Sat.Feb 18, 2017 - Fri.Feb 24, 2017

article thumbnail

DevOps, No Longer Just For “Unicorns”

Forrester IT

The born-digital "unicorn" companies such as Etsy, Google and Netflix, are pioneers of modern DevOps, but BT leaders at companies of all ages, sizes, and types are now eagerly pursuing the same principles. [i] The pressure for speed and quality is DevOps becoming pivotal for all organizations. For example, KeyBank are leveraging DevOps to quickly deliver business new customer capability using streamlined coordination between application development and operations.

Devops 416
article thumbnail

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially. Cybersecurity experts predict that the security threats will only increase as cyber criminals become more sophisticated in their attacks.

Data 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Yahoo takes $350m cut on deal with Verizon after security breaches

Computer Weekly

Ending months of speculation, Verizon has announced a revised deal for acquiring Yahoo’s core business that is $350m less than the original due to revelations of two major data breaches

Security 253
article thumbnail

 Artificial Intelligence and the Evolution of Data Centers

Data Center Knowledge

Using AI, Google was able to reduce its total data center power consumption by 15 percent, which will save the company hundreds of millions of dollars over the next several years. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What Exactly The Heck Are Prescriptive Analytics?

Forrester IT

Prescriptive analytics is about using data and analytics to improve decisions and therefore the effectiveness of actions. Isn't that what all analytics should be about? A hearty "yes" to that because, if analytics does not lead to more informed decisions and more effective actions, then why do it at all? Many wrongly and incompletely define prescriptive analytics as the what comes after predictive analytics.

Airlines 397
article thumbnail

Cyber Security Skills Businesses Will Look For in 2017

CTOvision

Rick Delgado. The coming year brings new opportunities for businesses to grow and develop with the latest data tools, but with this advancement comes a series of risks and downfalls. Cyber security is a more pressing issue than ever, with hackers and cyber terrorists advancing all the time. That’s why 2017 calls for experts with the most-needed set of skills, to ensure businesses can continue driving towards success without being taken down by a breach.

Security 229

More Trending

article thumbnail

Five Keys for Easier ERP Deployments

IT Toolbox

Don’t panic. That might be the famous advice from the Douglas Adams series, The Hitchhiker’s Guide to the Galaxy , but it also is words of wisdom for those entrusted with deploying a new ERP system for their business.

System 195
article thumbnail

The 2017 Enterprise Architecture Awards: Driving The Customer-obsessed Digital Business

Forrester IT

Just about every company Forrester works with tells us they are driving to become Digital Businesses. But not just 'digital' as a technology imperative - they are investing in digital to dramatically change how they serve their customers - with target benefits rippling over to customer retention and acquisition. We call this focus Customer-obsessed Digital Business.

article thumbnail

Generative Adversary Networks: A very exciting development in Artificial Intelligence

CTOvision

Bob Gourley. For years there has been a growing concern that many forms of machine learning are actually easier to deceive than they should be (and there is good reason to be concerned, for background on why see the paper recommended to me by my friend Lewis Shepherd: " Deep Neural Networks are Easily Fooled "). Many of us have also raised concerns about the current security frameworks around Artificial Intelligence (there are none!

article thumbnail

At IBM’s Watson lab, customers marry the power of AI with the IoT

Computer Weekly

IBM formally inaugurated its Watson Internet of Things headquarters in Munich, Germany in February, and Computer Weekly went to meet the customers and partners who are using Watson AI to deliver on the promise of the IoT

IBM 227
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

4 Tips for Securing Your VoIP Environment

IT Toolbox

Voice over IP (VoIP) can be a major boon to businesses. It’s cost-effective, provides flexibility for growth, and offers a variety of helpful features that boost productivity.

VOIP 186
article thumbnail

Did Move 37 Signal The Impending Death Of The Financial Services Industry As We Know It?

Forrester IT

A couple of years ago I wrote a post predicting a new business paradigm for financial services. You may have read this post and been skeptical. Maybe you thought it wasn't realistic. If so, you may be wishing you were paying more attention very soon. Read on. This week I spoke on "The Experience Economy" at a client conference where attendees were primarily from the financial services industry.

Financial 265
article thumbnail

Protecting Your (and your workforces’s) Personal Information at Home

CTOvision

Bob Gourley. A trend we have noticed in engagements across multiple sectors of the economy is an absolute thirst for information on best practices for protecting information at home. Every employee of every company, from the most senior executive to most junior intern, is now leveraging advanced interconnected technologies in amazing new ways at home.

Trends 216
article thumbnail

Banking malware, DDoS, ransomware and CEO fraud top UK cyber threats

Computer Weekly

Businesses need to be aware of the value of their data, how that data is likely to be attacked, and how to defend against particular attacks, says leading UK cyber cop

Malware 224
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Five ways to align digital transformation with data-driven practices

Social, Agile and Transformation

Let's examine a couple of ways you can align two transformation programs to achieve complementary and reinforcing results. Your digital transformation program has a number of initiatives that enable new markets, develop new products, and should be targeting an overall improvement in customer experiences. You may have a separate program aimed at enabling the data driven organization that.

