Thu.Dec 01, 2016

article thumbnail

Amazon VP: The Network Gear Economy Is Becoming Commoditized

Data Center Knowledge

People attending Amazon Web Services’ re:Invent conference in Las Vegas finish their dinners early so they can return to the main stage, just to hear the company’s celebrated VP and distinguished engineer, James Hamilton, spew ideas in what would be a stream-of-consciousness monologue were it not.

article thumbnail

Another Agency Gets Gobbled Up: Accenture Announces The Acquisition Of Karmarama

Forrester IT

Over the past few years, we've seen a flurry of consultancies acquiring agencies. Acquity, BGT Partners, Lunar, and Cynergy are just some of the agencies that have been scooped up. The agencies and consultancy convergence has radically altered the conversation for marketers looking to purchase marketing services. They now have a new category of provider to consider and new capabilities to assess across the board.

IBM 209
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Storage briefing: NVMe vs SATA and SAS

Computer Weekly

NVMe brings blistering performance gains over existing HDD-era disk protocols, and is a straight swap-in for PCIe server-side flash with array and hyper-converged products on the way

Storage 199
article thumbnail

Amazon Promotes New Tool to Protect Cloud Customers From Attacks

Data Center Knowledge

Amazon.com Inc. unveiled a new security tool for cloud customers, part of a slew of product announcements this week designed to fend off competition from Microsoft Corp., Alphabet Inc.’s Google and other Read More.

Tools 167
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US and UK government expand surveillance powers

Computer Weekly

The US has introduced wide new hacking powers for federal agents a day after the UK's Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services

article thumbnail

Google, Facebook Targeted by Indonesia in Push for More Tax 

Data Center Knowledge

Indonesia is widening its tax net to target global technology giants like Google and Facebook Inc., a strategy that’s raising red flags for fear it may deter foreign investment. Read More.

Google 167

More Trending

article thumbnail

Amazon Unveils Image Recognition, Voice-Activated Cloud Services

Data Center Knowledge

Amazon.com Inc. introduced an image recognition service, a speech-to-text service dubbed Polly and “Lex,” which will let customers build conversational apps similar to its Alexa voice-activated platform. Read More.

Cloud 166
article thumbnail

Open data in the public sector – what’s next?

Computer Weekly

Public bodies have made important strides in open data – but there is still a long way to go to fully realise the benefits and opportunities

Data 194
article thumbnail

Driving IoT Transformation with Smart Network Considerations

Data Center Knowledge

Consistent connectivity now becomes critical to how effectively these devices will perform, and this connectivity relies on having the right network infrastructure in place. Read More.

Network 164
article thumbnail

Mirai botnet hits Post Office Broadband and Kcom customers

Computer Weekly

Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware

Hardware 192
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Transforming Development with AWS

All Things Distributed

In my keynote at AWS re:Invent today, I announced 13 new features and services (in addition to the 15 we announced yesterday). My favorite parts of James Bond movies is are where 007 gets to visit Q to pick up and learn about new tools of the trade: super-powered tools with special features which that he can use to complete his missions, and, in some cases, get out of some nasty scrapes.

article thumbnail

Security Think Tank: Cyber security is everyone’s responsibility

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

Security 199
article thumbnail

How Amazon wants to power the future of connected cars

Tech Republic Cloud

At the 2016 AWS re:Invent conference, Amazon's CJ Frost presented on how its Alexa product and other services will play into the next generation of automotive mobility.

article thumbnail

AWS CEO hails "changing of the guard" in enterprise IT on the back of cloud growth

Computer Weekly

AWS CEO Andy Jassy hits out at “old guard” enterprise IT suppliers, while talking up his company’s ability to out-sell and out-innovate them

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Amazon unveils massive expansion of developer and security toolkit at AWS re:Invent 2016

Tech Republic Cloud

During the 2016 AWS re:Invent conference in Las Vegas, AWS CTO Werner Vogels presented a keynote that included a host of new tools for developers and operations teams.

article thumbnail

AWS to hit halfway point on 100% green datacentre pledge by end of 2017

Computer Weekly

Amazon Web Services opens up about the progress it is making with ramping up the amount of renewable energy its datacentres consume

article thumbnail

What new cybersecurity trends will dominate 2017?

