Mon.Jun 27, 2016

article thumbnail

Here’s How Much Energy All US Data Centers Consume

Data Center Knowledge

Second study of its kind in history shows overall growth in data center energy use has flattened Read More.

article thumbnail

DriveScale Introduction – Smarter Data Center Infrastructure for Scale-Out

CTOvision

Michael Johnson. The video below provides context on DriveScale. DriveScale provides the only scale-out solution that enables administrators to bring the full benefit of their scale-out investment to their organizations. DriveScale enables organizations to buy commodity compute, storage, and networking resources separately, configure and rebalance ratios of resources optimally, and manage them simply.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Post-Brexit price hikes hit cloud and datacentre community, as currency fluctuations bite

Computer Weekly

Cloud and datacentre analysts claim IT buyers are already feeling the pinch from the outcome of the EU referendum, but past performance suggests demand for colocation space will rise in the event of recession

Cloud 162
article thumbnail

Get to know DMDII

CTOvision

Michael Johnson. This video provides an introduction to the Digital Manufacturing and Design Innovation Institute , a unique public-private partnership acting as a world-class, first-of-its-kind manufacturing hub. Based in Chicago, the Institute has the capabilities, innovative spirit and collaborative expertise to transform American manufacturing.

Video 151
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook data case raises US national security issues

Computer Weekly

Dublin court case on the legality of Facebook's data transfers to the US raises issues that impact US national security, claims US Department of Justice.

Security 168
article thumbnail

What a Digital Mindset Means Role by Role

Social, Agile and Transformation

We all hear and say that "Digital" requires a different mindset, a "Digital Mindset, but what exactly does that mean? If you think digital mindset is about having the latest gadget, or being the go-to person to configure your mobile device, or knowing the latest startup that is likely to disrupt an industry then you're missing the point. If you believe that digital natives have a leg up on.

Mobile 133

More Trending

article thumbnail

Report: Flood of Data Center Builders Causes Housing Shortage in Prineville

Data Center Knowledge

Workers building Apple and Facebook data centers having a hard time finding local places to live Read More.

article thumbnail

Hospitals targeted using camouflaged old malware

Computer Weekly

Specialised devices running older versions of operating systems are becoming critical points of cyber attack vulnerability, warns TrapX Security

Malware 164
article thumbnail

The four laws of robotics

IT Toolbox

Any one who has been involved in any sort of robotics must have heard of the three laws of robotics. From memory they go something like this. Law 1. A robot must not through action or inaction allow any harm to come to a human being. Law 2. A robot must always obey a human being unless it contradicts with law one. Law 3.

124
124
article thumbnail

Solid state storage in the datacentre: More than a flash in the pan

Computer Weekly

As IT organisations transform their datacentres to meet the efficiency and agility demands of the digital enterprise, flash storage is increasingly viewed as a key element

Storage 139
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Report: Brazil’s Biggest Supercomputer Down, Can’t Pay Its Bills

Data Center Knowledge

State-funded HPC lab doesn’t have enough cash to pay its huge electricity bill Read More.

Report 158
article thumbnail

Security Think Tank: A starter guide for biometrics in security

Computer Weekly

How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information?

Security 159
article thumbnail

Report: Intel Considering Sale of Its Cybersecurity Unit

Data Center Knowledge

PC-centered unit, started with McAfee acquisition in 2010, no longer fits Intel's new data center and IoT focused strategy Read More.

Intel 107
article thumbnail

Intel considers sale of security business

Computer Weekly

Intel is reportedly considering the sale of its security business to generate capital as the company restructures

Intel 151
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Tips for a Killer Social CRM Strategy

IT Toolbox

Businesses need the right tools, data, and game plan to take advantage of social customer relationship management.

Social 113
article thumbnail

Banking IT community faces uncertain Brexit future

Computer Weekly

The financial services IT community faces a period of uncertainty as finance firms reassess plans following the EU referendum result

Banking 130
article thumbnail

Bad SAP enterprise asset master data is a waste of time

IT Toolbox

asset managers are wasting up to 40% of their time looking for stuff

SAP 100
article thumbnail

Australia’s NAB bank accused of “violating” customer through data sharing

Computer Weekly

Australian bank NAB is accused of violating a customer over industry data sharing

Banking 160
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Bitcoin wallets

IT Toolbox

If you are going to use bitcoins, you have to have a bitcoin wallet.

