2017

article thumbnail

How Artificial Intelligence is Making Big Data Better Than Ever

CTOvision

The concept of Big Data is a relatively new one. It denotes the availability of vast volumes and sources of data, which were not available before. By itself, Big Data is powerful, and when combined with Artificial Intelligence and machine learning, the opportunities presented by this combination are just endless. As big data moves to the […].

article thumbnail

The impacts on storage and compliance from Blockchain, robots and IoT

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2017 on the impact on storage and compliance of biometric security, Blockchain, and robots in internet of things deployments

Storage 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 Things Every CIO Must Know about Their Data Centers

Data Center Knowledge

While data centers aren’t necessarily something CIOs think about on a daily basis, there are some essential things every executive in this role must know about their organization’s data center operations. Read More.

article thumbnail

9 best practices to improve security in industrial IoT

Tech Republic Security

Dell EMC's senior product manager for IoT security, Rohan Kotian, hosted a presentation at Dell EMC World explaining how industrial enterprises can protect their IoT deployments.

Industry 167
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SCCM Intune Architecture Decision Making Tips and Sample Diagram

Anoop

High level (generalized) design decisions are discussed in this post. Most common design decision I have seen is discussed in the below paragraph. I must warn that this design decision won’t suit all scenarios. In this post, we will see SCCM Intune architecture decision making tips and sample diagram. The design decisions will be based […].

article thumbnail

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Network World

Today’s cautionary tale comes from Verizon’s sneak peek ( pdf ) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network. Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified.

Network 131

More Trending

article thumbnail

Why machine learning and data analysis are critical to Google's success in the cloud

Tech Republic Cloud

At the 2017 Google Cloud Next conference, machine learning efforts took center stage in the first keynote address, highlighting Google's work with data as a core asset.

Google 167
article thumbnail

As-Salaam-Alaikum: The cloud arrives in the Middle East!

All Things Distributed

Today, I am excited to announce plans for Amazon Web Services (AWS) to bring an infrastructure Region to the Middle East! This move is another milestone in our global expansion and mission to bring flexible, scalable, and secure cloud computing infrastructure to organizations around the world. Based in Bahrain, this will be the first Region for AWS in the Middle East.

Cloud 154
article thumbnail

5 big data trends that will shape AI in 2017

Tech Republic Big Data

AI and machine learning are dependent on large amounts of data. But big data is hard to organize and analyze. Here's what experts are looking out for in the coming year, when it comes to data.

Big Data 111
article thumbnail

5 big challenges facing CIOs and IT leaders in 2018

mrc's Cup of Joe Blog

Summary: As business technology goes through a fundamental shift, the role of the CIO is changing. In the coming years, CIOs will face new challenges and take on new roles. The most successful CIOs are those that recognize and adapt to these changes. In this article, we explore 5 such challenges that CIOs must face in the near future. photo credit: OpenClipartVectors via pixabay cc Driven largely by digitization, new technologies, and rapidly increasing data volumes, modern CIOs face a growing s

Agile 97
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Machine Learning & Data Analysts: Seizing the Opportunity in 2018

Dataconomy

Undoubtedly, 2017 has been yet another hype year for machine learning (ML) and artificial intelligence (AI). As ML and AI become increasingly ubiquitous in many industries, so does the proof that advanced analytics significantly improve day-to-day operations and drive more revenue for businesses. Yes, it’s true – enterprises worldwide have. The post Machine Learning & Data Analysts: Seizing the Opportunity in 2018 appeared first on Dataconomy.

article thumbnail

Citizen Love: the story of an ordinary family's fight with the US government

Computer Weekly

Finnish documentary makers Raimo Uunila and Lauri Danska tell the behind-the-scenes story of activist Lauri Love’s battle with the US government – and the impact of the case on his family

article thumbnail

Here are the 10 Largest Data Center Providers in the World

Data Center Knowledge

Bigger is better when it comes to success in data center services, and here’s who the biggest players are Read More.

article thumbnail

Women in cybersecurity: IBM wants to send you to a hacker conference for free

Tech Republic Security

A new IBM scholarship will cover 100% of the entry fees for any woman interested in attending EC-Council's Hacker Halted conference. Here's how to take advantage of the offer.