Tech Republic Security

In 2016 ransomware, phishing, and IoT attacks pummeled business and consumers alike. What cybersecurity trends will emerge in 2017? Take our survey to share your opinion about emerging hacker trends.

Trends 122
article thumbnail

AWS ramps up efforts to solve enterprise petabyte-scale cloud data migrations woes

Computer Weekly

Cloud giant fleshes out data-transfer appliance portfolio to help enterprises shift large amounts of data off-premise

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Eye scanners and fingerprints in cars will double by 2021, report says

Tech Republic Security

The market for biometric vehicle access systems is expected to reach $855 million by 2021. Here's what the rise of biometrics could mean for your car and your enterprise.

Report 113
article thumbnail

Nokia brand returns to smartphone market

Computer Weekly

Nokia licence holder HMD Global plans to use the famous brand name on Android devices from early 2017

177
177
article thumbnail

Best practices for lowering cyber insurance costs and cyber risk

Network World

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors. With cybersecurity threats on the rise, companies are increasingly taking advantage of cybersecurity insurance. And while cyber insurance can be worth it, it’ll cost you. Last year, U.S. insurers earned $1B in cyber premiums.

Insurance 111
article thumbnail

GE opens biggest digital hub in India

Computer Weekly

Bangalore centre added to US industrial giant’s global network of digital hubs

Network 182
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

Network World

Got innovation? The Defense Advanced Research Projects Agency this week announced a program it hopes will get the world’s deep-thinkers to collaborate and explore emerging science and technology for advanced applications. +More on Network World: 20 years ago: Hot sci/tech images from 1996 + The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to eng

article thumbnail

The IT workers of Star Wars

Tech Republic Data Center

Long ago in a galaxy far away, people still didn't know how to get their electronics to work.

How To 131
article thumbnail

IDG Contributor Network: How to architect the network so IoT devices are secure

Network World

Just as the internet changed everything, a new revolution known as the Internet of Things (IoT) promises to produce even greater disruption. Primarily because IoT sensors will be utilized everywhere—in hospitals to monitor medical devices, in factories to supervise operations, in buildings for controlling temperature and lighting, etc. Data from these sensors will be used for operations management, predictive maintenance and much more.

Network 95
article thumbnail

Why choosing a free platform can be a good way for your company to start analyzing data

Tech Republic Big Data

Free online tools for understanding data abound, each promising to help your business make sense of its data troves. But how to choose one? Here are the factors to consider.

Data 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Major cybercrime network Avalanche dismantled in global takedown

Network World

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years. The network, called Avalanche, operated as many as 500,000 infected computers on a daily basis and was responsible for delivering malware through phishing email attacks. Avalanche has been active since at least 2009 , but on Thursday, authorities in the U.S. and Europe announced they had arrested five suspects allegedly involved

Network 94
article thumbnail

AWS isn't the cheapskate's cloud, and Amazon doesn't care

Tech Republic Cloud

AWS isn't winning because it's cheapest. It's winning because of innovation.

Cloud 102
article thumbnail

AWS tries to protect its customers from DDoS attacks with new service

Network World

One of the big stories in security over the past year has been the rise of devastating distributed denial of service (DDoS) attacks that have hit sites and organizations like DNS provider Dyn , the BBC and the website of security journalist Brian Krebs. Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts.

article thumbnail

AWS re:Invent 2016 Keynote with Werner Vogels

Scott Lowe

This is a liveblog of the Thursday keynote at AWS re:Invent 2016. Today’s keynote is led by Werner Vogels, CTO of Amazon Web Services. Unlike yesterday, today I opted not to attend the keynote in the main hall, viewing the keynote instead from an “overflow” area. Turns out the “overflow” area has drinks, tables, and power! That’s a far better option that being crammed in the main hall, though in the past I’ve found it more difficult to liveblog when not viewing the keynote directly.

Data 65
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.