Thu.Jul 21, 2016

article thumbnail

Forrester's 2016 ECM Panel Survey Is Open - Call for Participation

Forrester IT

Forrester's survey for ECM decision-makers is open, and we're looking for your participation! Take this opportunity to provide your perspectives on the key vendors, the challenges, and the opportunities you see in this technology market. This survey is intended for ECM decision-makers or influencers in end user organizations. This is not for ECM vendors or systems integrators. but vendors and consultants -- we would love it if you could share this survey invitation with your customers.

Survey 227
article thumbnail

How to choose between Native Apps or the Responsive Web?

CTOvision

Sunil Thomas. In the second article of how CTO’s can create a framework for enterprises to adopt mobile for growth we look at one of the early decisions to be made - that is choosing to build native apps or adopt the responsive web. In case you missed it, the previous article in the series discusses why a CTO makes or breaks your enterprise mobile strategy and discusses briefly the decisions that need to be taken within an enterprise to embrace mobile as a key part of its growth.

How To 168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Women in IT 2016: Panel session – what young women want from IT careers

Computer Weekly

In this video Sophie Deen of Bright Little Labs, Annabel Sunnucks from CA Technologies, and Elissa Morris from the Isle of Man Department of Economic Development, discussed their journey into the IT industry.

Video 140
article thumbnail

Navigating CRM in a Social Media Climate

IT Toolbox

Navigating customer relationship management (CRM) in the current social media climate means making changes and adapting to what today's customer wants, while still employing the time-tested strategies that have worked in the past. What Is CRM? CRM is a term that refers to the different tools companies employ to understand and analyze their customer interactions.

Media 157
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 144
article thumbnail

The Twisted Pair Ethernet Physical Channel

IT Toolbox

Because of the great interest among users and vendors in the twisted pair Ethernet concept, many vendors developed and began marketing products prior to the finalization of the 10BASE-T standard. As a result, some interoperability problems may occur if hardware from different vendors (all claiming some degree of compliance to 10BASE-T) is used.

Hardware 145

More Trending

article thumbnail

5 Ways ERP Works with Your Big Data

IT Toolbox

Do you know how much data your organization creates every day? Customer interactions, payment transactions, internal messages and more contribute to the daily rate of 2.5 quintillion bytes generated worldwide. Your enterprise resource planning system forms the backbone of many essential business functions, from human resources to accounting.

Big Data 140
article thumbnail

BT broadband users hit by second UK-wide outage in two days

Computer Weekly

Power supply issues at Docklands datacentre could be behind loss of internet access for more than 5,500 BT broadband users

Internet 136
article thumbnail

Salesforce Buys Data Center Optimization Startup Coolan

Data Center Knowledge

Initial plan is to use startup’s technology to optimize cloud company’s own infrastructure Read More.

article thumbnail

Why digital is not enough

Computer Weekly

Digital has become a buzzword, but IT leaders instead need to understand the characteristics of a 21st century digital organisation

131
131
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Industry-Specific ERP Software

IT Toolbox

Enterprise Resource Planning (ERP) software is quickly becoming a standard software solution in the manufacturing industry. In fact, it's thanks to this software that manufacturers are at the forefront of technology: ERP is able to give small business owners a complete insight into their business.

Industry 100
article thumbnail

Almost half of UK's largest councils lack cloud strategy, Eduserv FOI study reveals

Computer Weekly

Eduserv study into cloud take-up inside local authorities suggests council CIOs are still over-invested in on-premise technology

Study 132
article thumbnail

Time's Up: Preventing Unnecessary Overtime with ERP

IT Toolbox

The US Department of Labor recently reported that one of the greatest expenses companies face is labor costs. Contrary to popular belief, however, hiring more employees will neither help nor hinder the problem. It’s not the number of employees that incurs the expense; rather, it’s the number of hours each employee works.

