Thu.Oct 20, 2016

article thumbnail

How Much “Data Science” Do You Really Need?

CTOvision

Dennis D. McDonald. Is it really true that "Nearly two-thirds of big data projects will fail to get beyond the pilot and experimentation phase in the next two years, and will end up being abandoned," as suggested by Steve Ranger last year in Your big data projects will probably fail, and here's why? . My take: to be successful you need a collaborative team with multiple skills, effective leadership, good communication -- and a plan.

Data 233
article thumbnail

Oracle’s Cloud, Built by Former AWS, Microsoft Engineers, Comes Online

Data Center Knowledge

Hosted initially in three Phoenix-metro data centers, the bare-metal cloud will serve as foundation for future cloud VM and container services. Read More.

Cloud 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How enterprise software development is changing

Computer Weekly

During Computer Weekly’s 50th anniversary event, we held a panel discussion at Skills Matter in London to look into how enterprise software is changing

article thumbnail

The Four Cs for IT and Security Ecosystem Success

Data Center Knowledge

Not every industry is meant to have an ecosystem. Compliance regulations or other restrictions could stand in the way, or some core technologies within the space may lag behind the development curve. Read More.

Security 174
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Armed forces minister wants military recruiters to "think different" to attract cyber security pros

Computer Weekly

Armed Forces minister Mike Penning says military must rethink how it recruits trainees to attract people with the cyber security skills the country needs to protect itself

Security 193
article thumbnail

Iron Mountain Entering N. Virginia with Massive Data Center Build

Data Center Knowledge

Starts construction of first of four buildings on future Manassas data center campus Read More.

More Trending

article thumbnail

Company Behind Snapchat Poaches Amazon Data Center Head

Data Center Knowledge

Jerry Hunter named VP of engineering at Snap, a key Google cloud customer Read More.

article thumbnail

Google to open one new datacentre region a month in 2017 to boost multi-cloud appeal

Computer Weekly

Google uses cloud user conference to outline how its commitment to innovation, low prices and new datacentre regions is helping it stake a claim in its competitors’ customer bases

Google 181
article thumbnail

At Dell EMC World, Michael Dell Lays Out Three Steps to Modernize IT

Data Center Knowledge

One year since Dell announced plans to acquire EMC, Dell founder appears pleased. Read More.

Dell 166
article thumbnail

Getting the balance right now the big data genie is out the bottle

Computer Weekly

Big data is a fact of life, but getting the balance right when it comes to privacy is crucial to avoid litigation and fines

Big Data 200
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IBM’s Rometty Almost Turned Down Promotion in Career Life Lesson

Data Center Knowledge

Tech giant's CEO addresses conference celebrating women in computing. Read More.

article thumbnail

Virgin Media CEO urges Theresa May to bring clarity to Brexit turmoil

Computer Weekly

As the prime minister prepares to meet EU leaders to begin difficult Brexit negotiations, Virgin Media's Tom Mockridge calls for an end to uncertainty

Media 179
article thumbnail

3D printing hack: Researchers crash drone with sabotaged propeller

Tech Republic Security

Researchers from three universities recently completed an attack on a 3D additive manufacturing system, highlighting the impact of potential security vulnerabilities in such systems.

3D 105
article thumbnail

CW500 video: Steven Armstrong discusses software-defined everything

Computer Weekly

Steven Armstrong, principal automation engineer at Paddy Power Betfair speaks to Computer Weekly about a roadmap to software-defined everything

Software 174
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

US police storing facial image data of 117 million Americans, report says

Tech Republic Security

26 states now let law enforcement use face recognition tech to search driver's license and ID photos, creating a "virtual line-up" of residents.

Licensing 113
article thumbnail

CW500 video: Rob White discusses software-defined everything

Computer Weekly

Rob White, executive director, global database group at Morgan Stanley speaks to Computer Weekly about a roadmap to software-defined everything

Software 173
article thumbnail

Google cuts cloud storage pricing, but will it be enough for the enterprise?

Tech Republic Cloud

Google recently announced the new Coldline cloud storage offering and lowered pricing for all of its storage tiers. However, challenges remain that hold Google back from being a cloud storage powerhouse.

Storage 100
article thumbnail

Dutch bank ING returns to the UK with a mobile app

Computer Weekly

ING is offering a mobile app that allows consumers to manage accounts with different banks in one place

Banking 198
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Pokemon Go: How the cloud saved the smash hit game from collapse

Tech Republic Cloud

Pokemon Go's creators reveal how they worked with Google to keep the service afloat in the face of explosive demand.

Cloud 117
article thumbnail

CW500 video: Anthony Guethert discusses software-defined everything

Computer Weekly

Anthony Guethert, senior principal, Quintiles IMS, speaks to Computer Weekly about a roadmap to software-defined everything

Software 180
article thumbnail

GuardiCore helps security teams see into apps and networks before they segment

Network World

The digital business era has brought with it a number of new tools and technologies, such as software-defined networking (SDN), Internet of Things (IoT), mobility and the cloud. These innovations enable businesses to increase their level of dynamism and be more distributed, but they also increase the complexity of securing the business. Old-school security methods and tools do not work in an environment where the perimeter is eroding and resources are becoming more virtual and cloud-centric. + A

Network 95
article thumbnail

Diageo opts for additional services centre in Bangalore

Computer Weekly

Drinks maker Diageo is increasing its footprint in India with a new business services centre in the city of Bangalore.

182
182
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Indian banks replace millions of debit cards after possible breach

Network World

Indian banks have asked customers to change the PINs, and in some cases blocked access, to 3.2 million debit cards after concerns about a security breach. The issue surfaced in September when some banks complained that their customers' cards were used fraudulently mainly in China and the U.S. while the account holders were in India, the National Payments Corporation of India said late Thursday.

Banking 95
article thumbnail

Best of VMworld Europe User Awards 2016: The winners

Computer Weekly

Find out who won what, including the best of show prize, at the 2016 VMworld Europe User Awards in Barcelona

187
187
article thumbnail

Ex-NSA contractor hoarded two decades' worth of secrets

Network World

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials. In a Thursday court filing , federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said.

Tools 95
article thumbnail

Watson Crowdsources Cloud Computing

Cloud Musings

Recently I've been doing quite a bit of analysis work using the IBM Watson cognitive business platform. The really exciting thing about this opportunity is the way data can seem to have a conversation with you. This got me wondering if social media data could carry on a conversation as well. Given my almost unhealthy interest in cloud computing, we ran a one week experiment to "crowdsource the internet" in order to see if it held any interesting cloud computing insights.

Cloud 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to manage user security in Samba

Tech Republic Security

When securing your Samba shares, start by locking down user and group security. Follow this tutorial to learn how.

Security 140
article thumbnail

Free tool protects PCs from master boot record attacks

Network World

Cisco Systems' Talos team has developed an open-source tool that can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks. The tool, called MBRFilter , functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub.

Tools 93
article thumbnail

5 Things Your Ideal Web Content Writer Should Be Doing

Galido

A great content writer can make a website. They will engage customers, help a site rank and can be a huge benefit to a business. Here are some tips on what your ideal content writer should do. They Should Write Every Day. One lesson that has been drilled into our heads hundreds, or thousands of time, is that practice makes perfect. A content writer may spend more than a few hours each day, creating educational, entertaining, and informative content for their various clients.

Social 84
article thumbnail

Intel asserts its trademark rights against John McAfee

Network World

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the maverick entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand. The issue came up when John McAfee teamed with MGT Capital Investments, which had been until recently mainly into gaming sites, and announced in May that it is in the process of acquiring a diverse portfolio of cybersecuri

Intel 93
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.