Sat.Oct 29, 2016 - Fri.Nov 04, 2016

article thumbnail

Artificial Intelligence: Fact, Fiction. How Enterprises Can Crush It

Forrester IT

Forrester surveyed business and technology professionals and found that 58% of them are researching AI, but only 12% are using AI systems. This gap reflects growing interest in AI, but little actual use at this time. We expect enterprise interest in, and use of, AI to increase as software vendors roll out AI platforms and build AI capabilities into applications.

article thumbnail

Cognitio’s Bob Flores, Ex-CIA CTO, Featured in IDG TechWorld Providing Context On the Cyber Threat

CTOvision

Bob Gourley. Cognitio's Bob Flores, former CTO of the CIA, was just featured in IDG TechWorld providing context on the state of the cyber threat. From the article: The former CTO of America's Central Intelligence Agency , Bob Flores, has said the gravest cyber security threat facing the world is the lack of protection for critical infrastructure and the internet of things – and that it's worth challenging narratives about attacks from nation states that get repeated without criticism.

CTO 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Equinix VP: New Power Models Make Open Source Necessary

Data Center Knowledge

Changes to the way newer, highly scalable servers consume power made it necessary for the world’s leading colo provider to change the way networks connect to those servers, says Equinix’ chief scientist. Read More.

article thumbnail

Cyber security image putting women and girls off, says panel

Computer Weekly

There is still a lot of work to be done to change the perception of cyber security and corporate culture to attract more women to the profession, according to a panel of security professionals

Security 216
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Forrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017

Forrester IT

I'm pleased to announce that Forrester's cloud computing predictions for 2017 published this morning! Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 -- and what you should do about them today. Cloud computing has been the most exciting and disruptive force in the tech market in the last decade, and it will continue to disrupt traditional computing

Industry 310
article thumbnail

CTOvision Named To BizTech’s List Of Top 30 Must-Read Blogs For the Small to Mid-sized Business

CTOvision

Bob Gourley. We are pleased to report that CTOvision has been named to BizTech's list of the top 30 "Must-Read" blogs for small to mid-sized businesses, ranking as number 2 of 30. The small to mid-sized market includes all firms under 2000 people in size, which is 90% of the businesses in the U.S. We believe in the small to mid-sized business (SMB) and know the leadership team of firms in this criticaly important segment are frequently not able to spend as much time and energy on topics of data

SMB 260

More Trending

article thumbnail

Cern to track job applicants ‘at the speed of light’

Computer Weekly

The nuclear research laboratory in Geneva, famous for tracking sub-atomic particles, is developing a cloud service to track of thousands of people who apply for jobs each year

article thumbnail

2017 Predictions: Big Data, Digital, and Virtual Care Key to Engage Healthcare’s Empowered Consumer

Forrester IT

The healthcare industry is changing rapidly as its consumers begin to demand more of the organizations from whom they receive care and insurance. Not only are healthcare consumers sharing more financial risk for the insurance and care they receive, but they are increasingly purchasing insurance outside of group contracts via exchanges or Medicare and Medicaid programs.

Big Data 307
article thumbnail

What Big Data is Doing for Shipping on a Global Scale

CTOvision

Brigg Patten. While the shipping industry moves along daily without much consideration from the general public, the truth is that it is the lifeline of the global economy. If shipping were to be interrupted for any significant period of time, it would literally devastate the global economy. The quality and performance of shipping companies are driven by a highly competitive market.

Big Data 258
article thumbnail

Equinix Begins Trials of Facebook’s White Box Transponders

Data Center Knowledge

The first tests of a promising new technology in the U.S. based on Facebook’s open source switches, gets under way with the colocation leader in charge. In a sign of how far the Open Compute Project’s communications offshoot, the Telecom Infra Project (TIP), has evolved since its formation just.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Scotland, the perfect home for digital nomads?

Computer Weekly

Scotland needs public and private sector support for entrepreneurs, and ubiquitous superfast broadband if its digital economy is to thrive, says MSP Jamie Greene

211
211
article thumbnail

Forrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017

Forrester IT

I'm pleased to announce that Forrester's cloud computing predictions for 2017 published this morning! Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 -- and what you should do about them today. Cloud computing has been the most exciting and disruptive force in the tech market in the last decade, and it will continue to disrupt traditional computing

Industry 298
article thumbnail

Nation-Blanking DDoS Attacks Launched By Individuals Now Proven Able To Take Entire Nation’s Off The Net

CTOvision

Bob Gourley. We live in times of extreme technological hooliganism, where small groups or even individuals can cause asymmetric damage from a distance. This was proven several times over the last few months, most famously in the 21 October attacks against Dyn that impacted many of Dyn's clients, including Amazon, Twitter, Reddit, Airbnb, New York times, Spotfiy, Netflix and many others sites.

.Net 252
article thumbnail

Not Really a Bro-mance: Broadcom Wanted Brocade’s FC Storage

Data Center Knowledge

When Brocade Communications completed its acquisition of municipal Wi-Fi provider Ruckus Wireless last May, it informed investors that the deal would create a new kind of pure-play networking company. That seemed to be what the networking technology market wanted… up until this morning, when.

