Tue.May 09, 2017

article thumbnail

Why You Are Getting Disrupted

Forrester IT

The overriding theme of every disruption story I've ever heard is that firms thought they had more time than they did. So, I've been pondering the why. We can see disruption happening all around us, but why is it so difficult to get out in front of it? Then I slogged my way through Ray Kurzweil's Law Of Accelerating Returns and it hit me. Digital disruption is about the clash between exponential change and our brain's wanting things to be linear.

article thumbnail

Cognitive security is the future, says Martin Kuppinger

Computer Weekly

Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger

Security 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Consumerism is Becoming a Top Priority Among CIOs

CTOvision

Rick Delgado. Within the healthcare industry, CIOs have begun to turn towards consumerism for its technological implications and its innovating change in the healthcare industry. By treating patients less like clients and more like consumers, healthcare organizations can increase engagement between medical providers and the patient-consumer. CIOs have recognized that the patients of today are vastly more resourceful than before with sources like WedMD.

article thumbnail

OpenStack Foundation hails second coming of private cloud

Computer Weekly

Enterprises have come to view private cloud as a “toxic” phrase, but new ways and means of building deployments is changing that, according to the OpenStack Foundation and its stakeholders

Cloud 142
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Marty Meehan. Delivers 1000s Virtual NICs for Ultimate Scalability with the Lowest Possible Latency. Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment.

Software 151
article thumbnail

Aruba Atmosphere: Machine learning to transform networking

Computer Weekly

At Aruba Atmosphere EMEA in France, delegates learned how the network will incorporate machine learning features in the near future

Network 150

More Trending

article thumbnail

Nexsan Unity goes all-flash but leaves NVMe on the back-burner

Computer Weekly

Nexsan Unity arrays already have SAN, NAS and file sync and share, and now add all-flash and policy-based archiving, but there’s no NVMe on the roadmap for now

Policies 130
article thumbnail

Enterprise Architecture has to go down to the level of detail stakeholders need

IT Toolbox

Martin Owen, Vice President of Product Management at ERwin, posts on LinkedIn that. " Enterprise Architecture is arguably one of those jobs that isn't ever finished. But I'd argue that over analysis is just as damaging to a business as the opposite.

article thumbnail

New Owners Pushing Vertiv to “Act Like a Startup”

Data Center Knowledge

Unshackled from the quarterly results pressure, Emerson’s former data center business charts a new course. Read More.

article thumbnail

Blockchain gains momentum in the Middle East

Computer Weekly

Blockchain is gathering pace in the Middle East, with the United Arab Emirates leading the way

155
155
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cisco, NetApp Invest in Business Cloud Backup Startup Datos IO

Data Center Knowledge

Company claims its tech simplifies backup across clouds and on-prem data centers Read More.

Backup 160
article thumbnail

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms

Tech Republic Security

It's a shocking discovery that could shake your concept of security to its core: Those trusted to protect your networks are ignoring their own policies. Is something rotten in the state of cybersec?

Study 127
article thumbnail

OpenStack Foundation slams claims open source cloud platform's days are numbered

Computer Weekly

OpenStack Foundation executive director Jonathan Bryce dismisses predictions around the impending demise of OpenStack

article thumbnail

Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits

Tech Republic Security

Two members of Google's Project Zero discovered a serious exploit over the weekend. It's so bad it can take over a system just by sending an email-no opening or reading necessary.

System 119
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Brexit yet to dampen fintech recruitment in London

Computer Weekly

Fintechs are still recruiting in London as large banks start to make plans to move staff to EU countries

Banking 139
article thumbnail

Vertical Market Collaboration Scenarios - Healthcare

IT Toolbox

So far, this series has laid a foundation for understanding how vertical applications can be a way for UC vendors to differentiate, but also for business decision-makers to achieve richer results with collaboration.

article thumbnail

Make Sure Your Data Center Backup Power is Hurricane-Ready

Data Center Knowledge

The start of hurricane season is around the corner and it’s important that your facility is prepared should one make landfall near your location. Read More.

article thumbnail

Feds award $6 million VoIP/contact center contract

IT Toolbox

The General Services Administration (GSA) has picked CenturyLink to provide a hosted contact center and VoIP to the Federal Acquisition Service (FAS). The contract is valued at $1.3 million for the first year with four one-year options, for a total value of more than $6 million.

VOIP 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

7 critical lessons businesses learn when implementing DevOps

Tech Republic Data Center

At a breakout session during the 2017 Dell EMC World conference on Tuesday, company leaders outlined key takeaways for businesses pursuing DevOps.

Devops 129
article thumbnail

DIY Home Center recasts scattered ERP "hairball" into cohesive system

IT Toolbox

Thirteen years ago, when software-as-a-service was in its infancy, online retailer DIY Home Center was just getting started. With few options to choose from, its IT staff did the best they could to build front-end and back-end systems that would get the company rolling.

System 100
article thumbnail

Large UK businesses increasingly want CEOs to have IT background

Computer Weekly

More large businesses in the UK want a CEO that has a good understanding of IT

150
150
article thumbnail

Call center fraud rising 113% per year

IT Toolbox

There has been a sharp increase in the amount of call center fraud year-over-year, according to data collected by researchers at Pindrop Labs in Atlanta: They measured fraud rates of 1 in 937 calls in 2016, compared to 1 in 2000 calls in 2015, an effective rise of 113%.

Research 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Dell: Put Off by Cloud Costs, Many Clients Resume Buying Data Center Gear

Data Center Knowledge

"It's not small numbers; it's large numbers." Read More.

Dell 168
article thumbnail

WHY A PEOPLESOFT SELECTIVE ADOPTION STRATEGY IS A MUST

IT Toolbox

Selective Adoption is the new methodology that came along with PeopleSoft 9.2 and the PeopleSoft Update Manager, also known as PUM, allows you to selectively apply PeopleSoft fixes and new features when you want them.

Strategy 100
article thumbnail

Highly skilled professionals at risk of being replaced by computers

Computer Weekly

Highly skilled jobs will be replaced by artificial intelligence by 2022, says Gartner

article thumbnail

How to install Ubuntu Server with a full LAMP stack

Tech Republic Data Center

Jack Wallen walks you through the steps for installing the Ubuntu Server platform, with a full LAMP stack, in under fifteen minutes.

How To 124
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hotel booking site Trivago powers collaboration with Dropbox

Computer Weekly

A Slack group and a workshop day helped Trivago deploy Dropbox for Business to 1300 users

Hotels 136
article thumbnail

Cloud security startup RedLock automates public-cloud protection

Network World

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of that activity for auditing and forensics. +More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed + RedLock.

Cloud 102
article thumbnail

Stratasys announces new scalable, automated, cloud-controlled 3D demonstrator

Tech Republic Cloud

Stratasys' latest innovation is designed to continuously produce parts with minimal human interaction, making larger runs, prototyping, and lowering costs easier than ever before.

3D 92
article thumbnail

New IoT malware targets 100,000 IP cameras via known flaw

Network World

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said on Tuesday. The malware does so by exploiting flaws in the cameras that a security researcher reported back in March.

Malware 83
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.