT Toolbox

Free breakfast!

100
100
article thumbnail

Bumps in the road ahead for Nordic cashless societies

Computer Weekly

Sweden and Norway are global leaders when it comes to reducing the use of cash in the economy – but what about the Nordic region as a whole?

149
149
article thumbnail

Random Data Explained: Harnessing the Benefits of TRNGs and PRNGs

Dataconomy

Data. Where would we be without it? We all know that it’s in the very DNA of our everyday life, from business to social experiences, from the smartphones in our hands to the cars we drive. Data is a driving force both directly and indirectly in our society – a fact that. The post Random Data Explained: Harnessing the Benefits of TRNGs and PRNGs appeared first on Dataconomy.

Data 56
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Workers should embrace robots, not fear them, says Labour deputy

Computer Weekly

Labour deputy leader to say workers need not fear robots taking their jobs, but welcome the opportunities they will bring

125
125
article thumbnail

CIOs as “Chief Information Officer” The Philosophical Understanding of Information vs. Knowledge Management

Future of CIO

The aim of modern Information Management has often been described as getting the right information to the right person in the right format at the right time in order to make right decisions. Digital Knowledge Management is the management system that enables knowledge flow, connect ideas but also people, and crucially management; coach them and many others in organizing their personal knowledge mastery and collectively engaging with others and making decisions.

Data 40
article thumbnail

The Monthly Insight of “Digital Maturity” How to Improve Digital Business Maturity Dec. 2017

Future of CIO

Digital makes a significant impact on every aspect of the business from people, process to technology, both horizontally and vertically. Digital becomes the very fabric of high performing business, being outside-in and customer-centric is the new mantra for forward-looking and high mature digital organizations today. At the heart of digital, it is people and how to build a customer-centric organization.

How To 40