Wed.Sep 28, 2016

article thumbnail

Bosch And SAP Agree A Strategic Internet Of Things (IoT) Partnership To Facilitate Data Orchestration

Forrester IT

I recently attended an event at which Bosch and SAP announced a major partnership to more closely align their respective cloud and software expertise around the industrial internet of things. This partnership underlines the fact that SAP and Bosch are prepared to significantly transform their respective business models to generate new value for their customers.

SAP 280
article thumbnail

Open source storage hits the mainstream

Computer Weekly

Open source storage has gained mainstream acceptance in high performance computing, analytics, object storage, cloud (OpenStack) and NAS use, but can it crack the enterprise?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Ignite: Windows Server 2016 Launches, Along With Host of Third-Party Releases

Data Center Knowledge

There's a lot of excitement for the new features and extensibility in the latest offering, but Microsoft isn't the only one making news around it. Read More.

Microsoft 169
article thumbnail

Docker storage: how to get persistent storage in Docker

Computer Weekly

Docker, by default, doesn’t come with persistent storage, which presents an issue to some workloads customers that want to run in containers – however, there are ways to achieve persistent storage

Storage 190
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Alexa, Siri, and Cortana Voice Controls Going Mainstream

Social, Agile and Transformation

Alexa has over 3000 skills. The iPhone 7 goes wireless, a step Apple is taking to get users to leverage Siri more frequently and easily. Microsoft is broadening Cortana's AI capabilities. . We've reached an inflection point; the end of the keyboard, mouse, and touchpad and the start of voice commands as a legitimate controller. When you develop your next application, you are likely implementing.

Wireless 141
article thumbnail

Microsoft preps datacentres for AI revolution through deployment of reprogrammable chips

Computer Weekly

Microsoft claims field programmable gate array chips are now live in Azure datacentres in 15 countries, as it future-proofs its infrastructure for the rise of big data applications

Microsoft 190

More Trending

article thumbnail

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 205
article thumbnail

Creepy clowns cause sheriff to consult with FBI and Homeland Security

Network World

If you are going to be dressing up in a costume for Halloween, you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.

Security 131
article thumbnail

Business secretary calls for national broadband upgrade

Computer Weekly

In a speech to the Institute of Directors’ annual conference, Greg Clark calls for a major broadband upgrade to support the reinvention of the government’s industrial strategy

article thumbnail

Banks Lead Charge to Adopt AI for Business, IBM CEO Rometty Says

Data Center Knowledge

Banks hope AI will help them fend off the encroachment into finance by internet giants like Google and Apple. Read More.

Banking 140
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gigaclear to deliver fibre broadband through old water pipes

Computer Weekly

Rural fibre broadband supplier Gigaclear has teamed up with Affinity Water Distribution to study the feasibility of using disused water mains as an FTTP delivery mechanism

Study 178
article thumbnail

A Pokemon Go guide infected thousands of phones

Tech Republic Security

"There's no surprise that an app as popular as Pokemon Go has spawned associated malware," said Tim Erlin, senior director of IT security and risk strategy for Tripwire.

Malware 117
article thumbnail

Splunk vs the skills shortage – trying to help organisations gain the right skills

Computer Weekly

Splunk’s CEO Douglas Merritt explains how the organisation has been working to help people both in and outside its organisation to gain the skills needed to use its big data technology

Big Data 171
article thumbnail

Security: It might not be the outside world that's the largest threat to businesses

Tech Republic Security

A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

Security 114
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

NHS Digital aims to put healthcare on firm cyber security footing

Computer Weekly

NHS Digital set to work closely with National Cyber Security Centre (NCSC) to boost healthcare sector cyber security capabilities

article thumbnail

Understanding Android's balance between openness and security

Tech Republic Security

At the 2016 Structure Security conference, Google's Adrian Ludwig talked about the balance between keeping Android as open as possible, while also keeping it secure.

Security 113
article thumbnail

UK National Cyber Security Centre set to launch

Computer Weekly

NCSC is due to launch officially on 1 October 2016 and will help the healthcare sector deliver consistent quality of data security

Security 187
article thumbnail

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

Network World

I am currently embarking on a quest to make my entire life as private and secure as possible—while still having a good time and enjoying the fruits of the modern world. In this article, I won’t go into why I am doing this. For that, see my article introducing this endeavor. What I’d like to talk about right now are some pretty high-level things—laying out the ground rules, if you will, for what I’m trying to accomplish.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5G worth more than €113bn per year to European economy

Computer Weekly

An EC-supported study conducted by InterDigital suggests investment in 5G could generate an annual benefit of €113bn by 2025

Study 183
article thumbnail

Why operational technology must be addressed to secure industrial IoT

Tech Republic Security

At the 2016 Structure Security conference, GE's Tom Le explained how a combination of IT and OT are core to securing industrial IoT.

Industry 113
article thumbnail

Mastercard woos software developers with API platform

Computer Weekly

Credit card company Mastercard is investing heavily in digital payments and wants to engage with developers and startups

article thumbnail

Meet Apache Spot, a new open source project for cybersecurity

Network World

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity. Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to use the Dropbox Paper cloud-based collaboration tool

Tech Republic Cloud

Is Dropbox Paper the cloud collaboration tool of your dreams? Maybe not in its beta version, but Jack Wallen says it's still impressive and worth a try.

Tools 126
article thumbnail

Most dangerous cyber celebrities of 2016

Network World

Dangerous celebrities Intel has reeled off the 10 th annual McAfee Most Dangerous Celebrities list based on likelihood of getting hit with a virus or malware when searching on the celebs’ names. “Consumers today remain fascinated with celebrity culture and go online to find the latest pop culture news,” said Gary Davis, chief consumer security evangelist at Intel Security.

Intel 95
article thumbnail

Military Tips On Business Resiliency

Cloud Musings

Photo credit: Shutterstock A steel bar is resistant to stress and is capable of maintaining its form while bearing large loads. While steel is also known as one of the world’s strongest metal’s (Titanium, Tungsten and Iconel round out the top four ) , it is also susceptible to shearing and completely breaking. A rubber brick, on the other hand, will bend easily under even small loads, but it's extremely difficult to snap or break.

article thumbnail

The Yahoo hackers weren't state-sponsored, a security firm says

Network World

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday. Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Big Data

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

article thumbnail

Elon Musk’s next great adventure: Colonizing Mars

Network World

You cannot say that Elon Musk doesn’t dream big. Today he outlined what would be his biggest aspiration ever – colonizing Mars. If you watched Musk, who is SpaceX Founder, CEO, and Lead Designer deliver the details today on his Mars colonizing mission to the International Astronautical Congress in Guadalajara, Mexico you may have been struck by the matter-of-fact way he delivered the details of what even he calls a very complex and dangerous mission.

90
article thumbnail

Big data users rejoice: IBM's new Project DataWorks platform plans to kill the silo

Tech Republic Big Data

Data comes in all shapes, sizes, and file formats. One of the biggest challenges for businesses is integrating the myriad types of data: IBM wants to solve that problem.

IBM 83
article thumbnail

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Network World

Marten Mickos, a veteran executive with companies from MySQL to Sun, Nokia and HP, was not particularly excited about his meeting to explore a leadership role with HackerOne, a fledgling security company. Security is hard, it’s unpleasant, it doesn’t work very well. But he perked up fast after learning about HackerOne’s crowdsourced model of finding and fixing security flaws – a model in which HackerOne plays a key matchmaking role between companies and ethical hackers in a rapidly growing marke

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.