Fri.Aug 26, 2016

article thumbnail

How To Solve The Digital Dilemma

Forrester IT

From the start of my research into the changes surrounding emerging digital technologies in 2013 (see " The Future Of Business Is Digital "), I've been struck by the differences between those companies that apply digital technology as a bolt-on (frequently adding an eCommerce site, social media, or customer mobile apps) and those that take a more holistic approach to transforming the way the company uses technology to deliver better customer outcomes and drive revenue.

How To 234
article thumbnail

Apple patches triple iOS security threat

Computer Weekly

Businesses and consumers are being urged to update their versions of Apple's iOS to fix three critical, zero-day vulnerabilities that enable attackers to spy on victims

Apple 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On-Premise Hadoop Just Got Easier With These 8 Hadoop-Optimized Systems

Forrester IT

Enterprises agree that speedy deployment of big data Hadoop platforms has been critical to their success, especially as use cases expand and proliferate. However, deploying Hadoop systems is often difficult, especially when supporting complex workloads and dealing with hundreds of terabytes or petabytes of data. Architects need a considerable amount of time and effort to install, tune, and optimize Hadoop.

System 223
article thumbnail

Samsung Pay used for 100 million transactions

Computer Weekly

Samsung reports that its mobile payments app, which will soon be available in the UK, has transacted 100 million payments in its first year of availability

Mobile 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Demand For Industry-Specific CRM Explodes

Forrester IT

Horizontal CRM solutions -- as mature as they are (and they have been around for 20+ years) -- don't always do a good job at supporting industry-specific business processes. Consider these examples: CRM users in manufacturing need capabilities to track projects, schedules, time sheets, labor efficiencies, and equipment inventory in addition to core CRM attributes.

Industry 183
article thumbnail

Ramnit Trojan targeting UK banks reactivated

Computer Weekly

IBM X-Force researchers advise banks to use adaptive malware detection and real-time endpoint malware intelligence to counter the latest evolution of Ramnit banking malware

Banking 127

More Trending

article thumbnail

Rackspace sold to private equity house Apollo Global for $4.3bn

Computer Weekly

After weeks of speculation about its acquisition status, Rackspace confirms definitive agreement with private equity buyer

134
134
article thumbnail

Why Rackspace is Going Private, According to Its CTO

Data Center Knowledge

John Engates: Company will now do thing it couldn’t do as a public company Read More.

CTO 144
article thumbnail

UK tech firms spend less, deliver more on training

Computer Weekly

Survey shows technology firms spend 46% of the national average on learning and development per employee, but deliver an above-average number of hours’ training

Training 117
article thumbnail

Rackspace Going Private in $4.3B Buyout

Data Center Knowledge

Investment management firm Apollo to buy company for $32 per share Read More.

Company 123
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EE pushes further into content delivery with Apple Music tie-up

Computer Weekly

Mobile network operator will offer six months of Apple Music free to new and upgrading customers as it expands into content provision

Apple 128
article thumbnail

Stolen iPhones could eventually capture photo and fingerprint of thieves

Tech Republic Security

Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.

Apple 87
article thumbnail

Law firms planning litigation market for GDPR

Computer Weekly

Businesses should be preparing for the storm of litigation that is likely to be unleashed when the GDPR goes into force, warns Stewart Room of PwC Legal

120
120
article thumbnail

IBM Opens Cloud Data Center in Korea

Data Center Knowledge

Targets Korean public cloud market, which analysts expect to reach $1B in 2019 Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Allstate boosted developer productivity by 350% with the cloud

Tech Republic Cloud

Reshaping a Fortune 500 company is hard, but giving developers access to cloud resources is making it possible at Allstate.

article thumbnail

What is big data analytics and it’s impact on your organization?  

Galido

About eighty percent of the data in your enterprise is in a multi-structured format, and that means it’s not in a relational format and is hard to analyze. Big data implies different analytics, different data structures, and diversity to the analytics that we need to deliver. Big data generates value from very large data sets that cannot be analyzed with traditional computing techniques.

article thumbnail

VMworld 2016: VMware pushes hybrid cloud and SDDC with new Cross-Cloud Architecture

Tech Republic Data Center

VMware recently demoed its new Cloud Foundation platform and Cross-Cloud services that it says will help make it easier for customers to build a unified, hybrid cloud.

