Sat.Nov 19, 2016 - Fri.Nov 25, 2016

article thumbnail

Is Data Visualization A Separate Market Or Just A Feature Of Business Intelligence Platforms?

Forrester IT

Lots of my clients are confused. They start a Forrester inquiry with a question about data visualization capabilities, but when I lead them into discussion about business intelligence (BI) platforms, they say "but we already have a BI platform. All we really want is an ability to create and share data visualizations" Is there a separate market for that?

article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Bob Gourley. Nature has provided insights for engineers for years, inspiring technical solutions to challenges that replicate the elegant perfection of approaches that work in the natural world. Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing.

Security 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Moncton Colo Becomes the Hottest IPv6 Submarine Cable Port

Data Center Knowledge

With a population under 70,000, Moncton, New Brunswick was originally known for its wine and food festivals as a tourist destination, and its location just a few miles from the beaches. But geographic positioning smack in the center of Canada’s Maritime Provinces and close to the Northumberland.

IPv6 219
article thumbnail

HumanOps: Etsy on how unclear workplace expectations contribute to staff burnout

Computer Weekly

IT managers risk "normalising" bad workplace behaviour and contributing to employee stress by responding to emails out of hours and staying late unnecessarily, warns Etsy web operations manager

202
202
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI Is The Sincerest Form of Flattery. And Fear

Forrester IT

Pure AI is true intelligence that can mimic or exceed the intelligence of human beings. It is still a long way off, if it can even ever be achieved. But what if AI became pure -- could perceive, think, act, and even replicate as we do? Look to humanity for the answer. Humanity has been both beautiful and brutal: The beauty of ingenuity, survival, exploration, art, and kindness.

article thumbnail

Cybersecurity Protocols to Implement in an Always-Connected Workforce

CTOvision

Carol M. Evenson. It used to be that workers would come into the office, sit at their desk, work for eight hours (with a break for lunch in there somewhere), and then go home. Now, however, work is moving out of the office and into, well… everywhere else. With teleconferencing, smartphones, cloud computing, and a long line of other mobile technologies, today’s workforce has evolved.

Malware 227

More Trending

article thumbnail

Reprinting the Middle East in 3D

Computer Weekly

3D printing is being used in the UAE in a number of industries, and is becoming a regional hub for a technology that could help rebuild war-torn parts of the Middle East

3D 195
article thumbnail

Driving an Agile and DevOps Culture that Delivers Business Transformation

Social, Agile and Transformation

Thanks to the team at All Day DevOps for giving me the opportunity to speak about this critical topic on the intersection of agile, devops, culture and business transformation. If you missed the talk, I'm summarizing below and including the stream to watch it along with several other great presentations. If you would like access to the slides, I have a newsletter signup at the bottom of this.

article thumbnail

Call for speakers: O’Reilly Artificial Intelligence Conference June 26–29, 2017 NYC

CTOvision

Bob Gourley. The O’Reilly AI Conference is returning to New York June 26–29, 2017 to explore the most essential and intriguing topics in intelligence engineering and applied AI. The program will cover the latest developments in tools, algorithms, and architectures, applications such as finance and robotics, novel interfaces like bots, plus much more.

article thumbnail

HPE Helps CIOs Navigate the Cloud with Managed Services for Azure

Data Center Knowledge

More than a year after Hewlett Packard Enterprise (HPE) said it would stop offering its own public cloud services the company has launched a portfolio of managed services around Microsoft Azure. Read More.

Cloud 192
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK firms neglecting cyber security, say 74% of IT managers

Computer Weekly

Most UK firms lack the time and resources to ensure adequate cyber security and data protection, according to a survey of IT managers

Security 215
article thumbnail

Don't let yourself be targeted by cybercriminals: Here are 6 tips for safe holiday shopping

Tech Republic Security

Online shopping is easy and convenient, and more people are doing it than ever before. The rise in e-commerce also gives cybercriminals more opportunities to rob you blind. Here's how to stay safe.

How To 131
article thumbnail

What Can You Do About Malware In The Cloud?

CTOvision

Rachel Gillevet. he cloud isn’t the safe haven you might think it is. Malware exists even there - and it spreads fast. It’s easy to forget amidst all the rhetoric and buzzphrases. The cloud isn’t some mystical, software-based entity, completely detached from the physical world. It has a physical backend. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware.

