Sat.Nov 18, 2017 - Fri.Nov 24, 2017

article thumbnail

How Artificial Intelligence is Making Big Data Better Than Ever

CTOvision

The concept of Big Data is a relatively new one. It denotes the availability of vast volumes and sources of data, which were not available before. By itself, Big Data is powerful, and when combined with Artificial Intelligence and machine learning, the opportunities presented by this combination are just endless. As big data moves to the […].

article thumbnail

The impacts on storage and compliance from Blockchain, robots and IoT

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2017 on the impact on storage and compliance of biometric security, Blockchain, and robots in internet of things deployments

Storage 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Ways VoIP Can Increase Productivity

IT Toolbox

Businesses of all sizes and types are consistently striving to increase profits. Companies can reach this goal in a variety of ways—reduce overhead spending and waste, increase workforce efficiency—but one reliable way is to increase productivity in the workplace. One often-overlooked way to increase productivity is to use the benefits of voice over IP (VoIP) telephony.

VOIP 183
article thumbnail

Deep learning – when should it be used?

Eric D. Brown

“When should I use deep learning?” I get asked that question constantly. The answer to this question is both complicated and simplistic at the same time. The answer I usually give us something along the lines of ‘if you a lot of data and an interesting / challenging problem, then you should try out deep learning’ How a much is ‘a lot of data’?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

If You’re Still Doing These Tasks Manually, You’re Out of the Loop

CTOvision

Making changes to the way you do business can seem scary, but some new technologies could help you get work done significantly faster — particularly if you focus on automation. Below, we’ll look at several tasks you can automate to save time. 1. Ordering Office Supplies Restocking your office supplies is tedious, and if you […].

157
157
article thumbnail

GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

Research 259

More Trending

article thumbnail

5 Little-Known Benefits of ERP You May Have Missed

IT Toolbox

Enterprise resource planning (ERP) was once thought to be too complicated, too unreliable, and too expensive. However, ERP software systems are now used in businesses of all sizes, aiding business practices and procedures in every department. An ERP system offers benefits for revenue, profitability, workforce, and productivity, but there are other benefits that are just as important.

Resources 157
article thumbnail

Intune Android Work SCEP Certificate Deployment Issue

Anoop

SCEP certificate deployment for Intune managed Android for Work devices is a bit tricky. This process is similar to that of iOS. But, because of “Android for Work” containerisation, it’s bit a tricky to confirm whether the SCEP certificate is successfully delivered to the device or not. In this post, we will see more details […].

158
158
article thumbnail

Use GDPR to future-proof business models

Computer Weekly

Businesses should look beyond compliance with new data regulations to ensure that their business processes and models are in line with future requirements, advises a privacy innovation expert

Data 229
article thumbnail

State of the Go Nation – Gophercon Brasil 2017

SPF13

This talk is an overview of the entire Go project. It covers “what we’ve done”, “why we did it” and “where we are going” as a project. It highlights our accomplishments, challenges and what the Go Project is doing to address our challenges. It was delievered as the closing Keynote for Gophercon Brasil in 2017.

113
113
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

UDP: Output Processing

IT Toolbox

When an application program generates UDP output, it transfers control to the operating system and eventually calls procedure udpsend to send the UDP datagram.

article thumbnail

Video Tutorial How to Setup SCCM Azure AD User Discovery

Anoop

SCCM 1706 and later versions allowed us to discover Azure Active Directory users. Azure AD user discovery helps to deploy applications to Azure AD users. Azure AD user discovery helps to deploy apps to AAD users in a co-management scenario. Azure AD User Discovery can be configured from Administration workspace – Cloud Management. In this post, […].

Video 143
article thumbnail

IR35 reforms: Consultation on private sector roll-out confirmed in Autumn Budget 2017

Computer Weekly

The government has confirmed it is preparing to consult on whether or not to roll out the controversial IR35 tax avoidance reforms to the private sector

Budget 246
article thumbnail

Trying to Market a Horizontal Technology? Think Again.

Fountainhead

Why marketers fail to focus on industry-specific buyers I was recently speaking with 2 CEOs of leading-edge technology companies about how they go-to-market. One is a brilliant open-source software firm, the other a groundbreaking virtual networking startup. When I asked them what their industry marketing approach would be, each essentially said “I don't need that – we have a horizontal technology.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Net Neutrality: Policy or Market Forces?

IT Toolbox

it seems like the entire internet is on fire this week about the FCC, Ajit Pai. and the plans to undo the previous administration's Net Neutrality rulings. My understanding is that reddit is about to self-immolate over this issue. Just about every news source is on fire with multiple articles advocating one position or another (mostly opposition from my non-scientific survey).

