Sat.Sep 16, 2017 - Fri.Sep 22, 2017

article thumbnail

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […].

article thumbnail

How to make the right technology choice

Computer Weekly

Organisations need digital technology, but how do you decide which is the best technology for you? The answer is not to make one big decision, but many small ones.

How To 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seven Ways ERP Can Improve Risk Mitigation

IT Toolbox

Business is no friend of risk. While fortunes are won and new markets are conquered through calculated risk, firms nonetheless try to avoid it whenever possible. Risk represents lost revenue, disrupted partnerships, idle equipment, brand damage and a host of other effects that aren’t typically advantageous to corporations.

216
216
article thumbnail

Is It Time For CIOs To Start To Apply Logic To Salaries?

The Accidental Successful CIO

Should CIOs get involved in determining how much employees get paid? Image Credit: 401(K) 2012. Psst – would you like to know a secret? It turns out that at most companies, how much any given employee gets paid is determined more by art than science. Yes, that’s right – most firms (and their IT departments) are making this stuff up on the fly.

Survey 147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Want to Learn Big Data? These Courses Can Help

CTOvision

One of the best things about the explosion of different kinds of technology across the world, is the fact that many tech-related courses can be easily accessed. Whether you are looking to build your knowledge about big data or build a skill that could help you in your job, there are lots of ways to […].

Big Data 242
article thumbnail

Ireland mulls datacentre planning review to help others avoid Apple-like build delays

Computer Weekly

Speaking at the inaugural Datacloud Ireland event, Irish state minister Patrick Breen outlined the government’s commitment to helping other datacentre operators avoid the planning problems Apple has encountered in Athenry

Apple 227

More Trending

article thumbnail

Data Quality – The most important data dimension?

Eric D. Brown

In a recent article I wrote over on CIO.com titled Want to Speed Up Your Digital Transformation Initiatives? Take a Look at Your Data , I discuss the importance of data quality and data management in an organization’s digital transformation efforts. That article can be summarized with the closing paragraph (but feel free to go read the full version): To speed up your transformation projects and initiatives, you need to take a long, hard look at your data.

Data 147
article thumbnail

Time For A Fourth Law of Robotics

CTOvision

Science fiction fans recognize Asimov’s prescient thoughts on robot programming, captured in his three laws of robotics. In Asimov’s sci-fi world, robots were all programmed to protect their humans (the first law), to obey their humans (the second law) and to protect themselves (the third law). These laws laid the foundation for many fantastic, futuristic […].

article thumbnail

ScotRail to test ‘world’s fastest’ in-train Wi-Fi service

Computer Weekly

The train operator has teamed up with Cisco, Network Rail Telecoms and others to collaborate on an Innovate UK funded proof of concept for ultrafast Wi-Fi on board

Training 232
article thumbnail

VoIP for a Connected Business

IT Toolbox

Voice over internet protocol (VoIP) has come a long way. Today, this technology allows companies to connect their communication's systems and integrate their computing systems as well, for seamless transactions.

VOIP 174
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network.

Network 149
article thumbnail

Cyber at the Crossroads: A one day symposium on the critical cyber events of 1997 and 1998 that shaped our response to cyber war

CTOvision

There are many challenges in cybersecurity. Most challenges are due to adversaries that continue to innovate and create new means of breaking into systems. But other challenges come from leaders who do not learn the lessons from history. We have called that problem cyber threat amnesia, the observed tendency of any organization to forget the […].

System 169
article thumbnail

Enterprise SDN adoption rapidly approaching tipping point, claims report

Computer Weekly

A study commissioned by networking solutions supplier Riverbed claims that legacy networks are causing problems for businesses trying to undergo digital transformation, and more decision makers are considering SDN as a result

article thumbnail

3 Features LinkedIn Just Added to Help Your Sales Team

IT Toolbox

Top business social network site LinkedIn took a huge leap earlier this year into the customer relationship management (CRM) market with the announcement of its Sales Navigator service. Sales Navigator has multiple features designed to help salespeople use LinkedIn as a social selling platform to boost leads.

Social 150
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Aruba rolls out security fabric designed for IoT and the digital era

Network World

Aruba, a Hewlett Packard Enterprise Company, is best known for its outstanding business-grade Wi-Fi products. What’s less well known about Aruba is that it has always had excellent security products. In fact, I’ve often described the company as a security vendor dressed up as a Wi-Fi vendor, as Aruba and security have gone hand in hand like the New England Patriots and winning.