Vmware 81
article thumbnail

Mozilla launches free website security scanning service

Network World

In order to help webmasters better protect their websites and users, Mozilla has built an online scanner that can check if web servers have the best security settings in place. Dubbed Observatory , the tool was initially built for in-house use by Mozilla security engineer April King, who was then encouraged to expand it and make it available to the whole world.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Free tool helps your IT team assess phishing risks

Tech Republic Security

Duo Insight lets IT teams run internal phishing simulations to identify potential security weaknesses and make the case for investing in stronger solutions and more user training.

Tools 64
article thumbnail

Medical device security ignites an ethics firestorm

Network World

One security research company is taking a controversial approach to disclosing vulnerabilities: It’s publicizing the flaws as a way to tank a company’s stock. The security firm, MedSec, made news on Thursday when it claimed that pacemakers and other health care products from St. Jude Medical contain vulnerabilities that expose them to hacks. However, MedSec is also cashing in on the disclosure by partnering with an investment firm that’s betting against St.

article thumbnail

Cloud Security Alliance releases top 100 big data best practices report

Tech Republic Big Data

The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.

article thumbnail

5 security practices hackers say make their lives harder

Network World

Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks. At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic , a specialist in privileged account management (PAM) solutions, surveyed more tha

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CIOs as “Chief Information Officer”: How to Unleash the Full Potential of Information

Future of CIO

Digital is the age of information abundance. Forward-thinking IT organizations are shifting from “T"-Technology-driven to “I” information oriented. The most powerful and differentiating tool in all of the today's businesses is INFORMATION and that is provided by IT systems. The aim of modern Information Management has often been described as getting the right information to the right person, in the right format and medium, at the right time, in order to make right decisions.

How To 40
article thumbnail

Distil Networks uses device fingerprints to detect malicious web bots

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. Who's that coming to your website? Is it friend or foe? Is it a customer wanting to buy your products, or someone or something wanting to steal your web content? Is it a community member that wants to post a relevant comment, or a spammer intent on planting junk links and content in your open comments section?

article thumbnail

IDG Contributor Network: Amazon's Hyundai move shows deep understanding of shoppers

ComputerWorld IT Management

The magic of retail these days is not that different from what it was 50 years ago. It always centers on knowing and understanding shoppers better than they know themselves. That means either positioning the higher-margin cereals at eye level or knowing what products will move best in different months. Amazon has been positively brilliant about this online, but we're now seeing proof that it can bring it in the physical world, too.

Network 40
article thumbnail

Got big data? Check out these 100 best practices for keeping it secure

Network World

Big data is best known for its volume, variety, and velocity -- collectively referred to as the " 3 Vs " -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices. As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Speaker Spotlight: Q&A With Dr. Stefan Kühn – Data Natives Berlin 2016

Dataconomy

Data Natives Speaker Dr. Stefan Kühn is Lead Data Scientist at codecentric. Together with his team he is developing robust, fast and intelligent algorithms and is applying modern machine learning methods for analyzing large datasets. Before codecentric he was a researcher in the Scientific Computing Group at the Max Planck. The post Speaker Spotlight: Q&A With Dr.

Data 39
article thumbnail

Privacy Shield data transfer agreement now shelters 200 companies

Network World

There are now 200 companies standing behind Privacy Shield, the framework agreement allowing businesses to process the personal information of European Union citizens on servers in the U.S. Companies must register with the International Trade Administration of the U.S. Department of Commerce to be covered. It's a self-certification process, so the ITA is only checking that the forms are filled in correctly, not that companies are necessarily complying with all 13,894 words of the rules.

Company 60
article thumbnail

Real-life examples test whether you are prepared for a cyberattack

Network World

Are you ready? While 83 percent of respondents say cyberattacks are among the top three threats facing organizations, only 38 percent say they are prepared to experience one, according to ISACA’s 2015 Global Cybersecurity Status Report. Incident response is still largely a human response. Multiply an outdated response plan by the many human errors that can innocently occur during response and you have a recipe for potentially cataclysmic results in the threat event aftermath.