Sat.Nov 12, 2016 - Fri.Nov 18, 2016

article thumbnail

Micro Explanations For Nine Essential AI Technologies

Forrester IT

Artificial Intelligence (AI) is not one big, specific technology. Rather, it is comprised of one or more building block technologies. So, to understand AI, you have to understand each of these nine building block technologies. Now, you could argue that there are more technologies than the ones listed here, but any additional technology can fit under one of these building blocks.

article thumbnail

DDoS: Understand The Growing Threat From Botnet #14

CTOvision

Thomas Pore. DDoS attacks are one of the largest attack methods threatening the stability of the Internet. These events are perpetrated by a collection or botnet of Internet facing devices that communicate with a command and control center for instructions. One of the more infamous groups of bots is referenced as Botnet #14. Botnet #14 is one of many Mirai botnets currently operating within the DDoS space.

Internet 238
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HyperGrid launches HyperCloud containerised hybrid cloud platform

Computer Weekly

Hyper-converged appliance maker HyperGrid promises full two-way workload portability between on-premise hardware, private cloud and public cloud services in HyperCloud launch

Cloud 215
article thumbnail

Five Reasons to Adopt Hybrid Cloud Storage for your Data Center

Data Center Knowledge

According to a recent survey of 400 organizations in the U.S. and UK conducted by Actual Tech, 28 percent of firms have already deployed hybrid cloud storage, with a further 40 percent planning to implement within the next year. Read More.

Storage 196
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IoT Software Platform Wave Evaluation Helps Firms Navigate The Complex Solution Landscape

Forrester IT

As businesses pursue digital initiatives, I&O execs must assist their line-of-business colleagues with addressing software, security, data, and business analytics integration complexity associated with deploying these IoT solutions. Digital opportunities to use IoT include: Read more Categories: IoT. cloud coomputing.

Software 292
article thumbnail

How Far has Face-Tracking Technology Come in 2016?

CTOvision

Ellie Martin. The latest Snapchat lens that gives you fox ears may be nothing more than a passing distraction to send to your friends, but that lens, colloquially known as a “filter,” utilizes surprisingly advanced face tracking technology. Looksery, the Ukrainian startup that developed Snapchat’s filter technology (which Snapchat acquired for $150 million), created software that can not only recognize a human face, but accurately map it to ensure that those fox ears are on top of your head and

Social 233

More Trending

article thumbnail

LinkedIn’s Award-Winning Hillsboro Data Center Goes Live

Data Center Knowledge

The facility, which LinkedIn is leasing from Infomart Data Centers, features custom electrical and mechanical design with 96 servers per cabinet and uses just below 18kW of power per cabinet. Read More.

article thumbnail

VMware Is Evolving As A Powerful Provider Of Cloud-Based Offerings

Forrester IT

With Lauren Nelson. We recently attended VMworld 2016 Europe in Barcelona. The event, which attracted about 10,000 visitors, has established itself as an important destination for anyone with an interest in virtualization-related topics. In many respects, the event was over-shadowed by the VMware-AWS partnership. However, the event also provided us with several additional impressions.

Vmware 287
article thumbnail

We are using less paper than ever – but there is still progress to be made

CTOvision

Bob Larrivee. Recent AIIM research into paper-use in the workplace revealed good news - there is a rise in the demand for paperless processes, and the amount of paper arriving at office doors is decreasing for half of organizations. But we’ve got to ensure this paper-free momentum continues if we really are to realize the dream of paper free processes all across the business.

Survey 226
article thumbnail

Amber Rudd orders Lauri Love extradition to US to face hacking charges

Computer Weekly

Engineering student Lauri Love faces trials in three US states and a possible 99-year jail sentence for allegedly hacking into US government computer systems as part of a political protest, despite concerns over his health

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Is a Retreat from Private Cloud Also Under Way? Cisco Weighs In

Data Center Knowledge

A less-than-stellar earnings report this week from Cisco is blamed, in part, on a technology that its CEO admits may be too complex for its customers. But is OpenStack to blame for everything going wrong? Read More.

Cloud 190
article thumbnail

BC & DR Pros, We Need Your Help!

