Tue.Jun 28, 2016

article thumbnail

Let's go back to the future--it is time to start planning now for customer service in 2021

Forrester IT

This a guest post by Meredith Cain , a Research Associate on the Application Development & Delivery (AD&D) team. Let's take trip back to 1989. One of the big movies of that year was "Back to the Future: Part II." One of the great things about that movie was its view of the future--or, because so much has time has passed since the film was released, its view of what our present should be like.

Film 210
article thumbnail

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Nate Crocker. Is AI ready for primetime? Not according to Admiral Michael S. Rogers, Commander U.S. CYBER COMMAND. In a recent interview with Charlie Rose, he stated that machine learning showed great promise for cybersecurity, but that the necessary technology was probably five years out. If machine learning is currently so successful in other areas of society, why isn’t it ready for cybersecurity?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cisco buys Cloud Security Gateway vendor CloudLock for $293M

Forrester IT

Given Symantec's recent acquisiton of BlueCoat (and with it BlueCoat's earlier acquired Elastica and Perspecsys cloud security gateway (CSG) assets), and IBM's organic buildout of its Defender CSG solution it comes hardly as a surprise that Cisco today announced its intent to acquire CloudLock for US$293M (in Forrester's estimation this purchase price represents at least 10-15x of CloudLock's current revenues).

Cloud 186
article thumbnail

Verisign iDefense IntelGraph: Vulnerability Threat Exposure Use Case

CTOvision

Michael Johnson. Verisign iDefense IntelGraph is an innovative new tool to capture and link all facets of cyber threat landscape data together. This data driven security intelligence application allows practitioners to quickly understand the diverse threats they are facing, investigate additional risks to their organization, allocate resources more effectively and determine the proper courses of action to take.

Course 154
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Prison services colluded with Ofcom in test of mobile phone blockers

Computer Weekly

Leaked documents reveal trials of mobile traffic interception technology in UK jails, which may have affected users beyond the prison walls

Mobile 174
article thumbnail

Social Engineering and Phishing

CTOvision

Stu Sjouwerman. Social engineering is one of the most problematic attack techniques to combat. It preys on our nature as human beings and is therefore difficult to counter by using technology. User education is most effective at stopping a social engineer. Users who are aware of the potential for social engineering attacks and learn to recognize them can use simple methods to thwart these attacks successfully.

More Trending

article thumbnail

An Update on the Megatrend of Cybersecurity

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of enhanced Cybersecurity.

Trends 152
article thumbnail

Yahoo Wants to Sell Its ‘Chicken Coop’ Data Center Designs

Data Center Knowledge

Trove of 3,000 patents and applications being sold includes data center design innovations Read More.

article thumbnail

Intro to Graph Databases Series: Episode 1

CTOvision

Michael Johnson. Ryan Boyd, Neo4j Head of Developer Relations NA, introduces Graph Databases in this series of short videos. This episode talks about the evolution of databases and how Graph Databases fit in the bigger picture.

Video 151
article thumbnail

Outgoing information commissioner claims good year for ICO

Computer Weekly

The ICO is to discuss with government the implications of the Brexit vote and its effect on data protection reform in the UK, says outgoing information commissioner Christopher Graham

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HPE Wants to Give Data Center Automation a Fresh Start

Data Center Knowledge

Platform unifies automation scripts by DevOps and developers in heterogeneous data centers Read More.

article thumbnail

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

article thumbnail

After Brexit Vote, US Tech Giants Face Splintered Digital Future in Europe

Data Center Knowledge

UK's EU exit may complicate European data center strategy for service providers and their customers Read More.

article thumbnail

Greater focus on UK tech talent essential in face of Brexit

Computer Weekly

The UK is already suffering from an IT skills crisis, so how will leaving the European Union affect tech jobs now and in the future?

138
138
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Report: New security threats costing businesses $1 million an incident, flash performance suffers

Tech Republic Data Center

A new report from EMC shows that businesses are tackling traditional cybersecurity issues better, but they are failing to address emerging threats.

