Fri.Aug 19, 2016

article thumbnail

How British Gas Transformed Customer Engagement And Won Our 2015 EA Award

Forrester IT

Customers' perception of a company depends on their experiences with the organization at every point of contact. Companies can try to change how customers view a brand in a number of ways, such as a new mobile app or an improved complaint-handling process. However, to really improve customer perception, every interaction at every touchpoint must answer questions, suggest new services, and deepen the relationship.

Big Data 207
article thumbnail

Tracking The Megatrend of Bigdata

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of Big Data. For years now people and our sensors and our computers have been generating more information than we can analyze.

Big Data 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Takes Next Step To Becoming A Partner For The CIO's BT Agenda

Forrester IT

This week's announcement by Cisco , that it will be restructuring to move away from hardware to further invest in key priority areas in its portfolio, such as security, IoT, collaboration, next generation data center and cloud, did not come as a real surprise to Forrester. Last year, Forrester evaluated Cisco's efforts to transform itself from a network business to a global provider of business technology (BT) -- the technology, systems, and processes to win, serve, and retain customers -- and a

Network 174
article thumbnail

Expect ransomware arrests soon, says bitcoin tracking firm Chainalysis

Computer Weekly

Law enforcement organisations are set to ramp up arrests of cyber criminals behind ransomware attacks, according to financial technology startup Chainalysis

Financial 150
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Can Space Weather Kill the Cloud?

Data Center Knowledge

This data center operator believes it’s possible, and they’re doing something about it Read More.

article thumbnail

No alternative to bulk surveillance powers, says Anderson report

Computer Weekly

The government welcomes a review of the controversial Investigatory Powers Bill that found there is no viable alternative to the bulk data collection powers proposed by the bill

Report 138

More Trending

article thumbnail

Intel sees 5G networks as opportunity to sell more server chips

Computer Weekly

Intel focuses on the back-end infrastructure behind upcoming 5G networks as it sees an opportunity for its processors and other datacentre technology

Intel 129
article thumbnail

Pentagon Has a New Data Center Consolidation Plan

Data Center Knowledge

Defense Department responds to critical watchdog report with new IT strategy Read More.

article thumbnail

Police arrest woman in connection with Sage data breach

Computer Weekly

A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage

Data 139
article thumbnail

How to avoid falling victim to Android app scams on Google Play

Tech Republic Security

Android security is a serious problem, and the Play store is a hotbed of malware. Here are a few simple tips for avoiding the wrong apps when you go looking for new ones.

Malware 90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Volvo joins forces with Uber for autonomous vehicle pilot

Computer Weekly

Self-driving Volvo cars will take to the streets of Pittsburgh as part of a test of autonomous technology spearheaded by ride-sharing firm Uber

116
116
article thumbnail

Utah, New Mexico Vie for Facebook Data Center

Data Center Knowledge

Social network not yet committed to building in either state Read More.

article thumbnail

FBI: Bank robbery? There’s an app for that

Network World

The FBI today said it released a new application easier for the public—as well as financial institutions, law enforcement agencies, and others—to view photos and information about bank robberies in different geographic areas of the country. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!) + The Bank Robbers application runs on iPhones and iPads (Apple iTunes) as well as Android smartphones (Google Play) and lets users sort bank robberies by the date t

Banking 74
article thumbnail

Free Helpdesk Software

Galido

Does your IT group not have the budget for helpdesk software to keep track of employee troubletickets? Looking for free, opensource, helpdesk software? Here’s a list of open source options for your review. Some projects are current, some may have discontinued development. Check out these various options below. Some worth trying are osTicket, OTRS Free, Mantis Bug Tracker, and Bugzilla.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

SECURED moves IoT and BYOD security to the network

Tech Republic Security

Researchers figured out a way to move the responsibility of securing millions of BYOD and IoT devices to the network. Get details about the SECURED project.

