Sat.Apr 08, 2017 - Fri.Apr 14, 2017

article thumbnail

Uber.Pepsi.The Ringling Brothers Circus. Our Values based analysis.

Forrester IT

Three very different brands with an unfortunate commonality: Each has recently incurred the wrath of a growing segment that Forrester calls the values-based consumer. Last week at Forrester's Consumer Marketing Forum, my colleague J im Nail and I launched a new line of research. It helps marketers manage the trend of consumers looking beyond the direct, personal benefits they receive from a brand to also value the brand's impact on society and the world.

Analysis 249
article thumbnail

Chatbots, Fitbits and AI: IT suppliers identify the top trends in HR technology

Computer Weekly

Businesses are using Fitbits, artificial intelligence and chatbots to improve working life as competition increases to recruit talented ‘millennials’

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Avoid Runaway Costs in the Public Cloud

Data Center Knowledge

Both the tools and the techniques needed to keep a lid on public cloud costs are dramatically different when you rent infrastructure instead of owning it outright. Read More.

Cloud 206
article thumbnail

Ruckus Keeps Rolling, Despite Corporate Drama

IT Toolbox

Buckle in- these first few sentences are a bumpy ride. But I promise, I’ll get you to nice smooth road pretty quickly. Deep breath… ready? Let’s go. First there was Ruckus, the maker of cost-effective, really good Wi-Fi technology. The company came onto the WLAN scene when 802.

Company 200
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Finding Common Ground with Your CEO

CTOvision

Carol M. Evenson. The chief technology officer (CTO) and chief executive officer must work together for the good of the company. The CTO is responsible for focusing on technological matters, such as computers, websites and social networking. The CEO leads the board of directors to make good decisions about company policy and finances. Even if you are a CTO working in a small or midsized business, you are another executive who could run into conflicts with the other one.

article thumbnail

Six key security weaknesses in industrial systems

Computer Weekly

Organisations should mitigate six key vulnerabilities in industrial control systems to reduce the risk of cyber attack, warns security firm FireEye

Industry 217

More Trending

article thumbnail

Why Is Employee IT Education Important for Businesses

IT Toolbox

As businesses are always looking to cut down costs, training employees has become their primary goal, especially for large corporations that count thousands of employees.

Education 193
article thumbnail

RiskIQ: Tools to Improve Cyber- Situational Understanding in DoD

CTOvision

Bob Gourley. Operating, securing and defending the Department of Defense Information Network (DoDIN) network and the data traversing through it is inherently a governmental function for the Armed Forces. To accomplish this, DoD has a skilled workforce, empowered with advanced cyber capabilities, which seeks to detect, mitigate and attribute hostile cyber activity within their networks.

Tools 151
article thumbnail

Changing channels: How DevOps, shared infrastructure and smart hiring help ITV innovate

Computer Weekly

Tom Clark, head of Common Platform at ITV, explains how embracing agile thinking and shared infrastructure is helping the broadcaster stay one step ahead of its commercial competitors

Devops 188
article thumbnail

HPE Offers Container Suite as a ‘Business Decision,’ Not a Compulsory Upgrade

Data Center Knowledge

“We bit the bullet,” said HPE’s vice president for product marketing, Roy Ritthaler. He was speaking candidly with Data Center Knowledge about his company’s release Wednesday of containerized versions of its IT Operations Management (ITOM) suite, and an architectural choice HPE made to adopt a.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Three Things IT Will Like About Today's IP Phones

IT Toolbox

If you’re on the fence about what to do with your phone system, this series should help clarify your options. Many businesses choose to keep using their aging phones for as long as possible, mainly to avoid the expense and hassle of replacing them. Economically, that makes sense, but it also holds employees back in terms of using currently technology to stay productive.

System 162
article thumbnail

How to check your Linux servers for rootkits and malware

Tech Republic Data Center

Linux is a reliable, secure choice for your data center. Even so, doing regular checks for rootkits and malware is always an advised best practice. Jack Wallen shows you how.

Malware 164
article thumbnail

Europol and Brazil agree co-operation on cyber crime

Computer Weekly

Brazil, which has a significant and growing cyber crime problem both as the target of international attacks and the source of regional attacks, is set to work more closely with Europol to fight cross-border crime

166
166
article thumbnail

IT Certifications: How Valuable Are They?

