Sat.Feb 11, 2017 - Fri.Feb 17, 2017

article thumbnail

Get ready for Business Intelligence market next wave of M&A

Forrester IT

Business intelligence (BI) is a runaway locomotive that keeps picking up speed in terms of enterprise interest, adoption, and spending levels. The result: Forrester now tracks 73(!) vendors in the segment. Their architectures and user interfaces vary, but they support similar use cases. Forrester started the original research with fewer than 30 vendors in 2014 and ended up with 73 in the current 2017 update.

article thumbnail

Major DDoS attacks see huge increase, says Akamai

Computer Weekly

Akamai’s State of the Internet/Security Report for the fourth quarter of 2016 finds that distributed denial of service attacks larger than 100Gbps are rapidly increasing as more IoT devices are compromised

Internet 224
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why “Data Ownership” Matters

CTOvision

Dennis D. McDonald. Ownership rules. In Understanding data ownership in the data lake Elizabeth Koumpan, Executive Architect at IBM, writes: Depending on the organizational point of view, different ownership rules may apply in different situations to data. It is a tricky part when we deal with Data ownership while using external sources, especially if we use social data which is an essential element, as we build our cases for front office digitization, customer sensitive analysis and so on.

Data 182
article thumbnail

Mother Nature Attacks! Is Your Disaster Recovery Plan Ready?

Data Center Knowledge

There’s no point in investing in a backup and disaster recovery solution that only offers slow and partial recovery – in today’s competitive world, users and customers will hold delays and lost functionality against you. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

This Valentine’s Day, Pause and Appreciate Flower Logistics.

Forrester IT

Over the past few days, Boston has been slammed by multiple snow storms. This causes challenges for my pending flight to San Jose, but another deadline looms: some roses might not be able to make it to Boston on time for Valentine's Day. Only someone deeply concerned with Supply Chain and Logistics worries about delivery time on Valentine's Day.

Study 359
article thumbnail

Intel: Enterprise trust in public cloud is on the rise, but skill shortages hinder adoption

Computer Weekly

The 2017 Intel cloud security report suggests enterprise attitudes to public cloud are softening, but a shortage of skilled security workers is holding back adoption

Intel 222

More Trending

article thumbnail

5 VoIP Features That Increase Customer Satisfaction

IT Toolbox

Success in business is heavily reliant on providing great customer service. Even the slightest edge over your competitors in this regard can be the key to growth and continuing success.

VOIP 172
article thumbnail

Futurology Episode 4: The Future of The Connected Workplace

Forrester IT

This post was authored by Claudia Tajima, Researcher at Forrester. On the second part of the forth episode of our Futurology webinar series, Mike Facemire , Julie Ask and James McQuivey convened to discuss the future of the connected workplace. Looking forward, they discussed what change in the workplace will look like and what it will take to get there.

Research 288
article thumbnail

End complacency and help address cyber crime threat, NCA tells business

Computer Weekly

The NCA is calling on UK businesses to take the threat of cyber crime seriously and work with law enforcement and government to help turn the tables on cyber criminals

article thumbnail

Update On The Megatrend of the Internet of Things

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity. In this post we dive deeper into the Internet of Things. Today's Internet connects people, governments, academia and business.

Internet 171
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Will the Submarine Cable Boom Drive More Revenue to Colos?

Data Center Knowledge

The way undersea cable capacity is priced and sold could accelerate enterprise adoption of multi-cloud IT architecture. Read More.

article thumbnail

Will The RSA Conference 2017 Make You A Better Security Pro?

Forrester IT

Today kicks off what's always an exciting week for the infosec industry; in between meeting old and new friend at the RSA Conference, we'll hopefully hear about practical new ideas, technologies, and opportunities for better managing information risk. Coincidentally, I'm proud to announce a new report highlighting the best tactics CISOs and security leaders are using to elevate their game: How To Become A Superstar Security Leader.

article thumbnail

High Court rules for SAP, against Diageo in indirect licensing case

Computer Weekly

Judge rejects Diageo’s submission that SAP PI is a “gatekeeper” licence for gaining access to the SAP suite of applications and database

SAP 225
article thumbnail

Does AI Make Self-Driving Cars Less Safe?

