Tue.May 30, 2017

article thumbnail

Big Data Experts in Big Demand

Data Center Knowledge

While tech companies employ the most data scientists, these professionals are also in demand in non-tech sectors. Read More.

Big Data 260
article thumbnail

British Airways counts cost of major bank holiday IT system outage

Computer Weekly

Share price of British Airways' parent company plummets after power supply issue at "local" datacentre grounds flights at Heathrow and Gatwick over the bank holiday weekend

Banking 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

DCK Investor Edge: Florida is Now Courting Hyperscale Data Centers

Data Center Knowledge

Florida has officially entered the data center derby with elimination of sales tax and use tax for wholesale data centers Read More.

article thumbnail

DevOps practitioners open up about enterprise adoption challenges

Computer Weekly

Ahead of next week’s DevOps Enterprise Summit in London, practitioners have warned enterprises to stop thinking of DevOps as something only Silicon Valley firms and startups can do successfully

Devops 195
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

CTOvision Assessment On The Megatrend of Artificial Intelligence

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence (AI) is the discipline of thinking machines.

article thumbnail

ICC brings drones, smart bats and virtual reality to international cricket

Computer Weekly

International Cricket Council teams up with Intel to transform the cricketing experience for fans and players with drones, smart connected bats and virtual reality

More Trending

article thumbnail

How is serverless computing changing our world.

IT Toolbox

Serverless computing in a way has been there for long. In an Infrastructure As A Service setup the end users are not physically managing servers, but serverless computing takes this paradigm a step ahead. It enables developers execute function using exact amount of computing resources needed.

Resources 156
article thumbnail

British Air Data Center Outage Feeds Outrage at Airline Cost Cuts

Data Center Knowledge

"We do have a back-up system, but on this occasion it failed" Read More.

Airlines 189
article thumbnail

Six Ways to Handle Fragmented Data

IT Toolbox

The biggest challenge with data fragmentation is that business data naturally gets siloed when employees are trying to get their jobs done efficiently.

Data 139
article thumbnail

Cloudy Thinking and Digital Transformation

Cloud Musings

(Originally posted on the Engility Corporation Blog ) T here’s a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive.

Agile 126
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Raising the block on the chain

IT Toolbox

If you have ever been into cars and I don't mean been into cars as a driver or passenger, all of us have done that. I mean if you have ever been interested in working on cars as a hobby then you would know what a block is and why it is raised on a chain. I am not here to talk about cars but I am going to talk about blocks and chains.

125
125
article thumbnail

Construction of Amazon's €1bn Dublin datacentre hit by environmental planning appeal

Computer Weekly

Amazon's plans to build a €1bn datacentre in Dublin from mid-2017 could be delayed by environmental planning appeal

article thumbnail

Six Keys for Automating Big Data

IT Toolbox

If ever there was a use case for automation, it is making sense of big data. With many businesses drowning in their data lake, automation combined with machine learning and artificial intelligence can be an important life raft for working with the data.

Big Data 113
article thumbnail

A New Internal Threat to Your Environment? ‘Checkbox Security’

Data Center Knowledge

A comprehensive risk strategy tackles compliance and security, and can be achieved through governance automation. Read More.

Security 122
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

How to Prioritize Ambiguous Tasks

IT Toolbox

Over the last few days, I've been working with a co-worker to help her organize and prioritize a big bundle of work that feels really vague and squishy. For me it's been fun, but I think my approach has been a little odd to her. It certainly wasn't how she planned to look at the problem.

How To 106
article thumbnail

7 ways to protect your Apple computers against ransomware

Tech Republic Security

Take these steps now to protect your Mac computers from emerging ransomware attacks.

Apple 166
article thumbnail

The Case for IT Constraints as the Rationale for Cloud-Based UC

IT Toolbox

My last post focused on economics – cost reduction – as a driver for the cloud, and if given to knee-jerk reactions, this might be as far as the conversation goes for building a business case.