.Net 145
article thumbnail

The Data Storage Explosion

Cloud Musings

Cloud computing innovation will power enterprise transformation in 2018. Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity. The business reason behind this marketplace reality is the proliferation of real-time data from the web, mobile devices, social media, sensors, log files, and transactional applications.

Storage 93
article thumbnail

MPs press Theresa May to explain why alleged hacker Lauri Love is being extradited to US

Computer Weekly

MPs question the attorney general and prime minister about why alleged hacker Lauri Love is to be extradited to the US, when at least 13 other hackers have been tried for US hacking offences in the UK

227
227
article thumbnail

Video Tutorial SCCM CB Preview 1711 Upgrade New Features

Anoop

This post and video tutorial will cover SCCM CB preview 1711 upgrade and new features. This is not a production version of SCCM CB. Hence, we are not supposed to install this version in production environments. SCCM CB 1711 is the preview version and should be installed only in a lab environment. What is the […]. The post Video Tutorial SCCM CB Preview 1711 Upgrade New Features appeared first on Anoops.

Video 84
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Consumer WLAN, Device Company PHICOMM Comes to the US

IT Toolbox

Every now and then it’s fun for a WLAN professional to venture down-tier to the consumer end of life to see what’s shaking there. In the enterprise world, big-dollar access points typically do client access and not much else (you Meraki fans stay quiet, I sense you cursing me for that statement).

Company 145
article thumbnail

Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7

Network World

The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.

Malware 69
article thumbnail

The legal quagmire of creativity in artificial intelligence

Computer Weekly

AI holds the promise to solve problems beyond the scope of human imagination. But if an AI can create, who owns its work?

article thumbnail

Understanding the value of your customer: CLV 101

Dataconomy

At some point, almost every company faces questions like How good are the customers that we acquire? How do they differ from each other? How much can we spend to encourage their first or next transaction? As a measure that determines the amount of profit a customer brings over the. The post Understanding the value of your customer: CLV 101 appeared first on Dataconomy.

Company 78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Six Security Practices to Teach Employees

IT Toolbox

Patching and regular system updates matter for strong enterprise security. So does proactive threat detection, end-to-end encryption and good planning, among many other best practices. But no matter how strong your security stance, there always is a weak link in the chain: human error.

Security 145
article thumbnail

Using Docker Machine with KVM and Libvirt

Scott Lowe

Docker Machine is, in my opinion, a useful and underrated tool. I’ve written before about using Docker Machine with various services/providers; for example, see this article on using Docker Machine with AWS , or this article on using Docker Machine with OpenStack. Docker Machine also supports local hypervisors, such as VMware Fusion or VirtualBox.

Linux 60
article thumbnail

Geospatial Commission announced in Budget to open up OS data

Computer Weekly

Chancellor of the exchequer Philip Hammond announced in his November 2017 budget a £40m Geospatial Commission to open up Ordnance Survey data to stoke new business for small companies

Budget 213
article thumbnail

Can Blockchain Supercharge the Gig Economy?

Dataconomy

Countless words have been written in recent years about the rise of the ‘gig economy’. As the natural evolution of the freelance model, the gig economy is based on short-term and temporary jobs handled by contractors and other independent workers. Instead of hiring full-time staff, freelancers offer a concise way. The post Can Blockchain Supercharge the Gig Economy?

72
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Novell Netware - A history Part 8

IT Toolbox

A standard feature of NetWare 4.x was the support for many different workstation platforms. It contains all the software necessary to install and operate the network server and to connect as many as 1,000 DOS, OS/2 UnixWare, or MS Windows workstations, depending on the configuration purchased.

Windows 145
article thumbnail

Happy Thanksgiving 2017

Scott Lowe

In the US, today (Thursday, November 23) is Thanksgiving. I’d like to take a moment to reflect on the meaning of Thanksgiving. Thanksgiving means different things to different people: To folks outside the US, it often just a day with drastically reduced email volume and no interruptions from US-based coworkers. (Enjoy!). To folks in the US, it’s a holiday filled with food (turkey, anyone?).

Course 60
article thumbnail

Public sector IT suppliers demand clarity over G-Cloud 10 launch date

Computer Weekly

G-Cloud listed IT suppliers are getting concerned that the next iteration of the framework agreement could be delayed by up to a year, and claim it could harm the public sector’s digital transformation efforts

Cloud 191
article thumbnail

5 Insights on Infrastructure Cyber Attacks

Dataconomy

To state the value of technology at this point would be a needless redundancy, but for as great a resource as the world of cyber information is, it also leaves crucial infrastructure vulnerable in a way that it has never been before. Without question this (relatively speaking) new threat is. The post 5 Insights on Infrastructure Cyber Attacks appeared first on Dataconomy.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.