Thu.Dec 19, 2019

article thumbnail

My Favourite Things (security related) Of 2019

Forrester IT

Every year in my personal life with my mother & sisters, we like to celebrate products, lessons learned and life hacks that we discovered throughout the year (yes, geek alert!). This year, I’m doing it with all of you in my professional life. What were some of your favourite (professional related) things in 2019? Feel […].

Security 360
article thumbnail

The Top Six Cloud Computing Trends of 2019

CTOvision

Read Jay Chapel list six cloud computing trends of 2019 on DevOps : Cloud computing was one of the hottest topics in technology and business media throughout 2019. This is no surprise as the cloud sector has been growing rapidly for the last few years. Synergy Research Group recently reported a 37% overall growth year-over-year […].

Trends 158
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Amid Holiday Chaos, Amazon Bars Sellers From Using FedEx Ground For Prime Shipments

Forrester IT

Last weekend, Amazon informed its 3rd party sellers (which account for more than half of its unit sales) that they are no longer allowed to use FedEx’s ground delivery service for Prime shipments. In its email announcement, Amazon noted that its reason is a decline in the delivery network’s performance and that it won’t lift […].

Retail 221
article thumbnail

4 Ways to Use Big Data to Grow Your Business in 2020

CTOvision

Big data is one of the most diverse tools marketers can use when growing their business. Essentially, big data is the act of analyzing large quantities of data to make informed business decisions. Before machine programming allowed us to track everything from sales to user engagement, we had to put together the numbers one at a […].

Big Data 154
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Top Strategies For Replatforming Your Commerce Solution

Forrester IT

A stand-out theme from my inquiries this year was companies coping with symptoms of their monolithic commerce solutions. What I found surprising was the myriad reasons why they keep those solutions in place. I heard lots and lots of frustration, despite all the solutions on the market. So when I set out to do my […].

Strategy 221
article thumbnail

Phishers prey on fans of latest Star Wars film

Tech Republic Security

83 users have already been affected by 65 malicious files disguised as copies of Star Wars: The Rise of Skywalker according to Kaspersky.

Film 144

More Trending

article thumbnail

Why 5G harbors multiple security weaknesses

Tech Republic Security

Certain security flaws in 2G, 3G, and 4G have not been resolved, and 5G is vulnerable as well, says a new report from Positive Technologies.

Security 133
article thumbnail

The Top 11 Source-To-Contract Suite Vendors Help Firms Choose, Contract, Manage, And Get The Best Results From Their Supply Base

Forrester IT

We have just completed our Forrester Wave™ evaluation of source-to-contract (S2C) suites (“The Forrester Wave™: Source-To-Contract Suites, Q4 2019 — The 11 Providers That Matter Most And How They Stack Up“). These S2C suites combine four related buy-side software products: eSourcing, contract lifecycle management (CLM), spend analytics, and supplier risk and performance management (SRPM).

Software 150
article thumbnail

"123456" again claims top spot as worst password of the year

Tech Republic Security

Other poor choices include "password," "princess," "qwerty," "iloveyou" and "welcome," according to the 2019 list from SplashData.

138
138
article thumbnail

Beyond Cloud, Get Your Organization to Digital Dexterity

Information Week

While a move to the cloud can result in operational efficiency for an organization, a successful transformation goes further by reworking customer-facing services and internal processes.

Cloud 87
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to block fingerprinting in Firefox

Tech Republic Security

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

How To 116
article thumbnail

8 enterprise web application development trends to watch in 2020

mrc's Cup of Joe Blog

Summary: As digital technologies transform the business landscape, web development becomes increasingly important. In the near future, those who keep up with changing development trends will have an advantage over those who don’t. So, where is enterprise application development headed in the coming year? Learn more in this article. photo credit: lakexyde via pixabay cc It’s an exciting time in the world of enterprise application development.

Trends 93
article thumbnail

New malware dropper is a "hornet's nest" of dangerous software

Tech Republic Security

The newly discovered Legion Loader infects computers with a huge quantity and variety of malware, making it a serious threat.

Malware 114
article thumbnail

How to set a password policy for Nextcloud users

Tech Republic Cloud

Setting a strict password policy on Nextcloud could prevent your user's accounts from getting hacked. Find out how.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to analyze the Apache log file with GoAccess

Tech Republic Security

Add terminal- and web-based Apache access.log view with GoAccess.

