Sat.Aug 20, 2016 - Fri.Aug 26, 2016

article thumbnail

How To Solve The Digital Dilemma

Forrester IT

From the start of my research into the changes surrounding emerging digital technologies in 2013 (see " The Future Of Business Is Digital "), I've been struck by the differences between those companies that apply digital technology as a bolt-on (frequently adding an eCommerce site, social media, or customer mobile apps) and those that take a more holistic approach to transforming the way the company uses technology to deliver better customer outcomes and drive revenue.

How To 234
article thumbnail

RiskIQ Accelerates Momentum Across Entire External Threat Management Solution Set in First Half of 2016

CTOvision

Bob Gourley. Editor's note: We saw this news about RiskIQ and had to share. What the press release does not capture well enough is that RiskIQ is the only firm we have seen that can provide network defenders with true insights into how adversaries are using infrastructure to attack. They are like the SIEM of the Internet and all mobile devices. Love that the use case below mentioned Facebook, which means RiskIQ is really protecting all of us already.

Firewall 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Apple patches triple iOS security threat

Computer Weekly

Businesses and consumers are being urged to update their versions of Apple's iOS to fix three critical, zero-day vulnerabilities that enable attackers to spy on victims

Apple 154
article thumbnail

Data Center Connectivity: How to Use WAN for Competitive Advantage

Data Center Knowledge

In today's digital market, organizations are trying to find ways to create more competitive advantages. Here's how WAN can help your organization's cloud, IT, and data center strategies. Read More.

WAN 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

On-Premise Hadoop Just Got Easier With These 8 Hadoop-Optimized Systems

Forrester IT

Enterprises agree that speedy deployment of big data Hadoop platforms has been critical to their success, especially as use cases expand and proliferate. However, deploying Hadoop systems is often difficult, especially when supporting complex workloads and dealing with hundreds of terabytes or petabytes of data. Architects need a considerable amount of time and effort to install, tune, and optimize Hadoop.

System 223
article thumbnail

Two Constructs From Biology To Consider Regarding Enterprise IT

CTOvision

Bob Gourley. Two constructs from biology to think about regarding enterprise tech: The Cambrian Explosion and a Malthusian Problem. The Cambrian Explosion is was a period of rapid evolution and an explosion of life. The Cambrian Explosion began around 542 million years ago. Every living plant or animal today can trace its roots to the startups that began then.

More Trending

article thumbnail

Ascending Tech Dominates S&P 500 Like No Time Since Dot-Com Bust

Data Center Knowledge

While the divergence between banks and tech rings warning bells for anyone who lived through the crash of 2000, tech’s ascent has its virtues Read More.

Banking 138
article thumbnail

Big Data, Big Growth, Big Promises

Forrester IT

In the age of the customer , insights-driven businesses use big data solutions to gain business insights, create differentiated customer experiences, and drive competitive advantage. In our recently published Big Data Management Solutions Forecast, 2016 To 2021 ( Global ) , we take a more in-depth look at the software solutions to manage big data. Big data management solutions address data sets that are so large and complex that traditional data processing applications are inadequate.

Big Data 195
article thumbnail

Tracking The Megatrend of Robotics

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of Robotics. Operating along a spectrum of human controlled to semi-autonomous to totally independent, robots are already operating in our world.

Trends 155
article thumbnail

Singapore models entire country in 3D with smart map

Computer Weekly

Singapore authorities are creating 3D maps of the entire country to help organisations in the public and private sector make better planning decisions.

3D 152
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

HIPAA Breach Case Results in Record $5.5M Penalty

Data Center Knowledge

Growing financial penalties highlight the risks to providers of managed IT services who handle sensitive data for health care clients Read More.

Financial 137
article thumbnail

The Demand For Industry-Specific CRM Explodes

Forrester IT

Horizontal CRM solutions -- as mature as they are (and they have been around for 20+ years) -- don't always do a good job at supporting industry-specific business processes. Consider these examples: CRM users in manufacturing need capabilities to track projects, schedules, time sheets, labor efficiencies, and equipment inventory in addition to core CRM attributes.