Cloud 100
article thumbnail

Ocado Technology releases on-premise mesh datacentre as open source

Computer Weekly

To reduce the cost of high-end datacentre servers, Ocado has developed a private cloud that runs on low-end PCs

article thumbnail

Next-Gen Procurement: Transforming Processes with the Power of Generative AI

Generative AI goes beyond just automating tasks and providing real-time answers. Did you know that implementing generative AI reduces sourcing cycle times and allows for faster decision-making across procurement operations? In this whitepaper — Next-Gen Procurement: Transforming Processes With the Power of Generative AI — experts reveal how the strategic application of generative AI within procurement processes is paving the way for groundbreaking improvements.

article thumbnail

A bit of a ripple

IT Toolbox

There is one thing which seems common to most science fiction, or should I say, future based, television shows and movies. This thing seems to be the lack of cold hard cash (although Quark ruins this dystopian dream with his love of gold pressed latinum). Instead, everyone just simply gets what they want and has everything provided for their needs.

100
100
article thumbnail

Don't be the weak link that brings us all down: Keep your OS patched and up to date

Tech Republic Security

The worldwide proliferation of WannaCry ransomware exposed a lack of urgency regarding OS security updates. That can't be allowed to happen.

Security 125
article thumbnail

Fragile, wasteful technology

IT Toolbox

Technology is fragile. The more useful it becomes, the more fragile it is. The more things technology can do, the smaller and more compact it gets, the more fragile it is. Not only that, it becomes much more wasteful as well. Let's take, for example, my favourite piece of technology, the computer.

Examples 100
article thumbnail

Five ways to cut the risk of Salesforce

Computer Weekly

Best practices for IT professionals seeking to implement Salesforce’s product portfolio

130
130
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Sigint and humint

IT Toolbox

The reason security services in the Western world are asking for backdoors into encryption systems is to hide their own incompetence.

Security 113
article thumbnail

Shadow Brokers reveal details about June monthly dump service: 100 Zcash (about $23k)

Network World

The Shadow Brokers revealed pricing and other details about its monthly dump service which kicks off in June. Subscribers of the dump of the month club will not be shelling out bitcoins, but a different cryptocurrency: 100 (ZEC) Zcash. At the time of publishing, 100 Zcash was equal to $23,251. Over the weekend, the Shadow Brokers moved bitcoins worth about $24,000 to over 30 smaller wallets.

Groups 105
article thumbnail

Find Maximum Possible Resolution for Each Monitor

Mick's IT Blog

I have been working on a way that I can ensure the maximum resolution is set on monitors. Every so often, a monitor does not have the resolution set to maximum. I have been trying to figure out a way to set the resolution to maximum for more than a year, especially when a system is built in the build room and then moved to the user's office to be setup with new monitors.

article thumbnail

Area 1 Security stops phishing campaigns before they become attacks

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing is now the #1 delivery vehicle for malware and ransomware. According to Mandiant, phishing was used in about 95 percent of the cases of successful breaches where an attacker has been able to get into a target network and do something malicious.

Security 101
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Lincoln Rackhouse Buys into Hot Atlanta Data Center Market

Data Center Knowledge

Agrees to acquire 5MW facility from corporate user in sale-partial leaseback deal Read More.

article thumbnail

Video: How enterprise companies can identify and manage emerging cyber-threats

Tech Republic Security

For the enterprise, the cloud is essential for business-but it's also a cybersecurity threat vector. Adobe's chief security officer Brad Arkin explains best practices for CXOs to manage cyber-risk in a multi-cloud environment.

article thumbnail

How to enable secure shared memory on Ubuntu Server

Tech Republic Data Center

If you're looking to squeeze the most out of your Linux data center servers, it's worth your time to try enabling secure shared memory.

Security 102
article thumbnail

Machine Learning using Spark and R

Dataconomy

R is ubiquitous in the machine learning community. Its ecosystem of more than 8,000 packages makes it the Swiss Army knife of modeling applications. Similarly, Apache Spark has rapidly become the big data platform of choice for data scientists. Its ability to perform calculations relatively quickly (due to features like in-memory. The post Machine Learning using Spark and R appeared first on Dataconomy.

article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.