Fri.Jun 16, 2017

article thumbnail

10 ways to prevent breaches and minimise impact

Computer Weekly

Attackers are continually adapting to security technologies to fly under the radar, but taking action in 10 key areas can reduce the risk of breaches and minimise their impact, according to a resilience expert

Security 206
article thumbnail

BMW’s Connected-Car Data Platform to Run in IBM’s Cloud

Data Center Knowledge

The CarData platform is meant to feed vehicle data to third-party service providers Read More.

Data 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Amsterdam targets tech talent

Computer Weekly

Dutch capital is working hard to become Europe’s tech startup capital, but startups need skilled engineers and the country has a general shortage of tech talent

article thumbnail

AI isn't yet what it could be

IT Toolbox

Artificial Intelligence has long been promised as a great promise of benefit to the human race. Whether you're talking about Isaac Asimov's R. Daneel Olivaw as the almost human robot or Stanley Kubrick’s HAL in 2001: A Space Odyssey, artificial intelligence has been a hallmark of science fiction (right up there with faster than light travel).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

North Korean Lazarus botnet linked to WannaCry attack

Computer Weekly

US-Cert puts out an alert on DeltaCharlie, a distributed denial of service tool from North Korean hacker group Lazarus

Groups 189
article thumbnail

Have Your Scale, and Object Too

Data Center Knowledge

A metadata engine enables enterprises to deploy a more powerful scale-out file system that can seamlessly integrate with on-premises object or public cloud storage. Read More.

Storage 119

More Trending

article thumbnail

Learning from Millennials about Collaboration - Flexible Choices

IT Toolbox

I began this series by briefly comparing digital natives and immigrants, along with how their differences present challenges for effective collaboration. Every business will have a distinct generational mix, and that in turn will determine the extent of these challenges.

113
113
article thumbnail

Russia’s startups and corporations hook up at Startup Village

Computer Weekly

Annual IT event Startup Village in Russia saw blockchain take centre stage and support from the country’s government

article thumbnail

Wait Times for Customers

IT Toolbox

Customers hate to wait. Long times on the phone or waiting for a response on the internet is a top complaint and becomes a major reason for customers abandoning you – perhaps for good. It’s important to minimize the amount of time the customer spends waiting for a response. This is true both of the initial contact and during the conversation.

Internet 112
article thumbnail

Microsoft used AI to combat global tech support scams

Tech Republic Security

As part of a federal crackdown on tech support scams, Microsoft's Digital Crimes Unit relied on artificial intelligence to help track and take down the criminals behind them.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gartner: Amazon Isn’t Only E-Commerce Giant with Cloud Prowess

Data Center Knowledge

Alibaba Cloud has emerged as one to watch on Gartner's Magic Quadrant Read More.

Cloud 157
article thumbnail

The Current State of TV Streaming - What Can We Expect in the Future

IT Toolbox

For example, an increasing number of people is consuming YouTube content primarily, and sometimes watching TV.

Examples 113
article thumbnail

What IT Pros Need to Know About Multi-Cloud Security

Data Center Knowledge

Securing the ‘Wild West’ takes a new approach, experts say Read More.

Security 150
article thumbnail

Three fined £1.9m over emergency communications failure

Computer Weekly

Telecoms regulator Ofcom has hit mobile operator Three with a £1.

Mobile 141
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

GCS 2017 panel: Are we spending cybersecurity dollars in the right places?

Tech Republic Security

A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine, considers whether the billions of dollars being spent on cybersecurity technology and services have been effective, and where future spending should be directed.

98
article thumbnail

Testing your Big Data Application

IT Toolbox

Part 1: Types of Testing and their Relevance to Big Data

Big Data 124
article thumbnail

10 elements every production environment must have

Tech Republic Data Center

One company recently experienced disaster when an employee accidentally destroyed a production database. Here are 10 ways to prevent future scenarios like that.

Company 90
article thumbnail

Microsoft unveils fingerprint-scanning keyboard for privacy-conscious professionals

Tech Republic Security

Microsoft's $130 Modern Keyboard offers a fingerprint ID system and works with Windows, macOS, Android, and iOS.

Microsoft 109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Preventing Fraud and Saving Costs with Machine Learning

Dataconomy

Whilst most businesses don’t earn revenue by processing data, they do spend a large amount of their hard earned revenue in manually processing data, validating it and ultimately performing manual tasks that don’t scale. But at what point does this manual involvement become a burden of cost upon your business? The post Preventing Fraud and Saving Costs with Machine Learning appeared first on Dataconomy.

Data 73
article thumbnail

GCS 2017 panel: What does the future of IoT look like?

Tech Republic Security

An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discusses what devices might be connected in the future, and what the implications might be for consumers, governments, and industries.

article thumbnail

Survey: What insights does your company get from big data?

Tech Republic Big Data

Take this short, multiple choice survey and tell us about your experience with big data solutions.

article thumbnail

CIOs as Chief Innovation Officer: How to Deal with Those Innovation Paradoxes

Future of CIO

Either dealing with innovation dilemmas or handling innovation paradoxes, it is part of innovation management learning curve. From conventional wisdom, innovation is the serendipity. In the majority of companies, innovations management has a very low success rate. But innovation does not just accidentally happen, it can be managed in a more systematic way.

How To 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.