Sat.Dec 10, 2016 - Fri.Dec 16, 2016

article thumbnail

The Future Of B2B Mobile Enterprise Services

Forrester IT

Business-to-business (B2B) ecosystems facilitate the continuous exchange of information and collaboration. B2B ecosystems will play a central role for all businesses because they form the basis for redefining approaches toward innovation, knowledge management, supply-chain optimization, product development, sales, and marketing. While the ultimate focus of these ecosystems is to create customer value, their more immediate effect is to drive operational agility in service of customers.

B2B 286
article thumbnail

Andreessen Horowitz Partner: Cloud Will Go Away

Data Center Knowledge

While a good chunk of the world’s enterprises have yet to start leveraging cloud services in a meaningful way, some in the Silicon Valley venture capital community are already thinking about a future when cloud will start losing its relevance. “In the not-too-distant future cloud computing is going.

Cloud 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disaster recovery testing: technology systems to test DR

Computer Weekly

In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches

article thumbnail

Where Video Analytics Falls Into Your Big Data Strategy: 5 Use Cases

CTOvision

Rick Delgado. Any business hoping to enjoy success now and well into the future knows that big data is the way to go. With big data analytics, companies have become more versatile, adopting new technological solutions to enhance their capabilities, efficiently run their organizations, and increase revenue. Big data analytics has become so popular that other types of analytics have branched off from -- things like social analytics, predictive analytics, and more.

Big Data 191
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Forrester’s 2017 Asia Pacific Predictions

Forrester IT

Forrester recently presented our Asia Pacific 2017 Predictions at events across Singapore, Sydney and Beijing, followed up by a webinar earlier this week for customers across the region. We shared our view that businesses today are under attack, but not by their competitors. They are under attack from their customers. Three years ago, Forrester identified a major shift in the market, ushering in the age of the customer.

Trends 270
article thumbnail

CyrusOne Shares Just Spiked On Good News – Here’s Why

Data Center Knowledge

The data center REIT sector has begun to rally for the first time since the November election, once again allowing good news to provide a tailwind for share prices. Read More.

More Trending

article thumbnail

Overview of how Apache Spark fits in the Apache Hadoop ecosystem

CTOvision

Michael Johnson. For years, enterprise technologists have studied both Apache Hadoop and the many tools in that framework and the rise of Apache Spark. In the early days of Spark it was viewed as a bit of a competitor to the rest of the framework. But now thanks to the contributions of a wide team of open source developers and leaders, the consensus is becoming clear (especially among enterprise CTOs), Spark is better as part of a more comprehensive framework.

article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

Internet 131
article thumbnail

DCK Exclusive: Iron Mountain’s Evolving Data Center Strategy

Data Center Knowledge

In an interview with Data Center Knowledge, Iron Mountain SVP of Data Centers Mark Kidd discusses strategic vision and CTO Eli Almog highlights Iron Cloud and managed services. Read More.

article thumbnail

AWS opens UK datacentre region to meet "pent-up" demand for locally-hosted cloud

Computer Weekly

The UK managing director of AWS claims region opening will help existing customers meet their latency and data sovereignty requirements, and benefit the wider economy

Meeting 192
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

US-CERT: Stop using your remotely exploitable Netgear routers

Network World

Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection. Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable.

165
165
article thumbnail

4 ways your company can avoid Yahoo-level stupidity in enterprise security

Tech Republic Security

Yahoo recently confirmed a leak of one billion accounts, adding to its growing list of security woes. Here are four actions your company can take to prevent a similar debacle.

Company 131
article thumbnail

Deploying Your Cloud: Three Real-World Applications and Use-Cases

Data Center Knowledge

Let’s talk about cloud. Not that we don’t normally talk cloud, but let’s actually focus on a few specific use-cases. Before we dive in, it’s very important to see that very soon cloud will simply become a normal part of your data center and business process. A recent Cisco Service Provider report.

Cloud 178
article thumbnail

Citrix: How the great survivor challenges the tech giants

Computer Weekly

In spite of Microsoft and VMware encroaching on its core product areas, Citrix is a company which seems to have “staying power”

Vmware 213
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

14 eyebrow-raising things Google knows about you

Network World

Google may know more about me than I know about myself. I'm not just saying that, either: I recently started poking around in Google's personal data repositories and realized that, between my wide-reaching use of the company's services and my own brain's inability to remember anything for more than seven seconds, Google may actually have the upper hand when it comes to knowledge about my life.

