Tue.Sep 27, 2016

article thumbnail

Consultancies are adapting to the digital world

Forrester IT

The age of the customer is characterized by customer empowerment, digital technology, and new business models. These factors are changing who buys consulting, what they're expecting, how consultants execute on these projects, and how clients pay for them. As a result, firms including Deloitte, McKinsey, Booz Allen Hamilton, Cognizant and others are changing delivery, hiring and contracting models to: Read more.

246
246
article thumbnail

Latest Microsoft Data Center Design Gets Close to Unity PUE

Data Center Knowledge

Innovation in data center design by cloud giants has widespread implications for their users as well as for the data center industry in general. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yahoo breach underlines need for Security Serious Week

Computer Weekly

The recently disclosed Yahoo data breach shows that no business is immune, underlining the need to raise awareness and improve practices, say the organisers of Security Serious Week

Security 195
article thumbnail

When Selecting a Data Center Provider, Keep an Eye on the Edge

Data Center Knowledge

As your data becomes more distributed, how do you select a data center partner who can keep up with data delivery demands? Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lax perimeter security exposes bank to hacker extortion attempt

Computer Weekly

Failure to follow standard network security best practice has exposed a Californian investment bank to cyber criminals’ demands

Banking 196
article thumbnail

Hospital Pays $400,000 HIPAA Breach Penalty for Obsolete ‘Business Associate’ Agreement

Data Center Knowledge

The federal investigation stemmed from the loss of unencrypted backup tapes containing patient data, which were maintained by the hospital’s parent company. Read More.

Backup 165

More Trending

article thumbnail

Apps vs. mobile websites: Which option offers users more privacy?

Tech Republic Security

Is it better to use a mobile app or the equivalent mobile website when it comes to privacy? Researchers have an answer, and offer a privacy resource that rates 50 free online services.

Mobile 122
article thumbnail

ESN: a long-term evolution or a game-changing revolution?

Computer Weekly

There is little doubt that the Home Office’s plan to update the Emergency Services Network is transformational, but how does it compare internationally?

Network 177
article thumbnail

Beware: iOS 10 security flaw makes cracking encrypted backups 2,500 times easier

Tech Republic Security

Russian security firm Elcomsoft discovered the flaw, which makes brute force password cracking far easier than in iOS 9. All iPhone and iPad users need to be aware of what's at stake.

Backup 117
article thumbnail

BoxWorks 2016: The fight for diversity should not always surround gender

Computer Weekly

Three CIOs and an executive from collaboration firm Box discuss the global search for diversity in tech, and how gender parity is not the only issue

172
172
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How machine learning and AI will 'save the entire security industry'

Tech Republic Security

Machine learning and big data have led to many advances, including some in cybersecurity. Cylance CEO Stuart McClure explained the biggest implications the technology has for security.

Security 111
article thumbnail

Microsoft accuses public cloud rivals of overlooking enterprise

Computer Weekly

Software giant talks up its enterprise credentials and heritage, while taking a swipe at its public cloud competitors

article thumbnail

What business leaders need to know about the state of cybersecurity

Tech Republic Security

At the 2016 Structure Security conference, Rally Ventures' Art Coviello gave an overview of the threat landscape and provided best practices for security professionals and developers.

article thumbnail

How to spin up OrangeHRM as a virtual machine in less than 5 minutes

Tech Republic Data Center

In need of an HRM solution that won't set you back hours of installation and setup time? The TurnKey Linux OrangeHRM virtual appliance might be the right tool for you.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Enterprise IoT deployment creates a target-rich environment for criminals

Tech Republic Security

Every company involved in IoT knows the systems are insecure--including Microsoft. It is working on platform solutions, but developers have to make a commitment to proactive security.

article thumbnail

Down the rabbit hole, part 1: Making my life private and secure

Network World

Over the years I’ve done a number of—let’s just call them “experiments in computering”—where I attempt to use my computers in such a way that is outside of my comfort zone. Living entirely in a terminal. Getting rid of all Google software and services. Using nothing but a version of FreeDOS. That sort of thing. I typically give myself the simple goal of “do it for 30 days, and see how it goes.

article thumbnail

Help wanted: How automation can help with the security skills gap

Tech Republic Security

Many tech jobs are going unfilled, and that number is growing in security. Jay Leek, the CISO of Blackstone, explained how CISOs can prepare for the lack of talent in the future.

article thumbnail

A Hungry Neighbor is an Angry Neighbor

All Things Distributed

I am very grateful that I have had the opportunity to meet with President Shimon Peres several times. Especially the first time, which was a 1:1 in his presidential residence, was an unforgettable experience. After I explained in 5 minutes the power of cloud for unlocking digital business building for everyone, he went on a lecture of half an hour how bringing economic prosperity to the region was crucial to achieving a long lasting peace.

