September, 2016

article thumbnail

TechNet Augusta 2016: US Army Networks and Services

CTOvision

ChrisScott. This is the second in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The first was an overview you can find at: TechNet Augusta 2016 “ Cyber in the Combined Arms Fight ”. Networks and Services. The Army is emphasizing the “convergence of their lines of effort” to achieve a seamless integration of intelligence, reconnaissance and surveillance and fires across the full spectrum of conflict.

Network 158
article thumbnail

Lessons from the Dropbox breach

Computer Weekly

Dropbox is the latest major company to confirm a data breach, albeit four years old, but – as with all recent data breaches by cloud-based services – it highlights some key security lessons

Cloud 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

R.I.P. BlackBerry Phones

Forrester IT

An era has passed. BlackBerry will no longer make phones. RIM opened our eyes when it put the power of digital communications into our pockets. Email on the go was the beginning of the mobile mind shift. I loved the passion of Mike Lazaridis and his team for building great devices that we'd drive home and get if we left on the counter. His devices were the first to inspire such passion, such intimacy, such a feeling of empowerment that we now all take for granted.

Mobile 291
article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

Internet 167
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ten Most Connected Data Centers

Data Center Knowledge

Australian internet entrepreneur's new directory aims to rank the world's data centers Read More.

article thumbnail

How to install openDCIM on Ubuntu to simplify data center management

Tech Republic Data Center

Managing your data center infrastructure can be a nightmare unless you have the right tools. Here's how to install one such free tool called openDCIM.

More Trending

article thumbnail

More IoT botnets connected to DDoS attacks

Computer Weekly

Security researchers have found another botnet operation exploiting internet of things devices to carry out powerful distributed denial of service attacks, prompting calls for IoT device makers to improve security

Internet 168
article thumbnail

Bosch And SAP Agree A Strategic Internet Of Things (IoT) Partnership To Facilitate Data Orchestration

Forrester IT

I recently attended an event at which Bosch and SAP announced a major partnership to more closely align their respective cloud and software expertise around the industrial internet of things. This partnership underlines the fact that SAP and Bosch are prepared to significantly transform their respective business models to generate new value for their customers.

SAP 280
article thumbnail

How to install the Yandex.Disk cloud client on Ubuntu

Tech Republic Security

Yandex.Disk is a Dropbox alternative worth checking out. If you'd like to add support for the Yandex.Disk cloud syncing solution to your Ubuntu desktop, read this tutorial.

Cloud 143
article thumbnail

Google and Amazon Vie for Big Inroad Into Wall Street Data Trove

Data Center Knowledge

Trying to understand what causes flash crashes is no longer just for financial regulators and Wall Street Read More.

Google 184
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why data centers fail to bring new jobs to small towns

Tech Republic Data Center

Apple, Amazon, Google, and Microsoft continue building large data centers in rural areas, but most do not create jobs for local residents. Here's what you need to know.

article thumbnail

The 4 Oct Synergy Forum in DC Can Help You Change The World

CTOvision

Bob Gourley. Thank you everyone who is engaging with us at our 4 Oct Synergy Forum in DC. What an incredible turnout. We can't share the signup list of attendees for obvious privacy reasons, but here is a gist: The event will be a gathering of some of most incredible, action-oriented thought leaders in America today. CIOs, CTOs, CISOs, Data Scientists, SES's, CEOs, Flag and General Officers are signed up to attend.

article thumbnail

Crest report outlines ways to address cyber security gender gap

Computer Weekly

Report on the causes and potential remedies for addressing the gender gap in cyber security is aimed at stimulating debate and co-operation in the industry

Report 173
article thumbnail

Consultancies are adapting to the digital world

Forrester IT

The age of the customer is characterized by customer empowerment, digital technology, and new business models. These factors are changing who buys consulting, what they're expecting, how consultants execute on these projects, and how clients pay for them. As a result, firms including Deloitte, McKinsey, Booz Allen Hamilton, Cognizant and others are changing delivery, hiring and contracting models to: Read more.

246
246
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to keep terrifying medical device hacks from becoming reality

Network World

While some of the scariest IoT hacks envisioned – those involving hijacked medical devices such as pacemakers and insulin pumps – have yet to surface in the real world, those in the medical and IT security fields are not letting down their guard. They’ve seen enough ransomware and other attacks on healthcare outfits of late to know they are major cyberattack targets.

How To 128
article thumbnail

Data Center Connectivity: Dare to Bypass New York?