Google 126
article thumbnail

How to share folders between guest and host in VirtualBox

Tech Republic Data Center

Data center managers, add this VirtualBox efficiency tip to your bag of tricks by simply following the steps to set up shared folders between VirtualBox host and guest.

article thumbnail

Amazon Opens Data Centers to Boost U.K. Cloud Services

Data Center Knowledge

The U.K. data region, which comprises two zones, each consisting of multiple data centers, is the 16th Amazon Web Services operates worldwide and its third in Europe. Read More.

article thumbnail

Tech industry big guns unite to create crash-free IT services and systems

Computer Weekly

Some of the tech industry's biggest names have come together to create the Zero Outage Industry Standards Association to help improve the uptime of IT systems and services

Industry 183
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Is Tough Talking The New Correct Way To Communicate?

The Accidental Successful CIO

Now we’re being told to drop the niceties and just talk frankly Image Credit: Stuart Richards. When you are at the office, how do you interact with people? I suspect that in your office there are smart people, dumb people, nice people, and not so nice people. You probably grin and bear it – you try to treat everyone the same way and you try to be nice to everyone.

How To 116
article thumbnail

Hot Twitter Hashtags for CIO [DataViz]

Social, Agile and Transformation

We're tweeting about key technologies like blockchain, artificial intelligence, IoT, big data and analytics.Transformation topics on digital transformation, agile, social business, and smart cities are also top of our tweets. Click here to use the data visualization on CIO Influencer Hashtags. Click on the image to use the dashboard.

article thumbnail

Kubernetes 1.5 Could Bring Pre-configured, Containerized Data to Bare Metal

Data Center Knowledge

An out-of-the-box solution for staging low-latency, huge database operations may be in the works, thanks to a new version of the leading open source orchestrator, and an expanded partnership around it. Read More.

article thumbnail

Metro Bank moves IT infrastructure to cloud

Computer Weekly

Metro Bank moves its IT infrastructure to a private Rackspace cloud platform, which will allow it to keep up with the latest technologies and reduce costs

Banking 190
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Two features that make Wire Private Message a must have for business users

Tech Republic Security

If you're looking for a way to enable your staff to more reliably and securely communicate with one another, here are two reasons why Wire should be your tool of choice.

Tools 110
article thumbnail

Amazon bets big on Las Vegas, rolling out nearly 5,000 Echo units to hotel rooms

Tech Republic Cloud

Wynn Las Vegas is deploying Amazon Echo in its guest rooms. Initial features will include lighting and temperature control and eventually personal concierge functions will be added.

Hotels 102
article thumbnail

Ericsson Launches ‘Hyperscale’ Quebec DC with Half the Size, One Year Late

Data Center Knowledge

It’s a brilliant and beautiful complex, with a longer construction history than its builder would have liked, and a set of basic specifications that add new dimension to the notion of “give-and-take.” Read More.

article thumbnail

NVMe over fabrics vs Fibre Channel, Ethernet, Infiniband

Computer Weekly

NVMe over fabrics takes the built-for-flash advantages of the PCIe-based protocol, and allows NVMe to be sent via Fibre Channel, Ethernet and Infiniband networks

Network 179
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Privacy concerns about IoT devices won't be assuaged soon

Tech Republic Security

Researchers at Global Privacy Enforcement Network have found that an alarming number of IoT device systems do not protect the owner's privacy. Get the details.

Research 106
article thumbnail

5 things you should do following the Yahoo breach

Network World

Internet giant Yahoo announced a massive data breach Wednesday that affected over one billion accounts, making it by far the largest data breach in history. This follows the disclosure in September of a different breach that affected more than 500 million of the company's customers. What stands out with this new security compromise is that it occurred over three years ago, in August 2013, and that hackers walked away with password hashes that can be easily cracked.

article thumbnail

Chilly Northern Europe a Hotspot for Data Centers – Will Canada Be Next?

Data Center Knowledge

Capital and operational costs for facilities close to the Arctic can be up to 60 percent cheaper than their counterparts in Germany, Holland and England. Read More.

article thumbnail

Saudi Arabia enterprise IT trends for 2017

Computer Weekly

Computer Weekly looks at the technologies that will dominate enterprise IT in Saudi Arabia next year

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.