Meeting 95
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Swift CEO reveals three more failed attacks on banking network

Network World

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers. Swift provides the network that banks use to exchange funds internationally, and hit the headlines in February when attackers almost got away with a billion-dollar heist at Bangladesh Bank.

Banking 89
article thumbnail

Why I’m Now Using VirtualBox with Vagrant

Scott Lowe

One of the things I often tell people is, “Use the right tool for the job.” As technologists, we shouldn’t get so locked onto any one technology or product that we can’t see when other technologies or products might solve a particular problem more effectively. It’s for this reason that I recently made VirtualBox —not VMware Fusion —my primary virtualization provider for Vagrant environments.

Vmware 65
article thumbnail

Six senators demand more details about the Yahoo data breach

Network World

Six U.S. senators have called Yahoo's massive data breach "unacceptable," and they're demanding that the company provide more details about the incident. In a letter addressed to Yahoo's CEO, the lawmakers said they were particularly "disturbed" that the breach occurred in 2014, but that Yahoo only publicized it last week. "That means millions of Americans' data may have been compromised for two years," the letter said.

Data 88
article thumbnail

“Machine intelligence is the next step in the evolution of machine learning” – Data Natives 2016

Dataconomy

Francisco is the Founder and CEO of cortical.io, a machine learning company that develops Natural Language Processing solutions for Big Text Data. Francisco’s medical background in genetics combined with over two decade’s of experience in Information Technology, inspired him to create a groundbreaking technology, called Semantic Folding, which is based.

Data 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tips for making an introvert-friendly workplace

ComputerWorld IT Management

Talk about the differences between introverts and extraverts has increased in recent years, dispelling the stereotype that introverts are shy and extraverts are outgoing. Instead, introversion and extraversion are determined by how you get your energy. Extraverts typically thrive in social environments and with a busy active schedule, while introverts need quieter environments and enjoy regular alone time.

Energy 43
article thumbnail

Grease the Wheel of IT to Accelerate Digital Transformation

Future of CIO

The role of IT today for many organizations is a business solutionary for information, automation, and innovation. In the industrial age, traditional IT was running as an isolated support function with friction and perceived as a cost center. At the dawn of the Digital Era, with increasing speed of changes, IT needs to be reinvented to achieve its own potential and help the business maximize its overall performance as well.

Tools 40
article thumbnail

5 reasons CEOs should be involved in hiring

ComputerWorld IT Management

Hiring is as much an art as a science. Bring the wrong talent on board, and it'll tank morale and impede performance; hire the right people, and growth will accelerate. However, finding just the right mix of skills, knowledge, experience and personality can feel like a herculean task, says Aytekin Tank, founder and CEO of online form builder JotForm , but for him, it's the most important part of his job.

Energy 40
article thumbnail

Security blogger Krebs says IoT DDoS attack was payback for a blog

Network World

Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business. +More on Network World: The IoT is uranium + The pair, whom he identifies as Itay Huri and Yarden Bidani, both 18, were arrested in Israel at the request of the FBI six days after Krebs posted his blog and are now under house arrest.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What Is The Real Value Of Expert’s Predictions?

The Accidental Successful CIO

CIOs need to evaluate the value of the predictions that they are getting Image Credit: kathyturner1. When you talk to the person with the CIO job and ask them what magic power they would like to have, right after the ability to fly you’ll more often than not hear that they’d like to be able to predict the future. The ability to peer into the future and know today what’s going to happen then would be a great skill to have – too bad none of us actually have it.

Groups 125
article thumbnail

Cisco Said to Spend Up to $4B to Lift Mexico Production

Data Center Knowledge

The expected announcement's timing could be delicate, coming after Cisco announced job cuts and after the US presidential debate, in which Trump decried the flow of jobs to Mexico and other countries. Read More.

167
167
article thumbnail

Clinton-Trump debate #1: What the data from social media tells us

Tech Republic Big Data

As the two candidates sparred over the issues in the first of three planned debates, social media provided insights into the public perception of the dialogue.

Media 81
article thumbnail

Ransomware roundup: Targeting servers and government, honoring Donald Trump and Voldemort

Network World

Security researchers have discovered more ransomware under development, namely one paying homage to Voldemort and another featuring Donald Trump, as well as one variant currently targeting servers and yet a different ransomware hitting government agencies and education institutions. Let’s start with the ransomware that has moved past development into actively locking up computers.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.