Thu.Aug 18, 2016

article thumbnail

Strata + Hadoop World 26 – 29 Sep in NYC: 20% Discount with CTOvision’s code and one free bronze pass

CTOvision

Bob Gourley. As a reminder, the largest data science/data analytics/data infrastructure gathering in the world is the yearly Strata + Hadoop World in NYC. This year's is 26-29 Sep. Thanks to the team at O'Reilly, CTOvision readers can sign up to attend with a 20% discount. To do that simply follow this link and use the registration code: PCCTOV. [link].

Data 156
article thumbnail

Australian 2016 census sabotage puts a question mark on private cloud

Computer Weekly

Industry experts question why the Australian Bureau of Statistics’ website for the 2016 census, which recently underwent a DDoS attack, was not run on public cloud

Cloud 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Biocoding and Biomanufacturing: These are the early days, but that is the time to start learning

CTOvision

Bob Gourley. While it is still early days, biocoding and biomanufacturing looks to be one of the most powerful and compelling tools we've ever had to address global needs and challenges, one that will touch virtually every facet of human activity and enterprise. The Autodesk Bio/Nano Programmable Matter group is developing design tools for this space and integrating them with other domains and scales of computer-aided design and manufacturing.

article thumbnail

Isaca holds first online infosec career fair

Computer Weekly

Information professionals’ organisation Isaca is to hold an online career fair to give cyber security job seekers direct access to employer organisations

Security 136
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Spirit of Competition: Nutanix Certifies Cisco USC Hardware

Data Center Knowledge

No deal or joint product, but channel partners can now offer certified Nutanix-on-UCS solutions Read More.

Hardware 156
article thumbnail

BT and Nokia to work together on 5G research

Computer Weekly

BT and Nokia plan to work together on customer use cases, proof of concept trials, technology standards and equipment to support 5G

Research 136

More Trending

article thumbnail

Three years left to prep UK’s mobile network infrastructure for 5G

Computer Weekly

The UK’s mobile networking infrastructure needs a radical overhaul to get ready for the first 5G mobile networks, says O2 CTO Brendan O’Reilly

Mobile 121
article thumbnail

Why Nvidia Gifted Elon Musk’s AI Non-Profit Its Latest Supercomputer

Data Center Knowledge

The battle for share of the promising future AI hardware market is on Read More.

Hardware 115
article thumbnail

Cisco confirms 5,500 lay-offs amid restructuring

Computer Weekly

Networking giant has confirmed it will cut more than 5,500 jobs in an effort to trim the fat in low-growth business areas and enhance its performance elsewhere

Network 113
article thumbnail

How to enable server-side encryption in Nextcloud

Tech Republic Security

Out of the box, Nextcloud servers do not run with server-side encryption. Follow these steps to enable an extra layer of security for Nextcloud.

How To 94
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mobile phone sales drop as smartphone buyers bide their time

Computer Weekly

Slowing smartphone shipments contributed to an overall decline in mobile phone sales during the second three months of 2016, according to Gartner

Mobile 117
article thumbnail

IDG Contributor Network: Americans want passwords, not biometrics, survey finds

Network World

Most people aren’t interested in fingerprint authentication and other biometric logins, a study has found. Free email portal mail.com and Yougov surveyed over a thousand folks around the world in July and discovered over half (58 percent) prefer traditional passwords. A significant proportion of the respondents also said biometry was too hazardous, with “only 9 percent finding the use of biometric methods risk-free,” the mail provider said in its press release.

Survey 74
article thumbnail

Number of students taking computing A-level rises but ICT popularity falls

Computer Weekly

Government describes rise in computing student numbers as encouraging, but boys still dominate tech subjects

article thumbnail

Eddie Bauer is latest retailer to be hit by point-of-sale malware

Network World

Clothing retailer Eddie Bauer has informed customers that point-of-sale systems at its stores were hit by malware, enabling the theft of payment card information. All the retailer’s stores in the U.S. and Canada, numbering about 350, were affected, a company spokesman disclosed Thursday. He added that the retailer is not disclosing the number of customers affected.