Data Center Knowledge

Data center campus on New Jersey coast opens doors to submarine cables to Europe, Latin America Read More.

article thumbnail

How to spin up OrangeHRM as a virtual machine in less than 5 minutes

Tech Republic Data Center

In need of an HRM solution that won't set you back hours of installation and setup time? The TurnKey Linux OrangeHRM virtual appliance might be the right tool for you.

article thumbnail

Nlyte Software is the First to Address Federal DCOI Reporting and Validation

CTOvision

Marty Meehan. As federal budgets face tighter scrutiny, government agencies at all levels have been seeking innovative ways to operate more efficiently at lower cost without compromising security. Consolidating and optimizing government data centers is an important way to shift more IT resources from back-office activities to value-added services. In March 2016, the Federal CIO at the Office of Management and Budget (OMB) issued the Data Center Optimization Initiative (DCOI), announced in March

Software 208
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How HomeServe Labs plans to use the IoT to shake up the insurance business

Computer Weekly

Home maintenance services provider HomeServe grows its internet of things startup internally, and is now targeting the insurance industry with a leak detection system

Insurance 160
article thumbnail

How To Unlock Tech Industry Digital Transformation

Forrester IT

It's no surprise that tech companies are vested in the digital transformation of their customers. But many tech companies find it difficult to leave their product-centric models behind and focus on customer outcomes. That's just one of the findings from the research published on digital transformation in the tech sector. True customer obsession demands an outside-in perspective.

Industry 315
article thumbnail

How to install and run Dropbox from a headless Linux server

Tech Republic Cloud

If you have a headless Linux server that needs access to files from a Dropbox account, here's what to do.

Linux 166
article thumbnail

Cloud News from VMworld: Software, Software-Defined Infrastructure and More

Data Center Knowledge

High-performance solid state storage, software-defined infrastructure and disaster-recovery-as-a-service have been the highlights of VMworld 2016 vendor announcements so far. Read More.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Alexa, Siri, and Cortana Voice Controls Going Mainstream

Social, Agile and Transformation

Alexa has over 3000 skills. The iPhone 7 goes wireless, a step Apple is taking to get users to leverage Siri more frequently and easily. Microsoft is broadening Cortana's AI capabilities. . We've reached an inflection point; the end of the keyboard, mouse, and touchpad and the start of voice commands as a legitimate controller. When you develop your next application, you are likely implementing.

Wireless 141
article thumbnail

Optimizing HPC Program Performance with OpenMP and Reveal

CTOvision

Marty Meehan. What do you do when the performance of the MPI program that distributes your work across many cores and nodes starts to level off? Like any good programmer, you enlist the help of your favorite performance profiler to understand what’s going on. You find that you are now network bound, or that the MPI memory footprint has grown so large that there is little room left for your program.

article thumbnail

Cheshire councils face complaints over proposed 12-year ERP contracts

Computer Weekly

The Crown Commercial Service confirms two complaints about a proposed joint council IT procurement framework – offering contracts up to 12 years in length – have been raised

148
148
article thumbnail

How to enable two-step authentication in Dropbox

Tech Republic Security

Concerned about the security of your Dropbox account? For an added layer of protection, follow this process of setting up two-step authentication in Dropbox.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How to add Google Drive folder shortcuts to your Android homescreen

Tech Republic Cloud

If you'd like to have home shortcuts to various Google Drive folders on your Android homescreen, check out how to do it.

Google 149
article thumbnail

How Facebook Made Its Data Warehouse Faster

Data Center Knowledge

New compression algorithm shrinks storage, CPU requirements Read More.

Storage 185
article thumbnail

What is a Blockchain, and why is it here to stay?

Galido

In our latest post on Bitcoin Mining Profitability , we discussed the basics of Bitcoin, what it is, and how to mine it. This post discusses the bitcoin block chain, what it is, how it can be used, and why it’s here to stay. What is Bitcoin? To understand Blockchain, you need to know a little about Bitcoin, or digital currency. Bitcoin in a nutshell is a global peer to peer payments networking that is open to all with a computer or smartphone, open source, decentralized from banks, have

Banking 111
article thumbnail

Dynamic Data Centers

CTOvision

Marty Meehan. Big Data and high performance computing (HPC) are on a collision course – from machine learning to business intelligence, the combined power of clustered servers, advanced networking and massive datasets are merging, and a new Big Data reality is on the rise. To leverage all this landscape has to offer, correctly selecting, implementing and managing new technologies is critical, and we’re here to point you in the right direction.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.