Forrester IT

Each year, Forrester Research and the Disaster Recovery Journal team up to launch a study examining the state of business resiliency. Each year, we focus on a particular resiliency domain: IT disaster recovery, business continuity, or overall enterprise risk management. The studies provide BC pros, DR pros, and other risk managers an understanding of how they compare to the overall industry and to their peers.

article thumbnail

The Data Cars Will Be Capturing by 2030 Can Only Be Described As “Big”

CTOvision

Rick Delgado. If you haven't imagined it, think about this: automobiles of the future and to some extent even current vehicles are able to collect all sorts of data while you are driving them. As manufacturing designs and computer functions improve, cars will become smarter in a rapidly accelerating stream. Thanks to increasingly networked vehicles, cars of the future will then be able to collect all sorts of data about the vehicle, the roads it is driving on, your driving habits, other vehicles

Data 222
article thumbnail

The internet of things data explosion and storage and compliance

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2016 on the explosion of data that comes with the internet of things and its implications for data storage and compliance

Storage 199
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Xilinx Unleashes FPGA Accelerator Stack Supporting Caffe, OpenStack

Data Center Knowledge

Now that the FPGA market is finally moving fast, in the wake of the Moore’s Law dead-end, Xilinx makes the case that its simpler architecture is more adaptable to a broader range of use cases. Read More.

article thumbnail

Web Summit Stakes Its Claim As One Of The Most Important Global Tech Events

Forrester IT

Photo: Paddy Cosgrave, CEO and co-founder of Web Summit. Recently, Web Summit took place in Lisbon. "Web-what"? Web Summit is indeed a relative newcomer on the event scene, but you should take notice. At its core, Web Summit is all about connecting larger enterprises and investors to smaller tech companies. On a human level, Web Summit's goal is to bring together youngish and enthusiastic technology entrepreneurs with experienced investors and leading managers of technology vendors.

article thumbnail

Situational Awareness Is Key To Enhancing Your Cyber Security Posture

CTOvision

Bob Gourley. We publish the daily Threat Brief to provide actionable intelligence for busy decision-makers. Every day at 8am eastern our daily provides a succinct overview of information that can help you better defend your organization. A feature of every daily is a quickly skimmable index to stories that lets you decide what to focus on. Topics today include: Will data breach notification laws be good for partners?

Security 212
article thumbnail

Barnsley Council maximises adoption of mobile apps though staff consultation

Computer Weekly

Barnsley Metropolitan Borough Council is rolling out SAP Fiori apps in HR initially, and learning how to adapt to user needs from surgeries and workshops

SAP 209
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Facebook to Add Fourth Building to Ft. Worth Construction Project

Data Center Knowledge

It was already one of Facebook’s most ambitious renewable energy data center projects, back when it only had one building. But now that it will need four times the power, will local residents give way? Read More.

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

Budget 131
article thumbnail

CTOvision Partners with 13-16 March 2017 Strata + Hadoop World San Jose: Save 20% Off Registration

CTOvision

Bob Gourley. Once again, thanks to O'Reilly Media, we are able to offer a discount for all CTOvision readers who can attend the San Jose Strata Hadoop World. This is the biggest Big Data event of the year. Strata + Hadoop World is a rich learning experience at the intersection of data science and business. Thousands of innovators, leaders, and practitioners gather to develop new skills, share best practices, and discover how tools and technologies are evolving to meet new challenges.

Big Data 211
article thumbnail

Cloud set to net a larger share of enterprise IT budgets in 2017, predicts 451 Research

Computer Weekly

451 Research's cloud and hosting market review suggests enterprise IT decision makers are preparing to ramp up with use of cloud and hosting services in 2017

Research 206
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Three Trends Driving Digital Business Innovation

Data Center Knowledge

The conventional paradigm for value creation is being abandoned, and IT organizations are struggling in the face of three major challenges: big data analytics, harvesting IoT and the changing digital workplace. Read More.

Trends 175
article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Security 131
article thumbnail

IBM: Many companies still ill-prepared for cyber attacks

Network World

When it comes to responding to cyber-attacks it seems many companies are severely lacking. A study out this week conducted by the Ponemon Institute and sponsored by Resilient an IBM company said that 66% of the 2,400 security and IT professionals they interviewed said their organization is not prepared to recover from cyberattacks. +More on Network World: Cisco: Potent ransomware is targeting the enterprise at a scary rate + According to Ponemon, for the second straight year the Cyber Resilient

IBM 126
article thumbnail

Smart meter benefits millions of pounds less than first thought, admits BEIS

Computer Weekly

The gross financial benefit from the national smart meter rollout could be hundreds of millions of pounds less than first thought, but the costs of the programme are still rising

Financial 192
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Five Best Practices for Managing Remote Data Center Resources

Data Center Knowledge

The key point to remember is that resources are always finite and can become a costly expense when they’re not managed properly. Read More.

Resources 193
article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 125
article thumbnail

5 tips to help free up storage space on your Google account

Tech Republic Cloud

When you hit your storage limit, follow these best practices to figure out which files, and settings, to change to save space on your G Suite account.

Storage 131
article thumbnail

Nestlé picks Telefónica to build IoT for coffee machines

Computer Weekly

Nestlé’s professional business services unit will incorporate internet of things technology into its coffee machines in pursuit of greater efficiency and customer satisfaction

Internet 193
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.