Sat.Dec 24, 2016 - Fri.Dec 30, 2016

article thumbnail

Do More With Less: Predictive Analytics For I&O

Forrester IT

Moore's Law was bound to catch up with us. Loosely applied, it says that technology grows more complex every year. Human brains do not. People can't keep up with monitoring, debugging, and managing today's technology. Users' rising expectations make it even worse: they want features and fixes in minutes, not days or weeks. Technology has gotten away from us.

Resources 302
article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense

CTOvision

Marty Meehan. Historically, the public sector has focused on a narrow set of cyber threats. Espionage and insider threat were among the primary focus areas given limited public-facing services and air-gapped infrastructure. However, as recent high-profile breaches have illustrated, the infrastructure at federal agencies today is far more integrated than ever before, and transparency initiatives have increased the amount of public-facing data and services.

Security 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

IBM and Credit Mutuel Arkea beat banking legacy with blockchain

Computer Weekly

French bank explains what working with IBM on blockchain ledger technology means for customer identification

IBM 222
article thumbnail

What 2016’s Top Data Center Stories Say About the Industry

Data Center Knowledge

Here’s how some of the macro-level industry trends are playing themselves out in the market Read More.

Industry 217
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Open Source APM Gains Momentum

Forrester IT

Operations teams value stability. Uptime is golden. So it's no surprise that operations teams buy finished, complete, documented, supported tools from vendors they can hold accountable. Ops people already have their hands full dealing with complex apps, infrastructure, and users - they don't need to be hassling with flaky do-it-yourself tools. Even so, most operations teams still wind up with a mixture of tools from multiple vendors plus home-built integrations and scripts.

article thumbnail

Addressing HIPAA Compliance in the Healthcare Cloud

CTOvision

Rick Delgado. The growth of cloud technology has certainly been felt in the healthcare space, as large amounts of medical records are now being moved to the cloud. The technology makes it more convenient and cost effective for healthcare providers to share information, but it also brings concerns regarding privacy and legal considerations, particularly where HIPAA is concerned.

More Trending

article thumbnail

Here are the Top Data Center Stories of 2016

Data Center Knowledge

These are the 10 most widely read and shared stories we covered on Data Center Knowledge this year. Read More.

article thumbnail

IDG Contributor Network: Will networks and security converge in 2017?

Network World

Bold predictions are in order at this time of year. Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017: Security shall networking become. What did that really mean? Our Yoda translator was of no help.

Network 132
article thumbnail

How to install malware detection and antivirus on CentOS 7

Tech Republic Security

If you serve up files with a Linux machine, you should watch for malicious code. Follow this tutorial on how to add Linux Malware Detector and ClamAV for this very purpose.

Malware 125
article thumbnail

Top 10 desktop, tablet, smartphone and mobile device stories of 2016

Computer Weekly

2016 was the year Microsoft pushed out a major Windows update, Linux celebrated its 25th anniversary and female personae took over AI

Linux 175
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GI Partners Buys Seattle’s KOMO Plaza, Including Data Center Hub

Data Center Knowledge

Former Fisher Plaza houses data center providers, carriers, broadcast stations Read More.

article thumbnail

What is Your 2017 Business Strategy?

Cloud Musings

Photo credit: Shutterstock End of year predictions in December are as predictable as tomorrow’s sunrise, but a recent video on 2017 Technology Trends helped me really understand how important a digital transformation strategy is to just about any business executive. The CSC Town Hall conversation actually identified some of the specific tasks that today’s corporate executive really need to address in the coming year.

Strategy 101
article thumbnail

Can deterrence counter the threat of cyberweapons?

Tech Republic Security

A professor from the Naval Postgraduate School suggests that deterrence is cybersecurity's next phase.

154
154
article thumbnail

Top 10 retail IT stories in 2016

Computer Weekly

Computer Weekly looks over how the shifting consumer landscape has changed the retail industry during 2016, with increased collaboration, growing consumer power, and mergers and acquisitions

Retail 141
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

San Francisco Software Startup AppDynamics Files for US IPO

Data Center Knowledge

(Bloomberg) — AppDynamics Inc., which develops software for businesses to monitor applications, filed for an initial public offering. The San Francisco-based company filed with an initial offering amount of $100 million, a placeholder used to calculate fees that will probably change. Morgan.

Software 113
article thumbnail

Using big data for security only provides insight, not protection

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Cybersecurity experts are excited about big data because it is the “crime scene investigator” of data science. If your organization is hacked and customer information compromised, your use of big data to collect massive amounts of information on your systems, users and customers makes it possible for data analysts to provide insig

Big Data 104
article thumbnail

How to install the Ansible server management system on Ubuntu

Tech Republic Data Center

If you're looking for a cost-effective centralized server management system, find out how to get the open source Ansible up and running. It's a must have for large data centers.

System 102
article thumbnail

Top 10 HR technology stories of 2016

Computer Weekly

Here is a rundown of Computer Weekly's most popular stories on HR technology in 2016

193
193
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Have You Been a Naughty or Nice Data Center Manager?

Data Center Knowledge

Are you naughty and keeping company with one of the 10 million zombie servers, which, by one estimate, consume energy equivalent to eight large power plants worldwide? Read More.

article thumbnail

4 information security threats that will dominate 2017

Network World

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. "2016 certainly lived up to expectations," says Steve Durbin, managing director of the ISF.

article thumbnail

How to populate an LDAP server with users and groups via phpLDAPadmin

Tech Republic Data Center

If you're unsure how to add groups and users to LDAP, learn how simple the process is with the help of phpLDAPadmin.

Groups 123
article thumbnail

UKtech50: Andrew Turner, CIO, Crossrail

Computer Weekly

In this video from Computer Weekly's 2016 UKtech50 event, Andrew Turner, CIO, Crossrail talks about the three year project to build Crossrail and shares his five tips for good leadership.

Video 123
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Brexit Hits Home as U.K. Government Grapples With Microsoft Hike

Data Center Knowledge

Government facing bigger cloud services bill due to post-Brexit pound slump Read More.

article thumbnail

How to add a cloud-based document app on Nextcloud

Tech Republic Cloud

If you want to add document editing capabilities to your Nextcloud server, learn how to do so with the help of the Documents app.

How To 114
article thumbnail

Corporate boards aren't prepared for cyberattacks

ComputerWorld IT Management

Major cyberattacks against organizations of all sizes seem to happen almost weekly. On Dec. 14, Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts. Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks.

Tools 102
article thumbnail

UKtech50: Graeme Hackland, IT director, Williams F1

Computer Weekly

In this video from Computer Weekly's 2016 UKtech50 event, Graeme Hackland, IT director, Williams F1 shares his five tips for good leadership.

Video 127
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Are Oregon’s Data Center Tax Breaks Worth It? State Doesn’t Know

Data Center Knowledge

State audit finds economic development agency is doing poor job at tracking outcomes of incentive programs Read More.

article thumbnail

5 signs we're finally getting our act together on security

Network World

The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next. For example, ransomware has surged in the last year. Although that kind of malware has been around for years, the current model of encrypting user files to hold data hostage came about just recently.

article thumbnail

pCloud: As good as a cloud sync service gets

Tech Republic Cloud

The pCloud service is the best cloud sync you've never heard of, according to Jack Wallen. See what pCloud offers on the desktop and mobile.

Cloud 100
article thumbnail

UKtech50: Giles Pavey, former chief data scientist, Dunnhumby

Computer Weekly

In this video from Computer Weekly's 2016 UKtech50 event, Giles Pavey, former chief data scientist, Dunnhumby, talks about the importance of big data in firms and shares his five tips for innovation

Data 109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.