100
100
article thumbnail

DARPA wants radical propulsion system capable of Mach/hypersonic speeds

Network World

Fast, faster, fastest might be an accurate description of the type of propulsion system researchers from DARPA are looking to build in the next few years. The radical research agency will next month detail what it calls the Advanced Full Range Engine which, in a nutshell, is a dual personality propulsion system that combines a turbine engine for low speed operations with a ramjet/scramjet for high speed, supersonic operations.

System 67
article thumbnail

New Ways to Discover and Use Alexa Skills

All Things Distributed

Introducing New Features That Make It Easier for Customers to Discover and Use Your Alexa Skills. Alexa, Amazon’s cloud-based voice service, powers voice experiences on millions of devices, including Amazon Echo and Echo Dot, Amazon Tap, Amazon Fire TV devices, and devices like Triby. that use the Alexa Voice Service. One year ago, Amazon opened up Alexa to developers, enabling you to build Alexa skills with the Alexa Skills Kit. and integrate Alexa into your own products with the Alexa Voice Se

article thumbnail

DHS wants to predict how malware will morph

Network World

The Department of Homeland Security (DHS) wants to be able to predict what form malware will morph to so it can plan how to block it when it becomes reality. DHS has granted Charles River Analytics in Cambridge, Mass., $500,000 to develop the technology, known as Predictive Malware Defense (PMD). Charles River will use machine learning and statistical models to predict attacks based on new malware as well as create defenses ahead of time.

Malware 66
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Diamanti believes appliances can simplify containers for the enterprise

Tech Republic Data Center

Containers are hot, but they still have some barriers to adoption. TechRepublic spoke with Diamanti VP Mark Balch on how appliances could help solve the problem.

article thumbnail

IRS kills electronic filing PIN feature due to repeated attacks

Network World

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically. The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week. In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to o

Social 65
article thumbnail

What Recruiters and Hiring Managers Are Looking for in a Data Scientist

Dataconomy

Lindsey Thorne, Manager of the Open Source & Big Data Practice at Greythorn Lindsey has been in HR and recruiting for more than 12 years, and after narrowing her focus to the open source and data science market in 2012, she’s built a reputation for being the one recruiter “inside”. The post What Recruiters and Hiring Managers Are Looking for in a Data Scientist appeared first on Dataconomy.

article thumbnail

A hacker wants to sell 10 million patient records on a black market

Network World

A hacker claims to have stolen close to 10 million patient records and is selling them for about US$820,000. Over the weekend, the hacker, called thedarkoverlord, began posting the sale of the records on TheRealDeal, a black market found on the deep Web. (It can be visited through a Tor browser.) The data includes names, addresses, dates of birth, and Social Security numbers – all of which could be used to commit identity theft or access the patient’s bank accounts.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Three Elements in Running IT with digital Boldness

Future of CIO

A bold IT does not mean IT goes rogue, it means IT becomes more intelligent, agile, mature, and speed up. Corporate IT plays a significant role in the digital transformation of the business. IT is shifting from a transaction-oriented support center to an innovation-driven change agent; from a reactive order-taker to a proactive strategy-co-creator. Here are three crucial elements to running digital IT in boldness.

article thumbnail

Boost your security: Get IT and HR to collaborate

Network World

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR). One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC) , when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive

article thumbnail

Data analytics: PearlHPS SaaS solution predicts business outcomes a year in advance

Tech Republic Big Data

PearlHPS provides a predictive analytics tool called PearlPredict that it says can predict project execution outcomes up to 12 months ahead of time.

Data 42
article thumbnail

FBI expansion of surveillance powers meets obstacle

Network World

A move in the Senate to provide enhanced surveillance powers to the FBI through the use of National Security Letters met a hurdle Monday after Senator Ron Wyden placed a hold on the 2017 Intelligence Authorization bill over the controversial provisions. Wyden’s hold is a a measure by which a senator or group of senators can prevent a motion from reaching a vote.

Meeting 62
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.