Security 110
article thumbnail

Last Chance To Register For The Data Event Of The Year: StrataData NYC 25-28 Sep 2017

CTOvision

The yearly Strata Data conference (formerly known as Hadoop World) will be 25-28 Sep 2017. This is the place to be to network with peers, learn lessons from others in the field, and track the status of the greatest technological solutions in the Big Data field. Topics include: AI, Big data & the Cloud, Data […].

Big Data 155
article thumbnail

The Sanger Institute on using datacentre upgrades to help decode the human genome

Computer Weekly

Paul Woobey, IT director at the Wellcome Trust Sanger Institute, tells Computer Weekly why the organisation's HPC workload requirements cannot be fulfilled by a move to the cloud

Cloud 207
article thumbnail

Is It the End of Internet Startups? Or Should We Simply Rethink Our Strategies

IT Toolbox

I don't know about you, but I was one of the guys who grew up viewing Silicon Valley as tech Eden and holding those couple of guys starting companies from their lowly garage or dorm room, only to become tech giants and taking over the world.

Internet 150
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

5 Ways to Secure Wi-Fi Networks

Network World

Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time in learning about and applying enhanced security measures can go a long way toward better protecting your network.

Network 108
article thumbnail

Four Common Password Practices You Might Want To Reconsider

CTOvision

Every few years, the National Institute of Standards and Technology revises its Digital Identity Guidelines, which include password best practices. The revisions are greeted with consternation by some because the guidance can run counter to long-cherished beliefs about what constitutes a good password and a good authentication system. NIST takes into consideration both the theoretical […].

article thumbnail

More than one million new phishing sites created each month

Computer Weekly

Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot

Research 257
article thumbnail

6 Reasons to Choose Microsoft Dynamics 365 for Your ERP Solution

IT Toolbox

Companies invest time, effort, and money in being unique and standing out from their competition. No two companies are the same, so cookie solutions aren’t always the best choice for highlighting a company’s uniqueness. Similarly, if a “recommended” solution is difficult to integrate or configure, the solution could cause more problems in the end.

Microsoft 149
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft launches data security technology for Windows Server, Azure

Network World

Data is at its greatest risk of being compromised when it is being used, when moving from a secure database around the servers or apps in memory. So, Microsoft is launching a new technology for Windows Server and Azure that protects the data while it’s being processed. Microsoft claims the service, called Azure confidential computing, makes it the first public cloud provider to offer encryption of data while in use.

article thumbnail

RFUN: The Recorded Future Annual Threat Intelligence Conference Oct 4-5 2017

CTOvision

The 6th Annual Recorded Future Threat Intelligence Conference will be held 4-5 Oct at the Newseum in Washington DC. This event should be of interest to any threat intelligence professional, specially those in the disciplines of cyber threat intelligence and business risk. From their info site: Recorded Future customers, partners, and threat intelligence experts will […].

article thumbnail

Cyber security demands change in approach

Computer Weekly

There needs to be a change in the way technology is designed and in attitudes to data security to ensure cyber safety, say industry experts

Security 235
article thumbnail

As a database choice, SAP HANA doesn't feature

IT Toolbox

Working with an integration drive provider it was interesting to see taht their analysis with a third party had SAP HANA as a no show in the top ten

SAP 164
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Retrieving all Files off of the SpaceMonkey, Now the Vivint Smart Drive

Mick's IT Blog

I purchased the SpaceMonkey back when it first came out. It has been a so-so NAS device that also backed up to the cloud. Vivint bought them out and I ran into real problems when the HDD had failed on the device and the cloud backup was lost during the transition to Vivint. Luckily, I overnighted it to them and they were able to retrieve all contents and back it up to the Vivint drive.

Backup 82
article thumbnail

4 data-driven ways to digitize your business

Dataconomy

In today’s digital landscape, customers expect you to deliver products and services in a fast and efficient manner. Heavyweights like Amazon and Google have set a bar in terms of operations, and they’ve set it high. An increasing need for more streamlined and efficient processes, combined with advancing technologies has. The post 4 data-driven ways to digitize your business appeared first on Dataconomy.

Data 78
article thumbnail

Why AI success depends on IT picking the low-hanging fruit

Computer Weekly

General-purpose artificial intelligence is probably a long way off, but the rapid rate of innovation means off-the-shelf AI can kick-start many projects

article thumbnail

Why Enterprise Architecture is not delivering today

IT Toolbox

The moment we start searching for an Enterprise Architecture (EA)example we begin realising that something is fishy. There is hardly any. Yet, the media abounds in stories about the experiences we had in working towards achieving EA. Some claim success without ever showing an outcome as proof. Trust me they say, but the rest is confidential.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.