Report 100
article thumbnail

IT outsourcing falls steeply in second quarter but IT as a service sees strong growth

Computer Weekly

Sales of IT as a service growth in Europe helped offset a huge fall in the total value of traditional IT and business process outsourcing contracts

123
123
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

One Critical ERP Vulnerability That You Can Prevent

IT Toolbox

According to a May 2016 alert released by the US Computer Emergency Readiness Team (US-CERT), more than 35 organizations around the world have been affected by an SAP vulnerability for which a patch

SAP 100
article thumbnail

Banking via websites in decline as mobile apps take over

Computer Weekly

The use of mobile apps to bank is growing fast and fewer people use the internet to handle their financial affairs

Banking 134
article thumbnail

Business Intelligence for Everyone

IT Toolbox

Our modern marketing columnist gives a primer on the value and basics of self-service business intelligence (BI), a management, marketing, and analysis tool no SMB should be without.

article thumbnail

Security industry welcomes cyber crime’s inclusion in official stats

Computer Weekly

The security industry welcomes the inclusion of cyber crime statistic in official crime reports to highlight the size and nature of the threat

Industry 120
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Ten Simple Ways to Fine-Tune Your Data Center Cooling System

Data Center Knowledge

A Data Center Knowledge guide for cooling efficiency improvements you can make today Read More.

article thumbnail

Women in IT 2016: Panel session – recruiting a diverse workforce

Computer Weekly

In this video Sinead Bunting from Monster, Heather Picov from Apps for Good, Emma Chalwin of Salesforce and Melinda Roylett from PayPal discuss how to recruit diverse talent in the IT industry.

Video 109
article thumbnail

MSPs Warned of BYOD Security Threat From Pokémon GO

Data Center Knowledge

Design flaw raises fears about data safety on enterprise and BYOD mobile devices used to play the game Read More.

Security 110
article thumbnail

Gartner offers insights into how cloud is disrupting traditional IT spending habits

Computer Weekly

Market watcher shines a light on how the adoption of off-premise technologies is shaking up enterprise IT spending trends

Trends 120
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Intel Profit Falls With Slow Growth in Key Data Center Unit

Data Center Knowledge

Results create concern that chipmaker's most profitable business won’t be able to make up PC market weakness Read More.

article thumbnail

Intel’s cloud and IoT-focused businesses deliver disappointing growth

Computer Weekly

Intel says its transformation to focus on cloud and IoT is on track, but these key business areas fail to deliver as much growth as expected

Cloud 109
article thumbnail

Video: How ForeScout Technologies fends off cyberattacks at the RNC and DNC

Tech Republic Security

TechRepublic's Dan Patterson talked with ForeScout VP Katherine Gronberg about the biggest cyber threats facing the conventions, and what goes on in the command center where those threats are monitored.

Video 86
article thumbnail

MasterCard acquires VocaLink from UK banks

Computer Weekly

Acquisition of payment systems company for £700m could increase innovation in the UK payments sector

Banking 115
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Week’s Second London Data Center Outage Disrupts Connectivity

Data Center Knowledge

Telehouse North facility in Docklands suffers outage due to tripped breaker Read More.

article thumbnail

How to Protect Yourself Against Phishing Scams

Galido

Phishing scams are one of the most common forms of cybercrime. While phishing is a widespread activity, it can be beaten. Apart from installing security software, a person can also combat this common scam by learning what it looks like. What is Phishing? Phishing (pronounced “fishing”) is a type of identity theft that has grown in popularity with hackers.

How To 76
article thumbnail

China’s Biggest Exchange Launches Colocation Data Center

Data Center Knowledge

Shenzhen Stock Exchange undertakes series of technology upgrades Read More.

article thumbnail

FBI needs to beef-up high-tech cyber threat evaluations says DoJ Inspector General

Network World

The FBI needs to identify and categorize cyber threats more quickly than it currently does in an effort to stay out in front of current and emerging cyber threats. +More on Network World: FBI: The top 3 ways Congress could help fight tenacious cyber threats + That was the general observation of a report out this week from the Department of Justice’s Office of the Inspector General which found that while the FBI has an annual process, known as Threat Review andPrioritization (TRP), to identify th

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.