Retail 64
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Intel Developer Forum: Silicon Photonics boosts datacentre connectivity

Computer Weekly

Microsoft Azure datacentres increase connectivity to 100Gbps thanks to Silicon Photonics interconnect

Intel 114
article thumbnail

New Salesforce cloud tool lets doctors and patients video chat via smartphone

Tech Republic Cloud

A new telehealth solution for the Salesforce Health Cloud allows mobile users to connect face-to-face with a care team.

Cloud 77
article thumbnail

NSA zero days and encryption backdoors need clear disclosure policies

Network World

The government has another public balancing act on its hands with the disclosure this week of exploits against commercial security products that were purportedly cooked up by the NSA. These attack tools revealed by a group called Shadow Brokers date from sometime before June 2013 and some of them were still effective this week, which means the NSA never told the vendors about them.

article thumbnail

Oracle TO_CLOB Function with Examples

Database Star

In this article, I’ll take a look at the Oracle TO_CLOB function, and show you some examples. Purpose of the Oracle TO_CLOB Function The TO_CLOB function converts a value in an NCLOB column (the national character set) to a CLOB (in the database character set). Syntax The syntax of the TO_CLOB function is quite […].

Oracle 46
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How IT can limit the risk of popular messaging apps

Network World

In the fight against shadow IT, CIOs have faced for more significant challenges than modern consumer messaging apps. And the popularity of apps such as WhatsApp, Facebook Messenger, iMessage and Google Hangouts has, in many cases, led to a more open IT approach to consumer communication tools in enterprise. When IT leaders let employees use their personal devices for work, it's a safe assumption that multiple consumer messaging apps will also come into play.

Google 62
article thumbnail

CIOs’ Q&As for IT Digital Transformation

Future of CIO

Digital is the leap that will see IT working together with the business to build a stronger company, a business based on performance, growth, and agility. Nowadays information is overloading and technologies are permeating into every corner of the organization. IT plays a significant role in business growth and innovation. However, in reality, the majority of IT organizations still get stuck at the lower level of IT maturity with the reputation as a back-office support function and cost center o

Agile 45
article thumbnail

The NSA's hoard of cyber weapons makes some experts nervous

Network World

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed. Security researchers have been poring over a sample set of hacking tools that may have been stolen from the NSA. An anonymous group called the Shadow Brokers has posted the samples online and is auctioning off the rest, claiming they contain cyber weapons that rival the Stuxnet computer worm.

Groups 61
article thumbnail

For CIOs, how to share good news, bad news

ComputerWorld IT Management

The key to improving communications between IT groups and the rest of the business is building trust through transparency, according to IT executives at a CIO Executive Council (CEC) virtual meeting about effective IT communications.

How To 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A new algorithm can hide messages in your favorite dance music

Network World

It's long been known that secret messages can be included in music through techniques such as backmasking , but now a Polish researcher has developed an entirely new approach. By subtly varying the tempo of a particular type of dance music, he's managed to encode information in a way that's completely inaudible to human listeners. StegIbiza is an algorithm for hiding information in a type of dance music known as Ibiza, which originates on the island by the same name in the western Mediterranean

article thumbnail

Infographic and interview: The explosion of cybercrime and how to protect your business

Tech Republic Security

A new chart details how cybercrime ballooned in the past decade. Cybersecurity expert Ron Schlecht explains how even small breaches can cost enterprise and SMB companies millions.

SMB 81
article thumbnail

Sage data breach highlights the risk of the insider threat

Network World

A suspect in a recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee. The 32-year-old woman was held for alleged fraud against the company, London City Police said. She has since been released on bail. It’s still unclear what information, if any, may have been leaked.

Data 60
article thumbnail

50% off Vimtag VT-361 Pan&Tilt HD WiFi Video Security Camera with Night Vision - Deal Alert

Network World

This full-featured camera broadcasts over wifi, allowing you to view live from multiple mobile devices at once. Its footage records to micro SD where it is stored and accessible remotely as well. Remote pan/tilt/zoom, 2-way voice, motion-detection alert, and night vision capabilities are all onboard. This model averages 4 out of 5 stars on Amazon from over 4,100 people ( read reviews ).

Video 60
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why a security team embraces shadow IT

Network World

When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security.