Mon.Sep 26, 2016

article thumbnail

How To Unlock Tech Industry Digital Transformation

Forrester IT

It's no surprise that tech companies are vested in the digital transformation of their customers. But many tech companies find it difficult to leave their product-centric models behind and focus on customer outcomes. That's just one of the findings from the research published on digital transformation in the tech sector. True customer obsession demands an outside-in perspective.

Industry 315
article thumbnail

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Sunil Thomas. Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. This post is the continuation of a series discussing why a CTO makes or breaks your enterprise mobile strategy and in case you’ve missed it we have already discussed how to choose between building native apps vs. adopting the mobile web.

Mobile 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Update Your Balanced Scorecard With Business Outcome And Agility Metrics

Forrester IT

We've entered the age of the customer, where powerful customers are disrupting every industry. In response, companies will have to change how they develop, market, sell, and deliver products and services directly to their customers and through their partners. CIOs and their teams are crucial to these strategic responses and will have to track transformation and performance with new metrics to go beyond their traditional IT approach to include the business technology (BT) strategy -- technology,

Agile 233
article thumbnail

AWS ElasticSearch Setup

CTOvision

Adam Gerhart. This is the first of a two-part post on getting Amazon's version of ElasticSearch set up in AWS. We go over the basics of setting up an AWS ES cluster and then tackle supplying the cluster with data via Logstash. Amazon has taken all the fun (read: difficulty) out of creating an ElasticSearch cluster. Instead of installs, configurations, and server management, we have been relegated to filling out forms and clicking buttons!

Storage 217
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Yahoo security still poor despite massive breach, claims Venafi

Computer Weekly

Yahoo is likely to have been a victim of its own encryption and security is still poor despite the huge breach that hit the company in 2014, according to security firm Venafi

Security 197
article thumbnail

Microsoft to Plug Renault-Nissan Cars Into The Cloud

Data Center Knowledge

Microsoft will build cloud infrastructure for the two carmakers that can host navigation data and allows drivers to predict gas usage and check on their cars remotely. Read More.

Microsoft 176

More Trending

article thumbnail

Microsoft Ignite: Microsoft Chasing What’s Next After Mobile First, Cloud First

Data Center Knowledge

One of the things that struck me watching today's Ignite keynote announcement was what wasn't said, at least not immediately. Read More.

Microsoft 165
article thumbnail

Growth in UK smartphone market levels off

Computer Weekly

Deloitte’s annual study of UK consumer mobile habits reveals that more than 80% of Brits own or have access to a smartphone, and growth is levelling off

Study 191
article thumbnail

Data Center Stocks are Hot Internationally

Data Center Knowledge

Bevan Slattery’s Nextdc is the most expensive stock in Australia’s S&P/ASX 200 index Read More.

article thumbnail

Apple to fix backup security vulnerability in iOS 10

Computer Weekly

Apple is to issue a security update for a security vulnerability in iOS 10 that could give hackers access to passwords and other security data

Apple 195
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Interxion CFO Sees Silver Lining in Brexit

Data Center Knowledge

The company may benefit from accelerated move to the cloud as a result of the UK vote to leave the EU. Read More.

Cloud 176
article thumbnail

Salary survey shows IT managers command big bonuses

Computer Weekly

A Computer Weekly survey has shown the scale of remuneration package that IT managers can expect - with bonuses an increasingly important part

Survey 189
article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

Intel 129
article thumbnail

Emirates Islamic bank and the Muslim finance revolution

Computer Weekly

The CIO at Dubai-based bank Emirates Islamic tells Computer Weekly about how IT is supporting the company through industry change

Banking 194
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enterprise Cloud Security Startup Skyhigh Raises $40M

Data Center Knowledge

Share price indicates a down round, but CEO begs to differ Read More.

article thumbnail

Bangkok Airways takes customer service to the cloud

Computer Weekly

Airline is the latest Southeast Asian organisation to harness cloud-based software to improve customer services, deploying the Oracle Service Cloud

