Wed.Jun 22, 2016

article thumbnail

IT must ditch ‘Ministry of No’ image to tackle shadow IT

CTOvision

Len Padilla. With enterprises increasingly dependent on shadow IT, enterprise IT departments must stop being seen as the ‘Ministry of No’ and start engaging with users to help them get the business-critical applications they need to do their jobs. The increase in employees going rogue and purchasing shadow IT without the permission, control or knowledge of the IT department is a growing trend, and one that business departments are increasingly relying on.

article thumbnail

Act now to save the open internet, says Internet Governance Commission

Computer Weekly

The future of the internet is at risk from multiple scenarios, and quick action is needed to protect it, says the Internet Governance Commission

Internet 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What To Do When Your Boss Is Younger Than You Are

The Accidental Successful CIO

When you work for a younger boss, you’ll have to make some adjustments Image Credit: Christopher Lance. What have you always pictured your boss looking like? If you are anything like me, you’ve always pictured them as a grumpy old man. Or a grumpy old woman if you want to get all modern. However, there is one thing that I’ve never really pictured my boss as being – younger than I am!

Microsoft 124
article thumbnail

Nutanix adds storage for containers, physical servers and all-flash

Computer Weekly

Hyper-converged infrastructure maker Nutanix adds container support with persistent storage, offers block iSCSI storage for physical servers and allows all-flash across the product range

Storage 136
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Next generation machine learning and AI support previewed in San Francisco

IT Toolbox

Sugar CRM has been turning heads in the CRM market with the preview of its latest intelligence service at its SugarCon conference in San Francisco last week. The firm is also working on an electronic help agent along the lines of Apple’s Siri, called Candace.

article thumbnail

Singapore to block internet access for its public servants from 2017

Computer Weekly

From May 2017, most of Singapore’s public servants will not be able to access the internet from their workstations

Internet 171

More Trending

article thumbnail

CESG issues challenge to information security professionals

Computer Weekly

CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely

article thumbnail

Why Keep the Enterprise Data Center?

Data Center Knowledge

Amazon is forecasting doom for on-prem data centers, but the reality is a lot more complicated Read More.

article thumbnail

New cyber security law in the offing for Singapore

Computer Weekly

Singapore government will table new Cyber Security Bill in 2017 to strengthen its online defences

Security 163
article thumbnail

Bitcoins and security

IT Toolbox

The bitcoin system works because its designers assumed from the start that people would try to hack it, and designed it to be hack-proof

Security 124
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

OPNFV Project scales up network functions virtualisation ecosystem

Computer Weekly

At the OPNFV summit in Berlin, the OPNFV Project announces new R&D capabilities and a student internship programme

Network 140
article thumbnail

Isn't technology supposed to make things safer?

IT Toolbox

Aaah poor Chekov, may he rest in peace. Of course I don't mean a guy called Chekov in real life but the man who most recently played Chekov in the StarTrek universe. The promising young actor, Anton Yelchin, who was crushed between a brick mailbox and a lumbering beast of a jeep.

Course 100
article thumbnail

Hundreds of UK IT and back office roles at RBS cut

Computer Weekly

The Royal Bank of Scotland is cutting 900 IT and back office jobs as part of a reorganisation that involves offshoring roles

Banking 136
article thumbnail

Can Dark Data Become a Part of Companies' BI Efforts?

IT Toolbox

The business intelligence field has been facing an abundance of dark data since the very beginnings. Some companies are doing their part to try and illuminate this issue, thus hopefully making dark data a useful asset in the future.

Company 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco’s Tetration Brings Data Center Automation to Legacy Apps

Data Center Knowledge

Not all enterprises are in containerized, software-defined data center Nirvana land – far from it Read More.

article thumbnail

Cambium Networks Takes MU-MIMO to a New Level With cnMEDUSA

IT Toolbox

First there was MIMO- Multiple Input Multiple Output- used to tame the evils of multipath signals while increasing throughput and capacity with a few active antennas and connected radio chains. MIMO was big, disruptive stuff when it hit with 802.11n and proprietary wireless bridging equipment. Like all thing wireless, even MIMO has evolved.

Wireless 100
article thumbnail

Clinton allegedly hacked again, and documents leaked from DNC attack

Tech Republic Security

The Clinton Foundation's network was allegedly hacked late Tuesday, while a variety of documents from last week's DNC hack were leaked simultaneously, pushing cybersecurity toward center stage.

Network 104
article thumbnail

Turnkey VoIP solution for hotel sector hits the market

IT Toolbox

PhoneSuite, which specializes in telecoms solutions for the US hospitality industry, has introduced a new VoIP PBX offering, Managed VOICE. In addition, this week it is launching a specialist VoIP division for the hotel industry, Phonesuite DIRECT.

