Thu.Sep 22, 2016

article thumbnail

Hortonworks: Using Machine and Sensor Data to Proactively Maintain Public Infrastructure

CTOvision

Marty Meehan. Metro Transit of St. Louis (MTL) operates the public transportation system for the St. Louis metropolitan region. Hortonworks Data Platform helps MTL meet their mission by storing and analyzing IoT data from the city’s Smart Buses, which helped the agency cut average cost per mile driven by its buses from $0.92 to $0.43. It achieved that cost reduction while simultaneously doubling the annual miles driven per bus.

article thumbnail

Investigatory Powers Bill – the case for mass surveillance

Computer Weekly

As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation

206
206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FastCompany: SAP NS2 Targets Terrorism with AI

CTOvision

Marty Meehan. FastCompany published a good overview of SAP NS2 and some of their use of artificial intelligence capabilities titled "SAP NS2 Targets Terrorism with AI". Here is some of what they said: A specialized division of the business software powerhouse SAP (System Application Products) is building tools to harness machine learning and artificial intelligence for antiterrorist intelligence missions and cybersecurity—though details of how exactly the software has been used are shrouded in

SAP 201
article thumbnail

Accenture apprentice scheme gets first female graduate

Computer Weekly

Accenture’s IT apprentice programme has its first female graduate, and the company hopes this is the start of more female graduates to come

Company 214
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US Data Center Construction Update

Data Center Knowledge

Lots of colo action in Texas, plus Facebook in New Mexico and SAP in Colorado Read More.

article thumbnail

Openreach responds to Fix Britain’s Internet broadband campaigners

Computer Weekly

Openreach CEO Clive Selley has criticised rival broadband providers campaigning for the separation of the infrastructure business from its parent, BT, saying they are ignoring important facts

Internet 185

More Trending

article thumbnail

Pizza Hut Hong Kong rips up traditional CRM rule book

Computer Weekly

IT director of parent company Jardine Restaurant Group has transformed the way Pizza Hut interacts with customers in Hong Kong and plans the same in Myanmar and Vietnam

Groups 183
article thumbnail

Apptio Bets Love for CIOs Will Attract Investor Enthusiasm for Shares

Data Center Knowledge

Apptio makes cloud software that helps corporate chief information officers track, plan and analyze information technology investments. Read More.

Software 143
article thumbnail

Dropbox gives UK enterprises option to host cloud data in Europe

Computer Weekly

Cloud storage firm makes good on an earlier pledge to give enterprises the opportunity to host data in Europe, as its efforts to court the business community continue

article thumbnail

Yahoo confirms 500M accounts leaked in massive data breach

Tech Republic Security

Yahoo recently confirmed that a suspected breach in 2014 affected hundreds of millions of users, and was believed to be carried out by a 'state-sponsored actor.

Data 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Which? calls for user compensation over Windows 10 upgrade issues

Computer Weekly

Consumer rights champion’s research shows 12% of Windows 10 users have downgraded to an older version of the software because of troublesome updates

Windows 182
article thumbnail

IBM ups enterprise appeal of Swift with new Bluemix runtime

Tech Republic Cloud

IBM recently announced a production-ready runtime for Swift on its IBM Cloud, adding support for developers using Swift for end-to-end app development.

IBM 122
article thumbnail

Cyber attack aimed at destruction, says TV5Monde

Computer Weekly

TV5Monde counting the cost of not being adequately prepared for a cyber attacked that downed the network in 2015

Network 194
article thumbnail

Yahoo Says at Least 500 Million Accounts Breached in Attack

Data Center Knowledge

Says the attacker was a “state-sponsored actor.” Read More.

Security 169
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hypergrid adds metered usage and networks to hyper-converged kit

Computer Weekly

Hyper-converged appliance maker will allow customers to pay for what they use in hardware that will now add networking

Network 181
article thumbnail

Report: The top 6 industries hit by ransomware

Tech Republic Security

Education, government, and healthcare top the list of at-risk sectors, according to a new report. Here's what you need to know to protect your company.

Report 118
article thumbnail

Homeland Security issues call to action on IoT security

Network World

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures.