Report 107
article thumbnail

CW@50: Spreadsheets and ERP – 50 years of software coding business

Computer Weekly

Business software has been a rich field for IT professionals over the past five decades, and we are on the cusp of a new era of customers rolling their own for competitive advantage

Software 113
article thumbnail

Sabey, Q9 Partner on Cross-Border US-Canada Data Center Offering

Data Center Knowledge

Will pitch each other’s services to current and prospective customers Read More.

article thumbnail

Bet365 bets on Simplivity hyper-converged for test and dev

Computer Weekly

Bet365 follows up its move to object storage with efficiency gains that result from migration of test and dev work to Simplivity hyper-converged infrastructure from HDS SAN

Storage 108
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cybersecurity Mania Subsides and Ushers in a Shakeout: Gadfly

Data Center Knowledge

For the cybersecurity industry, the moment of reckoning is here Read More.

Industry 119
article thumbnail

Brexit: CIO strategy following currency and market turmoil

Computer Weekly

Industry watchers expect sterling’s position to remain weak against the US dollar, prompting speculation that US IT suppliers may increase prices

Strategy 120
article thumbnail

IoT botnet: 25,513 CCTV cameras used in crushing DDoS attacks

Network World

Over 25,000 hacked internet-connected CCTV cameras are being used for a denial-of-service botnet, according the researchers from the security firm Sucuri. The discovery came after Sucuri mitigated a DDoS attack against a jewelry store site; it had been generating 35,000 HTTP requests per second. But after bringing the website back up, researchers said the attacks increased to nearly 50,000 HTTP requests per second.

article thumbnail

Security Think Tank: Proceed with caution on biometric authentication

Computer Weekly

How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cisco announces its intent to acquire Ascent VC Portfolio Company CloudLock

The Investing Edge

This is an exciting day as Cisco announced its intent to acquire our portfolio company CloudLock (read more here ). It’s a story that warrants celebration, especially in the Boston-area, where it is another example of Massachusetts’ global leadership in the IT security ecosystem. Since its founding in 2011, CloudLock has grown to be at the forefront of the cloud security sector, accumulating an enviable roster of leading customers and partners.

Company 70
article thumbnail

MongoDB offers cloud overflow scaling with Atlas database as service

Computer Weekly

MongoDB has announced its entry into cloud computing with a database as a service, dubbed Atlas, at its annual developer conference in New York City

Cloud 108
article thumbnail

How to take quick Google Keep notes with the help of Nova Launcher Prime

Tech Republic Cloud

Attention Google Keep power users: With the help of Nova Launcher Prime, you can take Keep notes with a quick swipe of the finger. Jack Wallen shows you how.

Google 79
article thumbnail

Finland’s prisons move to a cashless world

Computer Weekly

Inmates in Finland’s prisons will no longer need to use cash as a pre-paid card system is rolled out

System 132
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Developers will cheat on their cloud provider for better security, new survey says

Tech Republic Security

Security is the top reason developers consider jumping to a new cloud, along with better reliability and a better user experience, according to a new survey by Evans Data.

Survey 75
article thumbnail

BT to offer secure, private network connection into Oracle Cloud

Computer Weekly

Telco plans to roll out BT Connect service to Oracle Cloud customers during final quarter of 2016

Oracle 116
article thumbnail

5 Must-Have Productivity Tools

Galido

The modern working regime has quite a few rules that we need to understand and follow. With the fast paced environment all around us, the regular working day has become more dynamic and productivity oriented. If you look just several years back, being productive meant how many calls you can make during a day. Well that changed and for the better. Being productive still implicits this fact, but it also implies sending emails, attending meetings, writing reports, updating social media and much mor

Tools 72
article thumbnail

11 ways to fight off ransomware

Network World

Reinventing malware Image by MartialArtsNomad.com Just like evolution from viruses, to botnets and malware families that we’ve seen over the past decade, bad actors continue to find new ways of reinventing old threats. Today, the top trend in modern malware is the proliferation of ransomware. Ransomware has come a long way from the non-encrypting lockscreen FBI scare warnings like Reveton.

Malware 71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.