Wed.Jun 29, 2016

article thumbnail

Architect Process Agility With BPM Platforms For Digital Business

Forrester IT

Some CIOs and enterprise architecture (EA) pros believe that business process management (BPM) is on the opposite side of agility -- but they don't realize that BPM technology itself is also evolving. Agility-oriented BPM platforms are the foundation of a digital business. I've recently published a report that discusses the four key areas that EA pros must focus on to accelerate digital transformation with BPM.

Agile 186
article thumbnail

Most cyber security strategies ignore the way attackers really work

Computer Weekly

Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals

Strategy 176
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Center SDN: Comparing VMware NSX, Cisco ACI, and Open SDN Options

Data Center Knowledge

What to keep in mind when evaluating SDN options for the ever important networking layer Read More.

article thumbnail

Lauri Love using illness as a shield against extradition claims prosecution

Computer Weekly

Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges, as Love's legal team press for the case to be heard in the UK.

153
153
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google-Backed FASTER Submarine Cable Goes Live

Data Center Knowledge

System adds much needed bandwidth between US and Asian data center markets Read More.

article thumbnail

Europe fires starting gun for dash to GDPR compliance

Computer Weekly

A last dash for compliance with the general data protection regulation (GDPR) has begun across Europe and, despite the two-year warning, some organisations will fall short

Data 135

More Trending

article thumbnail

Lauri Love may be faking mental illness claims lawyer for US

Computer Weekly

Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US

128
128
article thumbnail

Six Mistakes Hosting, Cloud, Managed, and Colo Providers Make

Data Center Knowledge

As nearly every industry under the sun gets disrupted by IT, there are unprecedented opportunities and challenges Read More.

Cloud 141
article thumbnail

Tech Talent Charter finalises launch as part of London Technology Week

Computer Weekly

Technology company “collective”, the Tech Talent Charter launches to tackle lack of diversity in the tech sector

Company 161
article thumbnail

Cisco to Acquire Cloud Security Firm CloudLock for $293M

Data Center Knowledge

CloudLock claims to have more than 700 customers with tens of millions of users under management Read More.

Security 116
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Number of women tech bosses doubles year-on-year

Computer Weekly

The number of women heading up tech departments has risen to 7% in 2016, finds Mortimer Spinks

163
163
article thumbnail

Why antivirus programs have become the problem, not the solution

Tech Republic Security

Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.

article thumbnail

Security Think Tank: Research biometrics thoroughly before deploying

Computer Weekly

How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information?

Research 130
article thumbnail

Google My Activity site reveals all the data that's been collected about your online habits

Tech Republic Security

Google recently launched a new page called My Activity that shows you a history of your online activities and interactions with its products.

Google 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Most European firms ill equipped for insider security breaches

Computer Weekly

Nearly a third of European firms do not use basic methods of breach detection, and fewer than one in five have any form of security analytics in place, a survey has revealed

Security 108
article thumbnail

No ‘Unregulated Open Field’ for Fintechs, French Watchdog Warns

Data Center Knowledge

Financial technology companies: the industry rules apply to you too Read More.

Financial 105
article thumbnail

IT services sector faces freeze amid Brexit wrangling

Computer Weekly

The IT services sector across the globe will be hit by the uncertainty around the UK's future relationship with the EU, but a spending freeze will eventually thaw

111
111
article thumbnail

Research: Apple rated highest for security on mobile devices

Tech Republic Security

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Brexit: Datacentre investments set to slow as economic stability concerns hit CIOs

Computer Weekly

As the economic uncertainty around Brexit continues, CIOs may put new datacentre investments on hiatus, warns analyst

133
133
article thumbnail

Terrorism database of 2.2 million people leaked, a blacklist used by governments, banks

Network World

Security researcher Chris Vickery has a knack for finding unprotected databases, but this time it’s an especially explosive discovery as he came across a “terrorism blacklist” which contains the names of 2.2 million “heightened-risk individuals and organizations.” Vickery asked Reddit if he should share a copy of the Thomson Reuters World-Check database from mid-2014.

Banking 70
article thumbnail

Australia’s National Broadband Network project up in the air

Computer Weekly

As Australian voters go to the polls this weekend, the future of the country's National Broadband Network is up in the air

Network 126
article thumbnail

Dangerous keyboard app has more than 50 million downloads

Network World

The Flash Keyboard app has been downloaded more than 50 million times -- but is capable of some extremely dangerous behaviors. "It looked like it was a convenient keyboard that had some nice features," said Bill Anderson, chief product officer at mobile security company OptioLabs. "The marketing copy in the app store looked great." For a while, the app was in the top 20 downloads for the Google Play Store, he added.

Mobile 69
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Middle East and Africa to see fastest IP traffic growth to 2020

Computer Weekly

IP traffic in Middle East and Africa to grow 41% a year to 2020, according to Cisco Visual Networking Index

Network 133
article thumbnail

Terror-suspect database used by banks, governments, has been leaked

Network World

A database described by some as a "terrorism blacklist" has fallen into the hands of a white-hat hacker who may decide to make it accessible to the public online. The database, called World-Check, belongs to Thomson Reuters and is used by banks, governments and intelligence agencies to screen people for criminal ties and links to terrorism. Security researcher Chris Vickery claims to have obtained a 2014 copy of the database.

Banking 63
article thumbnail

Vodafone may pull jobs out of UK after Brexit

Computer Weekly

Vodafone says it may pull its headquarters out of the UK after the country voted for Brexit

128
128
article thumbnail

Wormable flaws in Symantec products expose millions of computers to hacking

Network World

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Symantec released patches for the affected products, but while some products were updated automatically, some affected enterprise products could require manual intervention.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amazon launches Elastic File System to bring scalable storage to the cloud

Tech Republic Cloud

The AWS Elastic File System (EFS) is now available in production to create file storage that scales automatically without additional provisioning.

Storage 69
article thumbnail

Why CIOs should care about click fraud

Network World

The ancient Chinese military strategy guide The Art of War says that if you want to have a chance of prevailing in battle, you need to know your enemy. It’s good advice for the battlefield, and it's also good advice if you want to beat hackers in their constant attempts to take over your network. But in order to know these hackers you need to understand their motivations, and in many cases those motivations may not be what you expect.

Malware 62
article thumbnail

OVS Integration with Debian Network Scripts

Scott Lowe

I had a reader contact me recently with some questions regarding the use of Open vSwitch (OVS) on Debian “Jessie” 8.5 and using the OVS integration with the Debian network scripts. For those of you that might be unfamiliar with this functionality, it’s the ability to configure OVS via instructions and directives found in the /etc/network/interfaces file.

Network 60
article thumbnail

ACLU lawsuit challenges US computer hacking law

Network World

The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking-crimes law, with the civil liberties group saying the law inhibits research about online discrimination. The ACLU on Wednesday filed a lawsuit challenging the Computer Fraud and Abuse Act on behalf of a group of academic researchers, computer scientists, and journalists.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.