Industry 183
article thumbnail

DataRobot: Automating to enable better predictive models and predictions quicker

CTOvision

Research Team. We first ran into DataRobot a year ago as word of this stealthy startup and their highly capable team began to circulate in the community. Over the past year they have revealed much more about their offerings and approach, enough to grab our attention. We are initiating coverage of DataRobot and will be tracking them on our list of Artificial Intelligence and Big Data companies.

article thumbnail

UK organisations still not taking ransomware seriously

Computer Weekly

Security experts say UK organisations are not taking ransomware attacks seriously enough, after two studies reveal that tens of UK universities and NHS Trusts have been attacked

Study 138
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Peak 10 and GI Find Winning Formula in Secondary Data Center Markets

Data Center Knowledge

After a period of growth via acquisition, provider doubles down on its 10 markets with diverse portfolio of high-touch services Read More.

article thumbnail

Strategies Beyond "In House" to Address Digital Transformation

Social, Agile and Transformation

This recent EY study on the Digital Deal Economy caught my attention. The survey of 600 non-tech corporate executives shows that 74% believe that digital transformation has either substantial or transformative impact on business operations, 66% on customer relationships and 59% on vendors and supply chain. The implications is that there are still a sizable number of executives that still "don't.

Strategy 122
article thumbnail

Tracking The Megatrend of the Internet of Things

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the Internet of Things. Today's Internet connects people, governments, academia and business.

Internet 154
article thumbnail

Mixed reaction to Anderson review of bulk surveillance powers

Computer Weekly

While the Anderson review’s recommendation of a technical advisory panel has been welcomed, human rights groups say the opportunity to move to more targeted surveillance has been missed

Groups 138
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Financial Networking Company Prepares for ‘Post-Quantum’ World

Data Center Knowledge

Two firms partner on security products they say will resist hacking even by a quantum computer Read More.

Financial 153
article thumbnail

Ransomware: The smart person's guide

Tech Republic Security

This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

System 123
article thumbnail

Access Governance: Managing the who and what of data access rights in a timely fashion

CTOvision

Dean Wiech. Over the past decade, many organizations have, or at least attempted to, implement access governance (AG) applications within their organizations. During a recent presentation to a group of 70 IT managers, one individual mentioned he actually had attempted three separate times to get a system operational. Troubling as this may sound, it’s not always uncommon, but it doesn’t have to be.

Fashion 154
article thumbnail

European law enforcement seeking smart ways to fight cyber crime

Computer Weekly

Cyber crime continues to increase in volume and sophistication, but European law enforcement is fighting back, using collaboration and industry partnerships to compensate for a lack of resources

Resources 134
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

China’s Kingsoft Aims to Take on Alibaba in Cloud Computing

Data Center Knowledge

Expecting cloud to take off in China, Kingsoft CEO Zhang wants to prevent Alibaba from becoming a cloud monopoly Read More.

Cloud 140
article thumbnail

Cisco well positioned to dominate cybersecurity market

Network World

The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.

article thumbnail

Bayshore Networks: Cloud- and on-premises-based IoT cybersecurity technology for industrial enterprises

CTOvision

Research Team. With this post we are initiating coverage of Bayshore Networks in our IoT Companies category. The company’s policy-based Information Technology/Operational Technology (IT/OT) Gateway, an alternative to next-generation firewalls in some settings, inspects and filters industrial data for customers in fields such as manufacturing, connected cars and smart cities.

Industry 153
article thumbnail

Apple iPhones plagued by device failure and crashing apps, report claims

Computer Weekly

A report on mobile device performance produced by Blancco Technology Group says the performance of Apple iPhones is flagging compared with Android-based devices

Apple 138
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

China’s $100 Billion Chip Supremacy Bid Deemed Unrealistic

Data Center Knowledge

Faces uphill battle because of a lack of technological know-how and talent, according to an analysis by Bain & Co Read More.

Analysis 136
article thumbnail

Stolen iPhones could eventually capture photo and fingerprint of thieves

Tech Republic Security

Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.

Apple 88
article thumbnail

IDVector Emerges from Stealth with Privacy Focused Secure Public Internet Access Offering

CTOvision

Bob Gourley. Thursday August 24, 2016 - Business Wire. WASHINGTON-- IDVector , a secure Internet access provider, today emerged from stealth mode with a simple and unobtrusive way to safely and securely access the Internet without fear of data interception or data leaks. With IDVector, every connection you make online is secured from unauthorized observation, whether tethering to your phone, using the mobile app, or the nearest free Wi-Fi hotspot.

Internet 151
article thumbnail

Samsung Pay used for 100 million transactions

Computer Weekly

Samsung reports that its mobile payments app, which will soon be available in the UK, has transacted 100 million payments in its first year of availability

Mobile 138
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.