Sat.Nov 05, 2016 - Fri.Nov 11, 2016

article thumbnail

How Big Data Drives The Sharing Economy

CTOvision

Brigg Patten. Your data is being tracked. Don't worry, you aren't alone. The advent of "Big Data" has resulted in an internet landscape where every major company tracks their users' information. When a website warns you that it wants to use cookies to track your information, that's a clear sign of big data at work. We often hear about the sharing economy, big data, and other technical terms that seem a bit mysterious.

Big Data 331
article thumbnail

Automation And Sharing Are Common Themes

Forrester IT

After years of shunning automation and information sharing efforts, the security industry is now embracing them. Every vendor conference I attended this fall talked about the need to automate some security functions in order to increase security teams' efficiency and ability to quickly detect and respond to incidents. The vendors also focused on the need to break down the silos and share information across the security and IT organizations, between vendors, and throughout the security commun

Security 335
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Software-defined storage: The pros and cons, and what is available

Computer Weekly

Software-defined storage is a rapidly rising trend in the datacentre, but what are the advantages and disadvantages of building your own storage, and is it suitable for all organisations?

Storage 255
article thumbnail

Microsoft to Build Out, Probably Upgrade, Boydton Data Center

Data Center Knowledge

The timing of the company’s move points to the likelihood that it may be upgrading its facility near Richmond and Raleigh for its “Generation 5” DC platform. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Cyber Threat On Election Day: No need to panic, expect some nuisance attacks and exaggerated reporting in press

CTOvision

Bob Gourley. Everything I'm seeing and hearing in the security community says there is no need to panic about cyber attacks on election day. There will be attacks, but guess what? There are attacks every day now, that is the new normal. More specifically, we can say there will likely be some nuisance attacks against election infrastructure and some of those will be reported in the press.

Report 249
article thumbnail

The US Leads In Public Cloud Services, But Other Regions Are Catching Up

Forrester IT

Public cloud services are one of the biggest disruptions in the tech market in the past 15 years. In September 2016, my colleagues Andrew Bartels , Dave Bartoletti , and John R. Rymer published their latest public cloud services outlook, The Public Cloud Services Market Will Grow Rapidly To $236 Billion In 2020 ,projecting 22% annual growth in public cloud services over the 2015-to-2020 period.

Cloud 320

More Trending

article thumbnail

Chinese Bitcoin Firm Says It’s Building a 135 MW Powerhouse

Data Center Knowledge

The leader of a kind of virtual mutual fund for online currency is not only manufacturing its own servers, but now says it’s building a massive data center to house and power them all. Read More.

article thumbnail

Election Impact 2016: 10 Nov on Capital Hill

CTOvision

Michael Johnson. CG Roll Call is hosting Election Impact 2016 on 10 Nov at the Hyatt Regency Washington on Capitol Hill. This event is an opportunity to hear directly from leaders in DC on the impact of the Congressional and Presidential elections, including diving deep into topics like cybersecurity, healthcare, defense, energy, technology and budgets.

article thumbnail

Take The Wheel: Build Your Cloud Computing Strategic Plan NOW

Forrester IT

Are you excited by all the new innovations coming in the cloud computing market for 2017 ? Our Predictions report neatly summarizes them for you. Now what are you going to do about it? If you're like the majority of infrastructure and operations pros I speak with about cloud, building a strategic plan to get your cloud plans in order is a top priority for 2017. 2017 is the perfect time for I&O pros to take control of their company's cloud computing strategy , because cloud adoption is up, de

Cloud 309
article thumbnail

Human-machine teaming key to cyber defence, says Intel Security

Computer Weekly

Intel Security is working with a select group of customers on developing systems to enable human-machine teaming to get the best of both worlds in applying cyber threat intelligence

Intel 249
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

By 2020, 92 Percent of All Data Center Traffic Will be Cloud

Data Center Knowledge

Cisco projects total global data center traffic to reach 15.3 ZB annually by 2020, with 92 percent of all workloads being processed in the cloud by 2020. Read More.

article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 1

CTOvision

Marty Meehan. Part 1: The Challenge. In today’s connected society, the threat posed by cyber actors and the reality of countless high-profile breaches have catapulted cyber security to a top priority for most organizations. According to recent studies , today, cyber crime and cyber espionage are estimated to cost the global economy over $400 billion each year.

Security 270
article thumbnail

China’s Cybersecurity Law Challenges Foreign Companies To Accelerate Their Digital Transformation

Forrester IT

On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. The law has seven chapters that define specific regulations in various areas, such as network operational security (including key IT infrastructure), network information security, monitoring, alerting, and emergency situation handling as well as related legal responsibilities.