Data 186
article thumbnail

Consolidations in Data Governance Tooling Are Emphasizing DG importance for future Data Usages

Forrester IT

While data governance has been a business need for years, it is becoming more visible as a center stage business concern. Driving this shift are new regulations and new requirements addressing consumer data ownership, privacy and business interest data monetization. Two of the most important regulations are GDPR (European General Data Protection Regulation), and BCBS 239 (Basel Committee on Banking Supervision regulation 239).

article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Crystal Lister. This article increases awareness for organizations seeking to enhance their digital risk posture against the increasing threat of ransomware (a type of malware) deployed by threat actors to prevent or limit users from accessing their system until a ransom is paid. Ransomware is increasingly targeting multiple industries with downtime and lost productivity as its attack surface expands beyond the virtual realm to the physical via the Internet of Things (IoT), however, organization

article thumbnail

Global public cloud spend to soar by 25% this year, says IDC

Computer Weekly

Market watcher’s latest public cloud market forecast highlights growing demand for off-premise services across the globe

Cloud 258
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Multi-Cloud Won’t Work Without Replication; How Do We Get There?

Data Center Knowledge

As organizations move to multiple public clouds, they in turn will need a way to synchronize data seamlessly across multiple providers — cross-cloud replication makes this possible. Read More.

Cloud 184
article thumbnail

Don’t Be Fooled -- DAM Is Still Relevant

Forrester IT

If you think digital asset management solutions are a relic of the past or a graveyard of static assets then you're dead wrong. While complementary technologies like web content management, content marketing platforms, and product information management offer DAM-like capabilities, most marketers still prefer to use a dedicated DAM. But how do you determine if you need a dedicated DAM or if you can use adjacent technologies to store your rich media assets?

Media 257
article thumbnail

Thought Leaders In Direct Contact With Adversaries Provide Insights Into New Cyber Attack Techniques

CTOvision

Bob Gourley. One of the greatest things about the annual RSA Conference is the open sharing of lessons learned between cybersecurity practitioners. One of the sessions I found most rewarding and insightful focused on new cyber attack techniques. This session, moderated by the SANS Institute's Founder and Research Director Alan Paller, included insights from Ed Skoudis, Michael Assante and Johannes Ullrich.

article thumbnail

Most hackers can steal data within 24 hours, study shows

Computer Weekly

Most hackers are able to access company systems and steal valuable data within 24 hours, according to the Nuix Black Report, which aims to show which security technologies are worth investing in

Study 194
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Surge of New Capacity Expected in Top US Data Center Markets This Year

Data Center Knowledge

Brokers say speculative construction and corporate real estate assets coming to market not likely to create unfavorable conditions for providers. Read More.

article thumbnail

Five Shades Darker? – What The Diageo “Indirect Access” Judgement Really Means For SAP Customers

Forrester IT

At last, exactly two years later, the long-awaited sequel to my hit, if overly censored, blog post: Five Shades Of Grey (How software buyers and license managers should be compliant without being submissive). The trigger is the SAP vs Diageo verdict , which generated a lot of hysterical blogging and tweeting with dire predictions for SAP customers. IMO most commentators have overlooked the crucial parts of the judgment and therefore significantly overstated the case's negative implications for S

SAP 245
article thumbnail

Register With 20% Discount Code for San Jose Strata Hadoop World

CTOvision

Bob Gourley. The Feb 17-20 Strata Hadoop World in San Jose has an incredible line up of speakers and hot topics. Attending is a great way to track the latest in the community, learn (and share) lessons learned and find the most capable technologies ready for enterprise use. This is the place to dive deep into the latest on Big Data, Analytics, Artificial Intelligence, IoT, and the massive cybersecurity issues in all those topics.

Big Data 152
article thumbnail

Why Azure developers need security skills

Computer Weekly

The unprecedented adoption of Microsoft Azure is a huge opportunity for developers, but they must keep their security skills updated

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Five AI Initiatives that Improve ERP

IT Toolbox

This marriage has been a long time in coming, but finally we’re here. Enterprise resource planning has always been about managing a large set of variables and using the data for better forecasting, resource allocation and efficiencies. The problem with ERP has been complexity and fully utilizing the data, however.

article thumbnail

Scifi Version Of AI Is Not Available Yet

Forrester IT

Spark Summit East came to Boston this year and I was there to enjoy it including being interviewed by Dave Vallente and George Gilbert about Apache Spark and AI on The Cube. We talk about the waning of the term "Big Data" , but get quickly into the future of AI and Apache Spark. Read more.

Big Data 219
article thumbnail

We’re Live! Now What? The Importance of Good Functional Management

CTOvision

Nancy Louisnord. Launching a new application is always a celebration for the project team, but the success of the application is partly determined after the implementation. During this follow-up, the role of the functional manager is an important one -- but how do you take on this role? Having visited a lot of organizations as their consultant, here’s some experiences learned: Whether you achieve your goal is equally determined by the tool’s set-up and the implementation’s follow-up.

article thumbnail

Microsoft issues critical patches but not for zero days

Computer Weekly

After missing the monthly security update for 14 February, Microsoft has issued some patches but not for zero-day vulnerabilities despite the availability of exploit code

Microsoft 179
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.