VOIP 100
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to keep your presentation data up-to-date with Google Sheets in Slides, Docs, or Silk.co

Tech Republic Cloud

Insert a chart from a Google Sheet in Google Slides and Google Docs, or create an interactive data story with Silk.co, to make sure your presentation always stays current.

Google 110
article thumbnail

Getting the Most Out Of RFPS and RFQS

IT Toolbox

The Request For Proposal (RFP) and Request For Quote (RFQ) are two of the most fundamental documents in the ERP selection process. How well they are put together will determine in large part how successful your selection process will be and how smoothly it will go. Unfortunately, both RFPs and RFQs are often problematic.

100
100
article thumbnail

Hard Drive Space Analyzer for Windows, Linux, and Mac OS

Galido

It’s amazing how fast hard drive space can fill up. But what do you do when it does, and how do you know what’s hogging up all your hard drive space? Sorting through files, drilling through folders, and blindly deleting files is not enough. Here are some various, mostly free hard drive space analyzers available for download. Always remember to be careful when installing freeware, as many are bundled with adware.

Linux 94
article thumbnail

‘Trojan horse’ stalks security conference

Network World

The creation pictured above, dubbed “Cyber Horse,” greets attendees of the ongoing Cyber Week 2016 conference being held at Tel Aviv University. This short video shows a time-lapse of the final assemblage with a narration devoted to a history lesson. And here’s another close-up video taken by a conference attendee: “Cyber Horse” was conceived and built by No, No, No, No, No, Yes, an agency based in New York City.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Determine website owner or affiliation

Galido

Need to do some investigating on a website to find out what other sites are connected or owned by that person/company? Do you think your website(s) is completely anonymous? The Give Away: Google Analytics. While Google Analytics is a great and useful tool for measuring traffic and other elements and factors, it is also a great tool to find website identities and affiliations.

Google 94
article thumbnail

10 steps the IRS needs to take now to secure tax returns, fight fraud, identity theft

Network World

The digital, online world has left the Internal Revenue Service struggling to move forward. The key IRS advisory group, The Electronic Tax Administration Advisory Committee issued its annual state of the agency report this week that concluded: The erosion of the IRS tax system’s integrity from the proliferation of tax identity theft and inadequate levels of taxpayer service at the IRS caused by an antiquated customer service model that does not adequately apply digital service tools.

Groups 76
article thumbnail

Election Tech: What happens when presidential candidates are hacked

Tech Republic Security

The DNC and Clinton Foundation were targeted recently by hacker groups. Cybersecurity experts explain why organizations are targeted, the value of data, and how to protect yourself and your business.

Groups 66
article thumbnail

Apple surprise: iOS 10 preview's kernel unencrypted

Network World

While new iOS 10 features like improved Maps, Siri integration and Photos were expected during Apple's Worldwide Developers Conference last week, the company stunned developers by leaving the kernel unencrypted in the preview edition of its new iPhone and iPad software. MIT Technology Review first reported on this revelation, discovered by security researchers and iOS developers, who were left wondering whether Apple did this on purpose or goofed up big time.

Apple 71
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to connect the Nextcloud Android app to your Nextcloud server

Tech Republic Cloud

To continue using ownCloud, you might need to migrate to the new server/client platform Nextcloud. Here's how to connect to a Nextcloud server from your Android device.

How To 61
article thumbnail

Startup Preempt detects, blocks bad users, devices

Network World

Preempt is a startup whose virtual appliance acts as a behavioral firewall that ranks the risk a user or device represents and responds automatically based on policies set by corporate security pros. The platform can spot and block certain attacks without intervention by the security team, which frees up time for them, says Ajit Sancheti, co-founder and CEO of the company.

article thumbnail

Google wants to commercialize database Spanner, but MongoDB or Cassandra could be safer bets

Tech Republic Data Center

Google is reportedly considering turning an internal database into an external product, but MongoDB or Cassandra might attract more developers.

Google 67
article thumbnail

Say hello to BadUSB 2.0: USB man-in-the-middle attack proof-of-concept

Network World

Oh peachy, say hello to BadUSB 2.0, a tool “capable of compromising USB fixed-line communications through an active man-in-the-middle attack. It is able to achieve the same results as hardware keyloggers, keyboard emulation, and BadUSB hardware implants. Furthermore, BadUSB2 introduces new techniques to defeat keyboard-based one-time-password systems, automatically replay user credentials, as well as acquiring an interactive command shell over USB.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.