Cloud 173
article thumbnail

The IoT is uranium

Network World

Does the thought of 600 Gbps-plus of traffic hitting your URLs excite you? Do you get tingles up and down your spine thinking about watching your line of business apps frying? Perhaps that wonderful text, where an alert from you financial processor says “We’ve gone black, again, and expect to be back online perhaps maybe possibly tonight” thrills you.

article thumbnail

On-premise IT still the only way to run certain tasks

Computer Weekly

How to augment a public cloud strategy with on-premise IT by running workloads in a private cloud and bursting to the public cloud

Cloud 179
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

New products of the week 9.26.16

Network World

New products of the week Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Adaptiva OneSite 6.0 Key features – OneSite 6.0 is the IT industry’s first serverless option for distributing software from the cloud at on-premise speeds, using Microsoft System Center Configuration (ConfigMgr).

article thumbnail

Unprecedented hardware problem brings down Australian Stock Exchange

Computer Weekly

Financial regulator launches probe after hardware failure in main database led to problems for stock exchange market system

Hardware 183
article thumbnail

A shout out to Akamai for candor in IoT botnet attack

Network World

Akamai deserves credit for the way it disclosed why it stopped protecting the Krebs on Security Web site last week after defending it for three days from the largest botnet it had ever encountered. It must have been embarrassing for the company to acknowledge that it was a business decision it was forced to make because of the expense and consumption of resources to keep the site up was too great.

article thumbnail

Adrian Davis discusses the evolution of security in the age of IoT

Computer Weekly

Cloud computing and the internet of things will have a major impact on how security is implemented going forward.

Security 174
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

Network World

Yahoo has blamed its massive data breach on a "state-sponsored actor." But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence. The lingering questions are causing some security experts to wonder why Yahoo isn't offering more details on a hack that stole account information from 500 million users. "I think there's a lot of fishiness going on here," said Michael Lipinski, the chief security strategist at Securonix.

Meeting 94
article thumbnail

Computer Weekly @ 50: The next big things in tech – a developers’ perspective

Computer Weekly

Leading technology experts discuss the trends in enterprise software and how this will impact future applications

article thumbnail

Meet MailSniper, a tool to search Microsoft Exchange emails for sensitive info

Network World

Meet MailSniper, a new pen tester tool that may be of interest to you if you need to find sensitive data such as passwords, credit card numbers and healthcare data, or need to access databases, or even to discover insider and network architecture information. MailSniper is a penetration testing tool, written in PowerShell, to allow for mass searching through email across every mailbox of an organization’s Microsoft Exchange environment.

Meeting 93
article thumbnail

Computer Weekly @ 50: Working with startups - a CIO perspective

Computer Weekly

In this video, we speak to a panel of CIOs about best practices in working with IT startups

Video 160
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Mac Trojan uses the Russian space program as a front

Network World

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry. The Trojan, called Komplex, can download, execute, and delete files from an infected Mac, according to security firm Palo Alto Networks. Interestingly, the Trojan will also save a PDF document to the infected system concerning the Russian space program.

article thumbnail

5 Awesome Tips For Getting More Instagram Followers

Galido

Getting a greater number of Instagram followers places a brand in front of many more people and in turn is a great investment. So, how do you get more eyes on you or your brand – well here are some great tips from the guys at Instamacro to help. Invite Friends. Let people know that you have joined Instagram by getting the word out. When first signing up, Instagram gives you the option of following and sharing your new account with contacts on your phone contacts along with your Facebook friends.

Social 73
article thumbnail

Illusive Networks seeks to slow Swift attackers through deception

Network World

Today's savvy bank robbers don't break into vaults looking for gold or diamonds: They're more likely to be hacking networks looking for access to the Swift payment system. Illusive Networks wants to catch them in the act. In February, hackers exploited Bangladesh Bank's access to the Swift fund transfer network to steal US$81 million -- and almost got away with $951 million.

Network 91
article thumbnail

Why we love power users (low-wattage division)

ComputerWorld IT Management

Pilot fish is working at the help desk of a managed service provider when a call comes in from one very angry user. "She was complaining about people changing files on her computer and how she had lost weeks of work and everything was our fault and it was better when she was a local admin and did her own IT, and threw in a few threats about the contract and my employment," says fish.

Backup 63
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.