Storage 201
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lancaster University hails potential of AI software to cut datacentre power consumption

Computer Weekly

Lancaster University reveals details of its work to create an AI-based, self-assembling software system that could improve the efficiency of datacentres

Software 215
article thumbnail

Blockchain And IoT: Not Ready For Primetime, But Now’s The Time To Start

Forrester IT

Few would disagree that for IoT to live up to its promises, devices will sooner or later need to communicate directly, autonomously and securely with each other. Well-architected blockchain-based systems can help deliver those requirements, but they're not available or even feasible today. In many ways, that's a good thing, because it opens up great opportunities to get things right.

Security 293
article thumbnail

Hyper-segmentation – How to Avoid Cyber Disasters

CTOvision

Nathaniel Crocker. There is a new kind of disaster that is currently striking all our agencies—cyber disaster. Unlike natural disasters, man-made disasters are avoidable. Like other man-made disasters, we need to find a way to prevent cyber disasters. While people often think of security as just the tools used to protect the network, it’s not about that any more.

How To 247
article thumbnail

CenturyLink to Buy Level 3 for $34 Billion in Cash, Stock

Data Center Knowledge

CenturyLink Inc. agreed to buy Level 3 Communications Inc. for about $34 billion in cash and stock, creating a more formidable competitor to AT&T Inc. in the market to handle heavy internet traffic for businesses. Read More.

Internet 186
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Microsoft debuts Project Olympus to boost open source datacentre hardware development

Computer Weekly

Microsoft wants to give open source datacentre hardware developers earlier access to its designs to speed up the time it takes to bring new products to market with Project Olympus

article thumbnail

Grading Forrester’s 2016 Cybersecurity Predictions Plus A Sneak Peek Into Our 2017 Predictions

Forrester IT

Every fall Forrester's Security & Risk team comes together to make a set of predictions on the issues that will have the greatest impact on our clients in the next year. We don't make broad, Nostradamus-like predictions like "There will be a breach at a large company in a great city." Instead, we go out of our way to make detailed predictions that force us to take strong stances, can easily prove wrong or right and are actionable by security and risk professionals.

Security 290
article thumbnail

Got Data? 5 Ways to Collect and Drive More Valuable Data

CTOvision

Rick Delgado. By now, most businesses understand that future success will be largely dependent on their ability to use big data. Much of the focus surrounding big data tends to drift in the direction of analysis. After all, it’s through analysis that companies and other organizations can discover hidden insights, leading to changes that can help them be more successful down the road.

Data 242
article thumbnail

CenturyLink Sells Its Colo Business to Fund Level 3 Deal

Data Center Knowledge

In a move that was anticipated before, during, and after its $34 billion acquisition deal for Level 3 Communications announced earlier this week, CenturyLink — America’s third-largest phone service provider — now says it is selling its colocation business, which includes some 57 data centers in.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

UK government re-announces £1.9bn cyber security spend

Computer Weekly

Five-year spending increase - announced by Chancellor Philip Hammond 12 months after George Osborne did so - will support new UK cyber security strategy

Security 209
article thumbnail

Meet The Digital Architects Of Your Technology Strategy

Forrester IT

When Jeffrey Hammond , Mark Grannan , and I dove into our most recent developer survey, we unearthed a fascinating group of developers we call "digital architects." This group aspires to set architectural direction, deploys open source software across four or more technology areas, and uses three or more types of cloud services (see the figure).

Meeting 288
article thumbnail

We Need A National Cybersecurity Strategy That Everyone Can Implement

CTOvision

Junaid Islam. In a few months we’ll have a new Administration in Washington and a chance to update our national security policies. So it’s good time to reflect on what we might want to do differently for cybersecurity. A quick search on the Internet will reveal many national cybersecurity initiatives. However given the recent data theft of DNC emails and DDoS attack on Dyn it’s evident that current initiatives aren’t working.

Strategy 239
article thumbnail

Top 10 Data Center Stories of the Month: October

Data Center Knowledge

To help you stay up to date on the latest in the data center industry, here are the 10 top data center stories of October from Data Center Knowledge. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Self-sovereign identity on the block – ideal or no deal?

Computer Weekly

There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so?

196
196
article thumbnail

The 2016 Forrester Data Privacy Heatmap Points To Continued EU Influence On Global Regulations

Forrester IT

To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and practices for 54 different countries. Earlier today, we published the 2016 version to the tool , as well as a free version with limited access. To keep pace with the constantly-evolving landscape of global data privacy laws, we have updated the map every year since it's initial publication in 2012.

Data 286
article thumbnail

American Industry Benefiting From Government Cybersecurity Executive Transitions

CTOvision

Bob Gourley. One of the bright spots in the cybersecurity community is the corporate awakening to the need for highly competent executive level talent. Businesses in every sector of the economy and of all sizes are realizing that effective cyber risk mitigation is not just a matter of buying new technologies or turning on a firewall. Mitigating risks while enabling business requires executive talent that can understand and empower business objectives but take systematic, cross-organizational act

article thumbnail

How To Reduce Data and Network Latency Where Others Fail

Data Center Knowledge

Ideally, data centers and disaster recovery sites should be placed at a longer distance from each other than is traditionally practiced to literally insure your data from the impact of any man-made or natural disaster. Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.