Sat.Sep 10, 2016 - Fri.Sep 16, 2016

article thumbnail

A Timeline of Big Data Analytics

CTOvision

Rick Delgado. The world seems to run on big data nowadays. In fact, it’s sometimes difficult to remember a time when businesses weren’t intensely focused on big data analytics. It’s equally difficult to forget that big data is still relatively new to the mainstream. The amount of data being generated in the world today is immense, and it’s only getting bigger.

Big Data 295
article thumbnail

The Documentum Shoe Finally Drops.As ECM Undergoes a Changing of the Guard

Forrester IT

My colleague Craig Le Clair did a nice wrap-up of the long-anticipated news of the divestiture of the Enterprise Content Division (ECD) from the newly merged Dell-EMC entity. The move to spin off the Documentum, InfoArchive and Leap platform was expected, it wasn't entirely clear over the last few months who the lucky buyer would be. Step up OpenText!

HP 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

I’m joining the Go team at Google

SPF13

I am honored to share that I have joined Google as a member of the Go team and will be primarily based in NYC. Why I joined. My passion has always been building great products, ecosystems and experiences through open source. The desire to create transformative experiences has led me down some wonderful and life changing roads. I’ve been fortunate enough to combine that passion with employment for most of the last decade.

Google 220
article thumbnail

Alleged hacker Lauri Love can be extradited to the US, court rules

Computer Weekly

Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence

211
211
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cognitio and ThreatBrief in People Magazine: Security tips for the general public

CTOvision

Bob Gourley. One of the key lines of business at Cognitio is our cybersecurity practice. We help enterprises build action plans to mitigate risks and improve their security posture. Increasingly we are also asked to provide tips and techniques for employees to consider in their personal lives. Every person with a computer or phone has information at risk and should take personal responsibility for improving their security posture.

Security 286
article thumbnail

Tech Vendors Must Evolve Or Crumble: The Report You Must Read

Forrester IT

Which companies do you feel are the dominant players in the technology industry? Are they the names that have dominated for years, like Cisco, the newly merged Dell (plus EMC), the recently split HP, Inc. and HPE, IBM, Microsoft, or Oracle? Is it one of the newer cloud titans like AWS, Google, IBM, or Microsoft ? Will cloud demolish the tech industry as we know it?

Report 272

More Trending

article thumbnail

Mirantis acquires TCP Cloud in continuous delivery push for OpenStack deployments

Computer Weekly

OpenStack distribution provider claims TCP Cloud acquisition will ensure its customers' infrastructure is equipped to cope with the rate of application innovation they are demanding

Cloud 194
article thumbnail

Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure

CTOvision

Bob Gourley. For the last year Passive Total has been providing open analysis on an interesting piece of adversary infrastructure and in doing so are shedding informative light not just on that particular adversary activity but on how multiple sources of information can be pulled together to form a more complete picture of what is going on. For example, by understanding the relationships between datasets including open source intelligence, historical DNS records, known malicious domains, histori

article thumbnail

BMC Wants A Greater Share Of The Digital Economy

Forrester IT

Last week I attended BMC's Engage event , an analyst forum in Vegas, as a guest of BMC. Like every other technology vendor, BMC would like a greater share of the emerging digital economy. With more and more businesses moving to the public cloud, I have no doubt in my mind that the on-prem data center market will diminish quickly over the coming years.

Agile 241
article thumbnail

Can EdgeConneX Disrupt Incumbent Data Center Providers?

Data Center Knowledge

The edge data center provider is more than just another niche player and is already a much larger enterprise than probably most investors realize. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ING Bank datacentre fire suppression system test knocks banking services offline

Computer Weekly

Bank apologises after planned test of datacentre fire suppression system knocks out servers and storage, leaving Romanian customers unable to access funds

Banking 202
article thumbnail

Innovative Thinking Is Hurting Security; We Need Disruptive Ideas

CTOvision

Junaid Islam. Security professionals by their nature are risk averse. Thus it’s no surprise that the security industry is defined by incremental innovation. Start with something that works and make it better. Unfortunately "innovative security" strategy is leading to an increase in cyber security failures. Increased spending and increased cyber failures now characterize the security industry.