IBM 166
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CM Update Reset Tool Fixes SCCM CB Update Download Issue

Anoop

Have you faced SCCM CB update getting stuck in the “Downloading” state? I have seen SCCM CB updates are getting stuck in downloading stage. But, in most of the scenarios, a service restart resolves this issue. In this post, we will see “CM Update Reset Tool Fixes SCCM CB Update Download Issue.” Video Tutorial to […]. The post CM Update Reset Tool Fixes SCCM CB Update Download Issue appeared first on Anoops.

Tools 163
article thumbnail

Cops use pacemaker data to charge homeowner with arson, insurance fraud

Network World

If you are dependent upon an embedded medical device, should the device that helps keep you alive also be allowed to incriminate you in a crime? After all, the Fifth Amendment of the U.S. Constitution protects a person from being forced to incriminate themselves. Nonetheless, that’s what happened after a house fire in Middletown, Ohio. WCPO Cincinnati caught video of the actual fire , as well delivered news that the owner’s cat died in the fire.

Insurance 131
article thumbnail

How Seattle wants to avoid becoming a 'dumb smart city'

Tech Republic Data Center

Putting the right tech in place, and doing it the right way, is the key for Seattle's smart city goals. TechRepublic talked to Seattle's CIO to find out more about the city's plans.

125
125
article thumbnail

Amazon Lambda: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers Amazon Lambda, an on-demand serverless computing service. Learn how Amazon Lambda complements other AWS services, and how your business can use it.

158
158
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CIOs Start To Become More Important

The Accidental Successful CIO

Companies are starting to realize the value of their CIOs Image Credit: las – initially. The importance of a CIO can be measured in a number of different ways. One such way is how often the CEO seeks out the CIO for consultation. In the not so distant past, this is something that would happen rarely. Generally, this would only happen if something had gone wrong such as a service outage or a security breech.

Budget 249
article thumbnail

Big data privacy is a bigger issue than you think

Tech Republic Big Data

When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.

Big Data 111
article thumbnail

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses.

article thumbnail

The Macedonian surveillance scandal that brought down a government

Computer Weekly

Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

UK intelligence agencies ‘unlawfully’ sharing sensitive personal data, court hears

Computer Weekly

Intelligence agencies are “unlawfully” sharing huge datasets containing sensitive information about the population with industry, government departments and overseas intelligence services, a court will hear this week

article thumbnail

Europe faces shortage of 350,000 cyber security professionals by 2022

Computer Weekly

European companies are expected to go on the world’s biggest cyber security hiring spree in the next 12 months, driving demand for cyber talent that will far outstrip supply, a report has revealed

Security 266
article thumbnail

Data breach costs exceed 20% of revenue

Computer Weekly

The cost of data breaches topped 20% of revenue in the past year as cyber attacks became more sophisticated and defenders struggled to keep pace, the latest Cisco security report shows

Data 209
article thumbnail

GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

Research 259
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Why smart cities need to become smarter about technology

Computer Weekly

Cities are experimenting with smarter ways to use technologies to improve the life of citizens, but their projects are fragmented. Is there a better approach?

273
273
article thumbnail

Most influential women in UK tech: The 2017 longlist

Computer Weekly

Every year, Computer Weekly asks the technology industry to nominate who it thinks are the most influential women in UK tech – here is the 2017 longlist

Industry 277
article thumbnail

Facebook vows to upskill 10,000 women in 2017

Computer Weekly

Social media giant Facebook has partnered with Enterprise Nation to provide digital skills training to more than 10,000 women by the end of 2017

Training 214
article thumbnail

Finnish government scraps paper and digitises archives

Computer Weekly

The government in Finland is digitising 94 shelf kilometres of documents to save millions of euros and make the information easier to access

article thumbnail

GEP Outlook Report 2024

Procurement and supply chain leaders have faced their share of disruption and economic turmoil these past four years. Whether from geopolitical tensions or the havoc caused by the pandemic and its aftershocks, plenty of challenges remain. Despite this, leaders are seeing a glimmer of light at the end of the tunnel — inflation is decreasing, interest rates are leveling off and supply chain volatility is easing.