Security 107
article thumbnail

New Cisco and Salesforce alliance boosts IoT and collaboration efforts

Tech Republic Cloud

Cisco and Salesforce recently announced a global alliance to jointly develop new tech tools for the enterprise.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

Network World

That’s one amazingly scary number: Since 2006 cyber incidents involving the Federal government have grown 1,300%. Another Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over. +More on Network World: Network security weaknesses plague federal agencies + “Federal information systems and networks are inherently at risk.

article thumbnail

How to set up passwordless authentication for MySQL

Tech Republic Security

If you manage multiple MySQL servers and want a simplified means of logging in, see how to use the new passwordless authentication feature.

article thumbnail

Keeping up with incident response

Network World

A fire department in a large city certainly has a difficult job, but its mission is fairly straightforward. When a fire is detected, the fire department dispatches an appropriately sized staff to assess, contain and put out the fire, clean up, investigate what happened, and prepare themselves for the next blaze. Yup, it's a pretty simple process when a manageable number of fires are burning.

article thumbnail

Installing a Specific Version of Docker Engine

Scott Lowe

In this post, I’m going to show you how to install a specific version of the Docker Engine package on Ubuntu. While working on a side project (one that will hopefully bear fruit soon), I found myself in need of installing a slightly older version of Docker Engine (1.11 instead of 1.12, to be specific). While this task isn’t hard, it also wasn’t clearly spelled out anywhere, and this post aims to help address that shortcoming.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Yahoo uncovered breach after probing a black market sale

Network World

A hacker's attempt to sell user data he claimed was stolen from Yahoo actually led the company to uncover a far more severe breach. Yahoo confirmed Thursday a data breach , which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter. The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to

Data 95
article thumbnail

Manage Business Cards

Galido

If you’re in business, attend tradeshows, do a lot of networking, etc., how do you manage all your business cards? CardEzi, a cell phone application, is one developed to convert traditional business cards into digital business card contacts through scanning with added features of having the choice between multiple templates and creating ones own custom business card design.

article thumbnail

Yahoo reportedly to confirm massive data breach

Network World

Following reports that Yahoo will confirm a data breach that affects hundreds of millions of accounts, some users reported Thursday on Twitter and elsewhere that they were prompted to change their email password when trying to log in. Yahoo launched an investigation into a possible breach in early August after someone offered to sell a data dump of over 200 million Yahoo accounts on an underground market, including usernames, easy-to-crack password hashes, dates of birth and backup email address

Report 95
article thumbnail

5 Reasons to Attend Data Natives 2016: Building A Strong Professional Network

Dataconomy

Go to datanatives.io and get instant access to speaker and ticket discount information on Data Natives Berlin 2016. The second edition of Data Natives is coming soon, and it will focus on the intersection of key trends in the Data Science realm, to make sure you’re in the loop and ahead of. The post 5 Reasons to Attend Data Natives 2016: Building A Strong Professional Network appeared first on Dataconomy.

Network 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hackers have a treasure trove of data with the Yahoo breach

Network World

The massive breach at Yahoo means that a treasure trove of stolen data is in the hands of hackers -- putting millions of internet users at risk. At least half a billion Yahoo accounts have been affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.

Data 95
article thumbnail

Oracle NEW_TIME Function with Examples

Database Star

In this article, I’ll explain what the NEW_TIME function does and show you some examples. Purpose of the Oracle NEW_TIME Function The NEW_TIME function converts a date from one timezone to another timezone. Syntax The syntax of the NEW_TIME function is: NEW_TIME ( input_date, timezone1, timezone2 ) Parameters The parameters of the NEW_TIME […].

Oracle 59
article thumbnail

The massive Yahoo hack ranks as the world's biggest -- so far

Network World

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen. Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the "Have I been pwned" website.

Data 95
article thumbnail

Q&A with Angel García, Managing Director of Startupbootcamp – Data Natives Tel Aviv 2016

Dataconomy

Meet Angel García, Data Natives Tel Aviv 2016 Judge and Speaker You can register for tickets to Data Natives Tel Aviv here. Angel García is the Managing Director of Startupbootcamp Internet of Things & Data Tech, the Barcelona based acceleration program. Angel has years of experience working with startups and will. The post Q&A with Angel García, Managing Director of Startupbootcamp – Data Natives Tel Aviv 2016 appeared first on Dataconomy.

Data 68
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.