Security 235
article thumbnail

Top Reasons The OpenText Acquisition Of EMC’s ECD Will End Up As A Positive For Customers

Forrester IT

EMC purchased Documentum in 2003 for $1.7 billion, a very high price tag at the time, and did not grow the core business. Today, the Enterprise Content Division (ECD) business unit consists of Documentum, next-generation content platform Project Horizon, and the archiving solution EMC InfoArchive. Core Documentum products include the Documentum platform, xCP and D2, midmarket ECM solution ApplicationXtender, Captiva, and Document Sciences xPression; additional products include Kazeon, MyDocument

Dell 235
article thumbnail

The Data Center Industry Has a Problem: Too Many Men

Data Center Knowledge

Of all sectors, the data center sector should be particularly interested in broadening its labor pool. Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Alleged hacker Lauri Love can be extradited to the US, court rules

Computer Weekly

Westminster Magistrates’ Court has ruled that alleged hacker, Lauri Love, can be extradited to the US, where he could face a 99-year prison sentence

201
201
article thumbnail

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Research Team. With this post we are initializing our coverage of Solarflare. Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. We are tracking Solarflare in our Disruptive IT Directory in two categories. They are a top player in infrastructure including the critically important Data Center so we track them in our Leading Infrastructure Companies category.

article thumbnail

The Old Axiom "No One Gets Fired For Buying [X]" Should Be Laid To Rest

Forrester IT

I just hung up the phone and can't stop shaking my head. This was the second call this week from an organization looking for a workaround to deal with the shortcomings of a networking component. Taking inquiries and trying to help clients solve challenges is a common element of my job. This can be tough when it isn't an engineering issue but a religious one -- like this one.

Network 204
article thumbnail

ViaWest: How Cloud Computing Alters Data Center Design

Data Center Knowledge

Provider's chief data center officer says colocation has to be more flexible with capacity in the cloud age. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Violin pins hopes on FSP 7650 and 7450 all-flash arrays

Computer Weekly

Troubled all-flash pioneer Violin Memory launches two new all-flash arrays, the FSP 7650 for extreme high performance and 7450 for general workloads at 60c per gigabyte

189
189
article thumbnail

Cloud Communications Alliance and Cyber Threats in the Cloud

CTOvision

Bob Gourley. The Cloud Communications Alliance is an industry peer association dedicated to fostering the growth of cloud communications. They promote awareness, adoption and understanding of cloud communications services and their benefits. In doing so they are enabling and nurturing a key element of cloud disruption and are adding value to billions of people in doing so.

Cloud 231
article thumbnail

Forrester's Top Emerging Technologies To Watch: 2017-2021

Forrester IT

Read more.

article thumbnail

At Data Center World, Colos Covet the Enterprise

Data Center Knowledge

While they haven’t had much trouble selling to tech companies, many of the more traditional enterprises are harder to convince for colocation providers. Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Aberdeen City Council begins Swan network roll-out

Computer Weekly

Aberdeen City Council has begun work on a regional fibre network to enhance digital services under the auspices of the Capita-run Scottish Wide Area Network framework

Network 188
article thumbnail

TechNet Augusta 2016: Defensive Cyber

CTOvision

ChrisScott. This is the sixth in our series of posts on US Army systems and mission needs based on the AFCEA Augusta Technet. The US Army must ensure they have the ability to maneuver in cyberspace. There were considerable discussions on defensive and offensive cyber operations and how they will occur in a conflict. Defensive cyber includes passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centr

Licensing 227
article thumbnail

Understanding the difference between Low Code, Citizen Development, and Sales Bull

Social, Agile and Transformation

I started with low code development environments over a decade ago. We were a ~10 year "startup" with multiple businesses and limited technology resources to support them all sufficiently. One of our emerging business required some automation to enable an internal and customer facing workflow. They were an early form of an ad network essentially selling banner ads to US national advertisers.

article thumbnail

Internet of Things Starts With Hot Dogs for Deutsche Telekom

Data Center Knowledge

The German telco is trying to seize the Internet of Things opportunity in industries like construction and health care, hooking machines to the web so they can work more efficiently. Read More.

Internet 167
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

UK SMEs have false sense of cyber security

Computer Weekly

Many small businesses have the mistaken impression that they are safe from cyber attacks and the huge damage they can cause

article thumbnail

SAMOS – How To Evaluate Disruptive Innovation

CTOvision

Nathaniel Crocker. Samos is an island in the eastern Aegean Sea, where Pythagoras is thought to have been born in 569 B.C. SAMOS © is also my acronym for Simple– Automatic – Modular – Organic —Synchronous. For thirty years, it has been the guiding principle that helps me determine if a new technology is truly innovative and could disrupt the market place, or just a waste of my time.

How To 224
article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

article thumbnail

ASHRAE’s New Data Center Efficiency Standard is Out: Here’s What You Need to Know

Data Center Knowledge

As expected, the standard does not use PUE to measure energy efficiency Read More.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.