Mon.Nov 28, 2016

article thumbnail

Take a Pragmatic Approach To Personalization

Forrester IT

Co-authored by Allison Cazalet. Has the topic of personalization come up within your organization recently? Chances are that personalization not only comes up, it's also a foremost priority: 68% of the firms we surveyed in our Q1 2016 Digital Experience Delivery Online Survey said personalization was one of the most important initiatives for their business today.

Survey 230
article thumbnail

DoD Contractors: Complying with new DFARS regulations is easier with external help

CTOvision

Bob Gourley. If you are a DoD contractor of any size, including sub contractors to other contractors, you no doubt have already heard of the new changes to the Defense Federal Acquisition Regulations (DFARS) requiring enhanced security controls over contract info. The regulations are specific and will be costly. The good news is that the cost of compliance is considered an allowable cost under Federal Acquisition Regulation (FAR)/Cost Accounting Standards (CAS), which means if you do things smar

CTO Hire 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HMRC geared up to block 500 million phishing emails a year

Computer Weekly

HMRC is first department to implement technology to block phishing emails as part of UK government’s active cyber defence programme and self-testing strategy

Strategy 210
article thumbnail

Oracle Bare Metal Cloud: Top Considerations and Use-Cases

Data Center Knowledge

Welcome to a new type of cloud experience: The Oracle Bare Metal Cloud. Now, learn about some unique data base offerings, Oracle's approach to cloud, the power of bare metal, and some cautions to be aware of. Read More.

Oracle 180
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Petition to force MPs to consider debate on surveillance bill

Computer Weekly

Open Rights Group has called on parliament to debate the Investigatory Powers Bill and review it in light of pending court actions, after petition against the bill tops 100,000 signatories

Groups 186
article thumbnail

Rackspace Still to Decide Who Builds its Central Frankfurt Data Center

Data Center Knowledge

The managed cloud provider is making the dive into Germany’s highly competitive cloud services market, at the epicenter of the action. But that’s also where all the controversy is centered. Read More.

More Trending

article thumbnail

Apple’s $1 Billion Plan Hits a Three-Person Roadblock in Ireland

Data Center Knowledge

What would be one of the most high-profile European investments for Apple is an even bigger deal for Ireland Inc. in what’s turned out to be a torrid year. Read More.

Apple 165
article thumbnail

Surrey County Council extends BT PSN contract for two years

Computer Weekly

Council’s contract for Unicorn network, which provides a fully managed and integrated voice and data communications service, extended to 2021

Network 188
article thumbnail

Report: GoDaddy VP and Managing Director of India and Australia to Join Microsoft

Data Center Knowledge

GoDaddy vice president and managing director of India and Australia, Rajiv Sodhi, is joining Microsoft next month to lead its cloud and server business, Read More.

Microsoft 153
article thumbnail

Future of the server operating system

Computer Weekly

We look at the evolution of the server operating system, and how the next generation is moving into the cloud

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The state of malware: 4 big takeaways from AV-TEST's 2016 report

Tech Republic Security

The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe.

Malware 123
article thumbnail

San Francisco transport system hit by ransomware attack

Computer Weekly

San Francisco's transport agency appears to be the latest target of cyber criminals using encryption malware to hold organisations to ransom

article thumbnail

Google security expert says antivirus apps don’t work

Network World

A senior security engineer at Google told a hacker conference that traditional antivirus apps that use intrusion detection are useless and companies should switch to meaningful methods such as whitelisting applications. At Kiwicon X , the New Zealand equivalent of the Black Hat conference held in the United States, Darren Bilby called many existing tools ineffective "magic" that engineers are forced to install for the sake of compliance but at the expense of real security.

Google 115
article thumbnail

Singapore Power deploys IoT platform

Computer Weekly

Singapore Power is moving to a more advanced digital platform that will enable it to develop IoT-based services

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG.

Firewall 111
article thumbnail

Measures to boost digital economy announced in Malaysia budget 2017

Computer Weekly

Malaysia’s latest budget reflects the country’s aim to boost the digital economy

Budget 192
article thumbnail

How to add more entropy to improve cryptographic randomness on Linux

Tech Republic Security

If you have Linux servers that depend upon encryption, you owe it to yourself to beef up the system entropy. Here's how to do so with haveged.