Malware 219
article thumbnail

Finding the Right Data Center Model for Your Business

Data Center Knowledge

Cloud is becoming more popular, MTDCs are becoming much more capable, and regulators are trusting off-premises solutions more. The trick is to use the best model for the task at hand. Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Teens should focus on data and cyber careers, says fintech expert

Computer Weekly

CEO and founder of Streets Consulting, Julia Streets, claims teenagers should look towards data scientists and cyber security roles to ensure a job for life

Data 196
article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

Study 131
article thumbnail

Cognitio’s Cloud Transition Framework Captures Lessons Learned From Real-World Cloud Implementations

CTOvision

Bob Gourley. The move toward cloud computing as a technology design style continues to accelerate. We all know the expected benefits: reduction in CAPEX, better utilization of resources, improved system availability, better disaster recovery, and flexibility of compute and storage resources. Add in the ability to engineer fine-grained solutions to provide unique opportunities for creating responsive, mission-focused applications and services to meet a wide array of needs, and it sounds like a wi

Cloud 212
article thumbnail

How to Reduce Costs and Improve Efficiency in Your IT Infrastructure

Data Center Knowledge

Make sure you work with a company that can offer smart, affordable strategies customized to your organization’s current and future needs. Read More.

How To 189
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Boots SAP centre of expertise helps take back control

Computer Weekly

Walgreens Boots Alliance has built an SAP centre of expertise to take back control of the strategic direction of its IT organisation from its previously outsourced structure

SAP 183
article thumbnail

IoT security camera infected within 98 seconds of plugging it in

Network World

One and a half minutes is all it took after plugging in an internet-connected security camera for the camera be infected with malware. Unlike the average Jane or Joe Doe who would not want their security camera to be immediately infected with malware, Rob Graham, CEO of Errata Security, called it “ fun ” to watch the infection happen. He tweet-documented his experience.

Security 125
article thumbnail

Why digital transformation is forcing IT to evolve

Tech Republic Data Center

The Facebook 100Gbps data center switch is a indicator of how traditional enterprise vendors no longer drive innovation. This is forcing IT to change the way they operate.

article thumbnail

Facebook Experimental Drone Accident Subject of Safety Probe

Data Center Knowledge

A U.S. safety agency is investigating an accident involving a massive experimental drone Facebook Inc. is developing to bring the internet to remote areas of the world. Read More.

Internet 166
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Are Asean organisations ready for blockchain technology?

Computer Weekly

Blockchain promises to increase the efficiency and security of transactions in industries way beyond its financial services roots. But what does it mean in the Asean region?

Financial 183
article thumbnail

Microsoft joining the Linux Foundation comes down to one word: Cloud

Tech Republic Cloud

Jack Wallen offers his take on the news that Microsoft has joined the Linux Foundation and explains the cloud's role in the union and why it's a good thing for everyone.

Linux 122
article thumbnail

Tweets aren't tools for surveillance: Twitter pushes back against law enforcement

Tech Republic Security

In a recent blog post, the social media company clarified the acceptable use of its public APIs, pushing back against tweets being used to track protesters and activists.

Tools 121
article thumbnail

Cloud Server Provider Linode Adds Second Tokyo Facility

Data Center Knowledge

Citing a surge in Asia/Pacific customer activity, especially from both Japan and China, virtual cloud and Web hosting provider Linode announced Monday it’s adding a second data center facility in Tokyo. And in the wake of another round of denial-of-service attacks targeting its Atlanta facility.

Cloud 167
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Third of bank staff expect Brexit to force employer out of UK

Computer Weekly

A third of workers in the financial services sector think there is a strong chance their employer could move operations out of the UK after Brexit.

Banking 196
article thumbnail

George Youmans, Jr.: The CloudMASTER Fashionista!

Cloud Musings

So how could a NCTA Certified CloudMASTER accelerate his career in the fashion industry? To answer that question, you would need to catch up with George Youmans, Jr. He has been with fashion giant Ralph Lauren since October 2012. That was around the time he decided to complete the NCTA CloudMASTER curriculum. After graduation George was first promoted to Senior IT Technician and then to Senior Technologist.

Fashion 114
article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

How To 131
article thumbnail

Report: SaaS Dominates Cloud Usage in India

Data Center Knowledge

Cloud adoption is rapidly increasing in India, as roughly two-thirds of organizations using cloud services have done so within the past two years, according to research released this week. Read More.

Cloud 166
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.