Data Center Knowledge

There seems to be two schools of thought on the value of IT certifications. Some technology professionals say they can absolutely turbo-charge your salary and earning potential. Others claim that certifications may not be worth the paper on which they’re printed. Obviously, the companies that.

Company 177
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Three Things Users Will Like About Today's IP Phones

IT Toolbox

Over the past two posts , I’ve addressed how desk phones are evolving to meet the needs of today’s workers, and if you haven’t stayed current, you might think that a phone is still a phone.

Meeting 157
article thumbnail

5 ways robots are vulnerable to cyberattacks

Tech Republic Security

Robotic devices flooding the IoT market are insecure, according to IOActive researchers. Authentication and privacy issues are some of the cybersecurity risks the researchers found.

article thumbnail

Thurrock Council latest to put gigabit broadband in public housing

Computer Weekly

Thurrock Council will fit out thousands of publicly owned properties with gigabit fibre-to-the-premises broadband

211
211
article thumbnail

Gartner Projects Worldwide IT Spending to Reach $3.5B in 2017

Data Center Knowledge

Worldwide IT spending will increase by 1.4 percent from last year, reaching $3.5 billion in 2017, according to projections released Monday by Gartner. The growth rate was projected to be 2.7 percent in the previous quarterly forecast, but was hit by the rising U.S. dollar. “The strong U.S. dollar.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The king of spam

IT Toolbox

Pyotr Levashov, the infamous Kelihos botnet operator and spam maestro, finally got himself arrested on holiday in Spain

174
174
article thumbnail

6 common enterprise cybersecurity threats and how to avoid them

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.

How To 149
article thumbnail

Interview: Codecon – a platform for skills development through instant feedback

Computer Weekly

By providing programmers with instantaneous feedback, they are more likely to improve and develop the skills they’ll need for the corporate environment, says Codecon creator

article thumbnail

Tips for Disinfecting Your Data Center

Data Center Knowledge

Cyberattacks have pretty much become a part of every day life. Security firm ForeScout’s State of Cyber Defense Maturity Report found that more than 96 percent of organizations experienced a major IT security breach in the past year. One in six organizations had five or more significant.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ERP or Accounting Software? Which is Better?

IT Toolbox

Businesses often confuse enterprise resource planning (ERP) with accounting software. While these two applications have functions that overlap, they serve very different purposes. Here are the benefits of each program, so you can decide which one is best for you. What is Accounting Software?

Software 138
article thumbnail

How to upgrade the Linux kernel with a handy GUI

Tech Republic Data Center

If you're looking to get your Linux kernels up to the latest releases, here's how to use a GUI tool available that makes this process very easy.

Linux 161
article thumbnail

IAM a core building block for GDPR compliance

Computer Weekly

Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole

Security 151
article thumbnail

DCK Exclusive – Infomart’s Big Plans for Iconic Dallas Landmark

Data Center Knowledge

Dallas Infomart has the luxury to master plan its growth, but executing comes with a price tag -- as much as $500 million over the next five to ten years. Read More.

Cloud 169
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Are Today's IP Phones Good News or Bad News for Microsoft?

IT Toolbox

As a coda to this series , it’s hard to ignore the potential impact of these new IP phones on Microsoft. This is the one company that almost all businesses rely on, and with Lync being re-branded as Skype for Business, they have had renewed designs on bringing voice into their fold.

Microsoft 138
article thumbnail

Microchip implants help employees access data; experts worry about 'slippery slope' for privacy

Tech Republic Security

A Swedish company offers employees the chance to implant microchips in their hands to simplify access to buildings and carry data. But the implants raise concerns about privacy.

Data 144
article thumbnail

Kelihos botnet downed after arrest of alleged kingpin

Computer Weekly

The US has led the takedown of the international botnet Kelihos after the arrest in Spain of the Russian believed to have operated the botnet since 2010

156
156
article thumbnail

Bye-bye, Big Box: Hyper-converged Infrastructure Waking Up Storage Market

Data Center Knowledge

We’re still in the early phases of HCI adoption, but we can expect the compelling management and TCO benefits to push HCI into mainstream market adoption. Read More.

Storage 163
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.