Linux 121
article thumbnail

Commercial Bank of Dubai to launch digital-only bank

Computer Weekly

Dubai bank is set to launch a digital-only bank that will be based on mobile phones

Banking 181
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers exploit app flaw and steal a Tesla Model S

Network World

In September, Chinese researchers from Keen Security Lab showed how a Tesla Model S could be remotely hacked while it was being driven. The hack demonstrated by Promon , a Norwegian security company, provided “additional functionality” for cyber thugs to control the vehicle, including enabling “keyless driving functionality,” which could allow a crook to drive away with a Tesla without have a key fob present.

Research 102
article thumbnail

How to combat software auditors

Computer Weekly

Software audits can be a huge waste of time and resources for IT departments

Software 169
article thumbnail

IDG Contributor Network: Has IT become too complex to manage?

Network World

In the late 1990s, I was responsible for technical operations for a large healthcare organization. We supported more than 5,000 users across 50 locations and supported three distinct lines of business. We were a very progressive organization at the leading edge of technology innovation in healthcare. It was not a simple operation. Well, at least not for 1997.

article thumbnail

How to use snapshots in VirtualBox

Tech Republic Data Center

If VirtualBox powers your virtual machines, start taking advantage of the snapshot feature today.

How To 95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

One million broadband offline in Germany; 'external influence' blamed

Network World

Almost one million Deutsche Telekom customers have been struggling to get online since Sunday afternoon. There's nothing wrong with the network, the company said, advising customers having trouble connecting to the internet to turn their router off and on again in the hope of solving the problem. Around 900,000 lines were initially hit by the connection problem, although the number affected is falling, Deutsche Telekom said Monday.

article thumbnail

5 Gadgets to Make Your Living Room Smart

Galido

These days, we surround ourselves with gadgets, we carry them around, we even wear them. There is no place where gadgets are more relevant than the living room. It is after all where we spend most of our free time, except perhaps in bed. Using gadgets to make your living room smart is a great idea. Embrace the new technology that is available and you, your friends and family can enjoy endless hours of riveting, cutting edge entertainment.

article thumbnail

San Francisco Muni says server data not accessed in ransomware hit

Network World

The San Francisco Municipal Transportation Agency said late Monday that no data had been accessed from its servers in a ransomware attack on the Muni transit system and the agency has never considered paying the ransom asked by the attacker. The statement by the SFMTA follows reports that the alleged attacker has threatened to dump 30GB of data stolen from the agency, if the ransom of the equivalent of about $73,000 in bitcoin was not paid.

Data 93
article thumbnail

Liveblog: Hybrid Architectures, Bridging the Gap to the Cloud

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “Hybrid Architectures: Bridging the Gap to the Cloud” (ARC208). The line to get into this session, as with the previous session, was quite long—and that was for attendees who’d already registered for the session. Feedback I’ve heard from folks who weren’t registered for sessions was that they weren’t getting in, period.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Japanese government denies report that its defense forces were hacked

Network World

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year. An attacker was able to break into the Ground Self-Defense Force's computer systems, sources at the Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.

article thumbnail

“You can’t stop the device from getting hacked, you have to defend your data” – A Primer with Kevin Mahaffey

Dataconomy

Kevin Mahaffey is an entrepreneur, investor and engineer with a background in cybersecurity, mobile and machine intelligence. He is CTO and Founder of Lookout, a cybersecurity company dedicated making the world more secure and trustworthy as it becomes more connected, starting with smartphones and tablets. He started building software when. The post “You can’t stop the device from getting hacked, you have to defend your data” – A Primer with Kevin Mahaffey appeared first on Dat

CTO 70
article thumbnail

Advice for evading ATM skimmers

Network World

I cannot use an ATM these days without wondering if I am getting ripped off by a stealthy skimming device that has been placed inside the machine’s card slot. One reason for my concern is that for years now I have been reading with great interest a series of articles on the subject by security expert Brian Krebs, who posted another one just yesterday.

Video 92
article thumbnail

IDG Contributor Network: Walmart's better tracking for recalled items is a wonderful first step

ComputerWorld IT Management

Walmart's new attempt to use blockchain to help it contact buyers of recalled, dangerous products faces up to a long-neglected reality. That reality is that almost any meaningful improvement in how quickly and completely retailers contact impacted customers and retrieve recalled products — an act that can literally save lives — will deliver the best ROI of any technology change.

Network 56
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.