CTOvision

Jeremy Sutter. Recently, most industries are facing a significant change due to the improvement in technology. The automotive sector is one of the industries that are defined by the normal technological development. Various automotive companies have been working to release self-driving vehicles. The self-driving vehicles use the machine learning technology to substitute the human driver.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Preparing for Cloud and Big Data with Converged Infrastructure

Data Center Knowledge

Sponsored by: Dell and Intel Today, data centers are evolving at a staggering pace. Organizations are spending more of their budgets to support growing business initiatives. Gartner recently said that this would be a defining year for cloud as private cloud begins to give way to hybrid.

Big Data 166
article thumbnail

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Network World

Today’s cautionary tale comes from Verizon’s sneak peek ( pdf ) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network. Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified.

Network 131
article thumbnail

Anti-millennial recruitment stance will widen cyber security skills gap, experts warn

Computer Weekly

Latest Global Information Security Workforce Study suggests infosec experts remain in short supply, and UK PLC’s reluctance to hire millennials means things are unlikely to improve

Security 189
article thumbnail

Make Your IT Department More than a M.A.S.H Unit

CTOvision

Dean Wiech. There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, most of us know -- mundane, repeated and wearisome tasks that can, or probably should, be automated. Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organizations overlook doing so in the name of convenience (inconvenience for

Survey 154
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Fake Data Scientists Could Hurt Your Business

Data Center Knowledge

The demand for immediate business intelligence and actionable analytics is encouraging many people to adopt the title of data scientist. However, there is a missing link. Read More.

Data 157
article thumbnail

Frame Relay Physical Layer Options and Frame Formats

IT Toolbox

In addition to these guidelines, the UNI IA acknowledges that other interfaces, such as ISDN, may be used as appropriate. For example, MCI currently offers frame relay as a switched digital service at 56/64 Kpbs, and also as a fractional T1 service, Nx56 or Nx64 Kpbs.

article thumbnail

RSAC17: Infosec pros must help create business-driven security, says RSA CTO

Computer Weekly

The inability to draw connections between security details and business metrics is one of the biggest challenges facing most companies, according to RSA CTO Zulfikar Ramzan

CTO 190
article thumbnail

Presenting Tech To Decision Makers: Be Bold, Be Brief, Be Gone….

CTOvision

Nathaniel Crocker. The KISS principle is the essence of good communication – Keep It Simple, Stupid! This admonishment always refers to the presenter. Encapsulate the essence of your idea into a clear and simple message. Simple is all about intent. Don’t sacrifice your core message, just lose the extraneous details. Why is simple so important? Tom Kolditz of West Point explains: “No plan survives contact with the enemy.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Switch Launches Its First Enormous Reno Data Center

Data Center Knowledge

Tahoe Reno 1 is 1.3M square feet large and supports up to 130 MW of power Read More.

article thumbnail

6 Tips for Creating a Unified Communications Policy

IT Toolbox

Today’s unified communications (UC) solutions are available in many forms and can be comprehensive and integrated across corporations, with many cross-functional business processes. In smaller companies, they can be simple, without any integration with anything.

article thumbnail

RSAC17: Former MI5 head calls on infosec community to make world safer

Computer Weekly

In a digital era, the information security community has a key role in helping to make the world a safer place, according to former MI5 boss Stella Rimington

article thumbnail

Bob Flores and Bob Gourley of Cognitio at 2017 RSA Conference

CTOvision

Bob Gourley. The 2017 RSA conference will be held February 13 - 17, 2017 at the Moscone Center in San Francisco. This is the largest gathering of security professionals and vendors in the security ecosystem. Over 30,000 attendees are expected. As providers of strategic advisory services to government and industry, Cognitio's Bob Flores and Bob Gourley will be at the event seeking the latest information on approaches that work against dynamic threats.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to Get a Data Center Job at Google

Data Center Knowledge

Expertise is important, but it’s not your biggest strength Read More.

article thumbnail

IBM uses Watson to fill cybersecurity gaps

Tech Republic Security

IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.

IBM 165
article thumbnail

Deloitte readies enterprise public cloud practice with AWS and SAP

Computer Weekly

A 2,500-strong consulting practice will focus on delivering SAP Hana on Amazon Web Services for analytics to drive digital business

SAP 216
article thumbnail

It's all a matter of timing - SAP Accruals & Deferrals

IT Toolbox

With the option in an S/4HANA system to move to a continuous accounting basis, it becomes even easier for businesses to abandon the idea of batching and move to the continuous flow of posting that actually can alleviate some of the period end pressure that accounting groups often suffer from.

SAP 126
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.