How To 149
article thumbnail

How to set a password policy for Nextcloud users

Tech Republic Cloud

Setting a strict password policy on Nextcloud could prevent your user's accounts from getting hacked. Find out how.

article thumbnail

How to protect your organization against ad-based JavaScript exploits

Tech Republic Security

Cybercriminals continue to exploit weaknesses in JavaScript to try to steal sensitive data from consumers through advertising, according to DEVCON.

article thumbnail

Picks on AI trends from Data Natives 2019

Dataconomy

A sneak-peek into a few AI trends we picked for you from Data Natives 2019 – Europe’s coolest Data Science gathering. We are about to enter 2020, a new decade in which Artificial Intelligence is expected to dominate almost all aspects of our lives- the way we live, the way. The post Picks on AI trends from Data Natives 2019 appeared first on Dataconomy.

Trends 67
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to block fingerprinting in Firefox

Tech Republic Security

Fingerprinting is a new way of tracking your online usage. Find out what this is and how to make sure Firefox is blocking it.

How To 78
article thumbnail

Running IT as a Digital Business Catalyst

Future of CIO

Digital is about the exponential growth of information, increasing speed of change, hyper-connectivity, and fierce competition. IT has evolved significantly in running business today, not simply as a tool or mechanism to support business goals, but a digital catalyst to achieve strategic business goals. It takes a very solid leadership, focus, and the ability to achieve high performance business results.

article thumbnail

Getting ready for the end of Basic Authentication in Exchange Web Services

Tech Republic Security

Prepare your applications and users for big changes on 13 October 2020.

article thumbnail

The Best “Aha Moment” Quotes of “Digital Master” Dec. 2019

Future of CIO

"Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Agile 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to analyze the Apache log file with GoAccess

Tech Republic Security

Add terminal- and web-based Apache access.log view with GoAccess.

How To 79
article thumbnail

The Weekly Insight of the “Future of CIO” 12/19/2019

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 3 million page views with 6300+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc. The “ Digital Master ” book series includes 28 books to share insight from the multidimensional digital lens and perceive the multi-faceted impact the digital era upon us is making to the businesses and society.

article thumbnail

Quantum Trends And The Internet of Things

CTOvision

Read Chuck Brooks’ article about how the Internet of things could usher in a quantum computing revolution on Forbes : As a new decade approaches, we are in a state of technological flux across many spectrums. One area to take note of is quantum computing. We are starting to evolve beyond classical computing into a […].

article thumbnail

A Cloud Guru and Linux Academy F.A.Q.

Linux Academy

From CEO, Sam Kroonenburg: Recently A Cloud Guru announced the acquisition of Linux Academy. I know this was a big surprise for everybody — our customers, and the staff of both companies! As part of the announcement we provided a high-level view of the vision for bringing the companies together, and naturally, that leads to a bunch of questions. Today, I want to give some more clarity & answer many of the customer questions we’ve seen out there.

Linux 29
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Warning Issued For Millions Of Google Chrome Users

CTOvision

Google’s seamless Chrome updates are one of its most appealing features thanks (unlike Windows 10) to their reliability. Until now. The latest version of Chrome has already automatically rolled out to hundreds of millions of users around the world is causing some serious problems for Android users. Picked up by 9to5Google and expanded upon by Android […].

Google 39
article thumbnail

Best Practices in Publishing & Distributing eBooks at Scale

Kitaboo

Every once in a while, there comes a revolutionary technology that disrupts the entire industry. Integrated Circuits revolutionized the computer industry, LED technology revolutionized the television, capacitive touch revolutionized UI in digital computers, and over the past decade, eBooks have revolutionized the publishing industry with ebook publishing.

eBook 113
article thumbnail

This Year’s AI (Artificial Intelligence) Breakthroughs

CTOvision

Read Tom Taulli list the breakthroughs that happened in artificial intelligence in 2019 on Forbes : When it comes to AI (Artificial Intelligence), VCs (venture capitalists) continue to be aggressive with their fundings. During the third quarter, 965 AI-related companies in the US raised a total of $13.5 billion. In fact, this year should see […].

article thumbnail

Google’s AI Chief Wants to Do More With Less (Data)

CTOvision

Whatever the future role of computers in society, Jeff Dean will have a powerful hand in the outcome. As the leader of Google’s sprawling artificial intelligence research group, he steers work that contributes to everything from self-driving cars to domestic robots to Google’s juggernaut online ad business. Wired talked with Dean in Vancouver at the […].

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.