Company 285
article thumbnail

GDPR will require 75,000 DPOs worldwide, study shows

Computer Weekly

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

Study 248
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

China Adopts Cybersecurity Law Despite Foreign Opposition

Data Center Knowledge

China has green-lit a sweeping and controversial law that may grant Beijing unprecedented access to foreign companies’ technology and hamstring their operations in the world’s second-largest economy. Read More.

Company 214
article thumbnail

The Best Ways to Get Rid of Unwanted Data

CTOvision

Rick Delgado. Big Data holds a lot of profitable potential for a business. While you’re looking at how much consumer interest can be gleaned from the lakes upon lakes of data, enabling you to better predict their interest and better tailor your services to reach the right audience more effectively – what you’re missing is how much room it takes. Big Data lives up to its name; it’s massive.

Data 251
article thumbnail

India Jolts Its Cash Economy

Forrester IT

Prime Minister Modi's announcement of the demonetization of the large denomination bills is a significant initiative. While he indicated terror financing and corruption as the main causes for the initiative, there are many ramifications this move will have on legitimate business activities as well. India is known for its love of cash. Uber is primarily a cashless service elsewhere in the world, but more than 50% of Uber trips in India are paid for in cash.

Banking 278
article thumbnail

Russian banks hit by IoT-enabled DDoS attacks

Computer Weekly

DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties

Banking 244
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Nvidia Has Become the Data Center Accelerator Company

Data Center Knowledge

The company whose biggest investments were once in gaming chips now finds itself the leader of a principal technology for one of the hottest markets in data center computing. Read More.

article thumbnail

Digital Risk Management Leader RiskIQ Raises New Funding To Expand Platform Ecosystem, Sales and Digital Risk Applications

CTOvision

Bob Gourley. Editor's note: When I read of a great firm like RiskIQ investing to expand their platform I immediately think of the positive impact to current and future customers. But strategically this also means that large teams of investors believe strongly in the powerful capabilities and strong future of this company. With that in mind we share a RiskIQ press release below -bg.

article thumbnail

My 300th Post!!! -- Sharing Four Tech Predictions for 2017

Social, Agile and Transformation

This is my 300th post! I started Social, Agile, and Transformation over ten years ago as a Startup CTO posting technical insights that I developed while overseeing application development, innovating with new technologies, and driving customer experiences. Over the last several years, I have been writing more about digital transformation with a lot of detail on agile, DevOps, and data science.

Devops 177
article thumbnail

Value chain mapping – making sense of executive strategy

Computer Weekly

In this first excerpt from his book on value chain mapping, Simon Wardley explains why business leaders need to understand the importance of maps for corporate strategy

Strategy 245
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Monitoring Helps Both IT and Businesses Scale

Data Center Knowledge

If the IT department is not able to scale as nimbly as other core business groups, it leaves the entire organization vulnerable to hindered growth. Read More.

Groups 218
article thumbnail

Data Analytics & Python (Cross Post)

Eric D. Brown

Crosspost – This post first appeared on Python Data as Data Analytics & Python. So you want (or need) to analyze some data. You’ve got some data in an excel spreadsheet or database somewhere and you’ve been asked to take that data and do something useful with it. Maybe its time for data analytics & Python? Maybe you’ve been asked to build some models for predictive analytics.

Data 174
article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

How To 161
article thumbnail

European agencies seek to bolster co-operation on cyber crime

Computer Weekly

Fifth annual joint workshop seeks to foster better co-operation between national cyber incident response teams and law enforcement agencies to establish a network to discuss topics of mutual interest

Network 239
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Azure Deepens Kubernetes Support

Data Center Knowledge

Microsoft Azure has extended its support for Kubernetes and the Mesosphere Datacenter Operating System to provide either as container orchestration options, along with Docker Swarm. Read More.

Microsoft 203
article thumbnail

CIOs Need To Understand That Reviews Come With Risks

The Accidental Successful CIO

The standard review process for employees comes with a great deal of risk Image Credit: GotCredit. As your company’s CIO, one of your jobs is to evaluate the performance of your direct reports as it relates to the importance of information technology. How you go about doing this and how often you do it have been the subject of much debate over the past few years.

Meeting 138
article thumbnail

Video: FBI cybersecurity chief talks about aftermath of Wikileaks, Snowden, and 2016 election

Tech Republic Security

The FBI has a long legacy of being at the forefront of technology, but managing those systems while keeping up with the latest advances in tech is an unforgiving task.

Video 162
article thumbnail

Yahoo admits data breach may affect Verizon acquisition

Computer Weekly

In its latest SEC filing, Yahoo admits some people knew of the 2014 breach shortly after, that the true cost of the breach is still unknown, and that the breach could affect its deal with Verizon

Data 228
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.