Fri.Sep 23, 2016

article thumbnail

Video Helps Your Customers In Their Moment Of Need

Forrester IT

Your customers use apps like Facebook, Skype, Snapchat, and Facetime to hold video calls and you should be using video to connect with them, too. In our report Now You See Me -- Video Chat Improves The Customer Experience we found that retail, financial services, healthcare, and other verticals embrace video chat as a way to serve customers in their time of need and as a way to drive measureable ROI.

Video 246
article thumbnail

Government mishandling smart meter roll-out, says committee

Computer Weekly

The Science and Technology Committee accuses the government of being unclear on the benefits of gas and electricity smart meters, and mishandling aspects of the national roll-out

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft, Google Downtime Offers Reminder That Cloud Isn’t Perfect

Data Center Knowledge

A pair of massive service outages involving two of the largest cloud players this month comes at a time when the industry is arguably on the verge of eradicating any lingering concerns about the security or reliability of public cloud. Read More.

Cloud 189
article thumbnail

UK government partners with tech startups on cyber security

Computer Weekly

Applications are open to cyber security startups for the first of two cyber innovation centres to receive £50m over five years, as part of the government’s £1.

Security 197
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IBM, Microsoft Tap New European Markets With Cloud Data Centers

Data Center Knowledge

The expansion announcements come as competition continues to heat up in the cloud services market, especially in the market for enterprise cloud services. Read More.

article thumbnail

Infrastructure as code: What does it mean and why does it matter?

Computer Weekly

The emergence of software-defined hardware has given rise to the phrase “infrastructure as code” to describe the way these environments are managed

Hardware 201

More Trending

article thumbnail

Cutting the cable: why industry is turning to wireless

Computer Weekly

Wireless networking technology is heading out of the office and the living room, and on to the factory floor.

Wireless 207
article thumbnail

Google Cloud Joins Amazon, IBM in Serving Blockchain Clients

Data Center Knowledge

Google’s cloud services will be used to test blockchain technologies for banks. Read More.

Cloud 177
article thumbnail

Interview: British Medical Journal’s CDO talks datacentres, DevOps and desktops

Computer Weekly

BMJ’s chief digital officer explains how the 170-year-old healthcare publication has negotiated several major digital transformation projects since she joined in 2012

Devops 170
article thumbnail

Why you shouldn't overlook bare metal provisioning in your software-defined infrastructure

Tech Republic Data Center

Much of the automation effort is focused on the virtualized data center. Mature software-defined infrastructures should consider bare metal provisioning in addition to virtualization.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Yahoo under fire over data breach affecting 500 million users

Computer Weekly

Yahoo comes under fire for not detecting and notifying users sooner of the biggest breach of personal details to date

Data 190
article thumbnail

Cisco, IBM may be interested in buying Imperva

Network World

Security vendor Imperva is shopping itself around and may be attractive to the likes of Cisco and IBM, according to Bloomberg. The Motley Fool reports that Imperva’s stock rose 20% today after Bloomberg’s report, which the Fool notes could actually drive buyers away because it would mean a more costly deal. Bloomberg named a number of other possible buyers including Forecpoint (owned by Raytheon and Vista Equity Partners), Akamai and Fortinet.

IBM 98
article thumbnail

BBC opens up about holographic TV trials

Computer Weekly

Broadcaster reveals how it is attempting to pre-empt the potential change in viewing habits the rise of augmented reality could bring

178
178
article thumbnail

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Network World

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service protection services. A giant botnet made up of hijacked internet-connected things like cameras, lightbulbs, and thermostats has launched the largest DDoS attack ever against a top security blogger, an attack so big Akamai had to cancel his account because defending it ate up too many resources.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Government enlists startups to develop exporters’ network

Computer Weekly

The Department for International Trade selects two startups to help it build an artificial intelligence, peer-to-peer knowledge network

Network 176
article thumbnail

The next target for phishing and fraud: ChatOps

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Enterprise chat applications have surged in popularity, driven in large part by Slack, which now claims to serve more than three million users daily. What’s more, the popularity of these apps has given rise to a new phenomenon known as ChatOps, which is what happens when these new messaging systems are used to automate operationa

Tools 95
article thumbnail

RBS tests claim blockchain could replace UK’s Faster Payments bank clearing scheme

Computer Weekly

Researchers at the Royal Bank of Scotland investigate the use of distributed ledger technology for bank clearing systems

Banking 175
article thumbnail

Vint Cerf's dream do-over: 2 ways he'd make the internet different

Network World

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again. "If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Red Hat is making money on the public cloud with a hybrid approach

Tech Republic Cloud

Red Hat offered up some surprising insight into its cloud business on its earnings call.

Cloud 134
article thumbnail

Privacy groups urge US FTC to investigate WhatsApp promises

Network World

The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy groups said. The FTC should step in to stop WhatsApp from violating "commitments the company previously made to subscribers," the 17 groups said in a letter sent to the agency Thursday.

Groups 93
article thumbnail

What Twitter sentiment analysis is saying about the first presidential debate

Tech Republic Big Data

Big data firm Datameer analyzed thousands of tweets in the week preceding the debate, revealing that the two candidates have never been more controversial-or unpopular.

article thumbnail

Here's what you should know, and do, about the Yahoo breach

Network World

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users. That's because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users' online lives.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Reality check on the Internet of Things

ComputerWorld IT Management

In this contrarian look ahead at the IoT roadmap, maturity levels and emerging trends, IDC’s Vernon Turner, SVP of Enterprise and IoT Research Fellow, shares his thoughts on how CIOs can prepare their companies for the dramatic business changes to come.

article thumbnail

Impending cumulative updates unnerve Windows patch experts

Network World

Microsoft's decision to force Windows 10's patch and maintenance model on customers running the older-but-more-popular Windows 7 has patch experts nervous. "Bottom line, everyone is holding their breath, hoping for the best, expecting the worst," said Susan Bradley in an email. Bradley is well known in Windows circles for her expertise on Microsoft's patching processes: She writes on the topic for the Windows Secrets newsletter and moderates the PatchMangement.org mailing list, where business IT

Windows 78
article thumbnail

CIOs as “Chief Innovation Officer”: Taking a Systematic Approach to Run an Innovative IT

Future of CIO

Digital is the age of innovation. Doing more with innovation is the mantra for any forward-looking organizations. Though every executive should make their voice heard on this front, have an opportunity and responsibility to participate in the innovation dialog and to come up with innovative ideas, CIOs generally have greater opportunities to stand out, and take leadership in driving innovation across their companies.

Trends 40
article thumbnail

NY regulation aims to raise bank security standards

Network World

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal. Under the new regulations, banks and insurance companies doing business in New York State will need to establish a cybersecurity program, appoint a Chief Information Security Officer and monitor the cybersecurity policies of their business partners.

Banking 76
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Gear Up for the Enterprise Cloud at Ignite

Nutanix

There’s no question that enterprise application usability has for the most part been left behind.

article thumbnail

6 expert tips to better secure third-party network access

Network World

Third-party access Image by Harris & Ewing Collection (Library of Congress) Earlier this year, the Soha Third-Party Advisory Group conducted a study that surveyed more than 200 enterprise IT and security C-Level executives, directors and managers about the daily challenges they face providing fast and secure third-party application access to their contractors and suppliers.