article thumbnail

Keep using password managers -- bugs and all

Network World

Bugs in several password managers, including the vulnerabilities discovered in LastPass in late July, have scared away some users. But such fears go too far. Millions of users rely on password managers to keep track of passwords for applications and online services, and by all indications, they work better than trying to do it on your own. Security victories should be embraced -- including password managers, which automatically generate complex strings of characters as passwords and deploy a uni

article thumbnail

Containers, cloud, and how developers predict the future of enterprise tech

Tech Republic Data Center

The things developers embrace today tend to see mainstream enterprise adoption tomorrow.

article thumbnail

One smart plug isn't so bright when it comes to security

Network World

Smart sockets that let you control an electrical plug over the internet may sound cutting edge, but they can also be rife with security flaws. One such plug was found vulnerable to hacks. Security firm Bitdefender said that it could steal user email logins from the device, control it over the Internet, and potentially use the socket to launch other malware attacks.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The best of big data NoSQL: MongoDB, Amazon, and DataStax top Forrester list

Tech Republic Big Data

Research firm Forrester recently released its Q3 2016 Wave report for big data NoSQL vendors. Here's how the top contenders stacked up.

article thumbnail

Shared code in Snowden leaks and NSA breach support hackers' claims

Network World

Documents leaked by former National Security Agency contractor Edward Snowden share a malware tracking code with several files released this week by hacking group Shadow Brokers, according to a news report. Shadow Brokers claimed they had hacked a cyberespionage team linked to the U.S. spy agency when they released a group of sample files earlier this week.

Malware 60
article thumbnail

How CallMiner uses analytics to secure customer data and ensure PCI compliance

Tech Republic Big Data

When recording voice conversations, complying with Payment Card Industry Data Security Standard regulations is tricky. Voice-analysis tech simplifies the process.

article thumbnail

London vs. Berlin – The Startup City Battle Infographic

Dataconomy

London has reigned undisputed as Europe’s digital startup king since the first rise of the digital economy in the old continent. However, Berlin has recently established itself as London’s chief rival, even before the UK’s EU referendum. According to UK Prime Minister Theresa May, the implementation of Brexit will not occur. The post London vs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Oracle TO_NCLOB Function with Examples

Database Star

The Oracle TO_NCLOB function is a simple function and is used for conversion. Learn what it does and see some examples in this article. Purpose of the Oracle TO_NCLOB Function The purpose of the TO_NCLOB function is to convert a value from a LOB to an NCLOB value. You may not use it very often, […].

Oracle 43
article thumbnail

IDG Contributor Network: The CVS go-it-alone app suffers from the pharma payment pain

ComputerWorld IT Management

When CVS last week (Aug. 11) rolled out its in-store mobile payment app, it was the latest example of the front-loading approach to mobile payments. That's where you let shoppers do as much as possible within the payment app long before they get to the top of the checkout line. That way, what they perceive as the payment part can be as quick and painless as possible.

Network 40
article thumbnail

"CIO Master" Book Tuning XXXXXXXX: Digital IT: From the Lubricant of a Mechanical Business to the Fertilizer of a Living Organization

Future of CIO

IT is like the fertilizer to the business soil for enriching workplace and catalyzing business growth. At the industrial age, an organization is like a mechanical system, business management applies the reductionist’approaches and practices to improving its efficiency, and IT is the lubricant to the business machine, keep it spinning. At the dawn of the Digital Era, with increasing speed of changes, and the digital nature of hyper-connectivity and interdependence, a business today is more like a

Agile 40
article thumbnail

Foto Friday – Logan Pass Walkway

Eric D. Brown

This is a black and white of Hidden Lake Overlook Trail at Logan Pass in Glacier National Park. Captured with Canon 7D Mark II and Sigma 8-16mm. See more photos in my flickr photostream and/or my 500px portfolio. If you like my photography , feel free to support my addiction habit by purchasing a copy for your wall and/or visiting Amazon (affiliate link) to purchase new or used photographic gear.

100
100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Election Tech Poll: Which general election campaign is the most tech savvy?

Tech Republic Big Data

As the general election field takes shape, campaigns compete online with robust social media and big data operations. Which candidate-Trump, Clinton, Stein, or Johnson-is the most technological?