Tue.Apr 18, 2017

article thumbnail

Demise of OpenStack Innovation Center does not mean demise of OpenStack

Forrester IT

The ever-dependable Barb Darrow at Fortune reported late last week that the OpenStack Innovation Center (OSIC) is to shut down. Cue wailing, gnashing of teeth, and portents of doom. But this may not be quite so bad as it appears, because the OpenStack Innovation Center isn't nearly so critical to the open source cloud computing project as its name might imply.

article thumbnail

UK businesses need to up cyber security with one in five hit by attacks

Computer Weekly

Big UK businesses are targeted by cyber attacks more heavily, but all need to improve cyber security with one in five UK firms falling victim in the past 12 months, a survey reveals

Security 207
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The New York Times to Replace Data Centers with Google Cloud, AWS

Data Center Knowledge

Publisher plans to shut down three data centers as it moves to the cloud Read More.

article thumbnail

Kone brings elevator maintenance online with IBM Watson and Salesforce

Computer Weekly

Lift manufacturer is using sensors and artificial intelligence to support its maintenance staff

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Connecting with the Cloud

IT Toolbox

Contact Centers as a Service. According to the latest MarketsandMarkets report, the cloud-based contact center market size is predicted to grow from $5.43 billion in 2016 to $15.67 billion by 2021.

Cloud 150
article thumbnail

First MariaDB user conference hails renaissance of relational model

Computer Weekly

At its inaugural user conference in New York, MariaDB corporation leaders Michael Howard and Monty Widenius say the open source relational database model finds its moment beyond NoSQL phase

More Trending

article thumbnail

Almost 100% of retailers think IT is critical to store branches

Computer Weekly

Retailers are beginning to realise the role technology plays in the online and offline space, with a majority of retailers saying IT is essential to stores

Retail 160
article thumbnail

Opinion: De-Electrification of the American Economy

Data Center Knowledge

Even a big pro-coal policy shift from Washington may not result in higher demand for thermal coal. Read More.

Policies 189
article thumbnail

Microsoft underlines importance of keeping software updated

Computer Weekly

Microsoft has underlined the importance of keeping software up to date by confirming that no supported versions of its software are vulnerable to leaked NSA hacking tools

Software 130
article thumbnail

Top AWS Engineer Calls Hurd’s Cloud Data Center Bluff

Data Center Knowledge

No, Oracle isn’t likely to know something about cloud hardware the top providers don’t. Read More.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

FDM uses gamification to make graduate recruitment process more inclusive

Computer Weekly

IT services firm uses Yellow Hook Reef game to make its graduate recruitment process more inclusive and enjoyable for candidates

153
153
article thumbnail

Optimizing Today’s Data Centers: Metrics that Matter

Data Center Knowledge

On the software side, pervasive virtualization, containerization and software automation have completely changed the measurement landscape. Read More.

article thumbnail

How cloud, IoT and mobile devices are driving demand for edge datacentres

Computer Weekly

The demand for edge datacentres and computing resources is steadily rising.

Mobile 192
article thumbnail

Getting JD Edwards Business Function Documentation

IT Toolbox

You can also view the business function documentation in the JD Edwards Business Function Documentation Viewer by using FastLink P98ABSFN in the Solution Explorer or navigating to Application Development -> Object Management -> Business Function Documentation -> Business Function Documentation Viewer.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New training platform uses real-world situations to train cybersecurity experts faster

Tech Republic Security

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.

Training 126
article thumbnail

Virtus Data Centres plots to expand Slough colocation footprint

Computer Weekly

Colocation provider sets out plans to expand its datacentre footprint in Slough, as demand for locally hosted cloud services grows

Data 126
article thumbnail

The Crucible of Hard Things

IT Toolbox

From time to time into our lives come Hard Things. Hopefully they don't come too often, but it's not reasonable to expect them never to come at all. When they do come, and they will, we are put to a sore test. There are many ways we can encounter Hard Things in our lives. Some are hard because of extreme physical trial.

100
100
article thumbnail

Lloyds Bank tests biometric authentication from Microsoft

Computer Weekly

Banking group is trying out enterprise-grade biometric authentication for its online customers

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Why CX Matters - New Research

IT Toolbox

I recently wrote a series here about collaboration and digital transformation, and it’s really just one of many intersections businesses must manage as the world around them becomes digitized.

Research 100
article thumbnail

How to attract more women into the Gulf tech sector

Computer Weekly

Organisations in the Middle East need to increase the number of women in their IT workforces

How To 137
article thumbnail

Test driving the IBM InfoSphere Information Governance Catalog user interface changes in 11.5

IT Toolbox

A new look InfoSphere Information Governance Catalog includes a better looking homepage and some easier data entry, search and navigation.

article thumbnail

Meanwhile in China: Surveillance required on public Wi-Fi

Network World

Every once in a while, something in China that sounds like it came out of a dystopian movie catches my attention. China’s great surveillance machine seems to know no bounds. China has already cracked down on unauthorized VPN use. Last month, we learned that if you want toilet paper at one UNESCO World Heritage Site in China, then you must submit to facial recognition in order to be issued a strip of toilet paper.

106
106
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Security Think Tank: Time to look at red teaming?

Computer Weekly

How can organisations use red teaming to identify security gaps?

Security 142
article thumbnail

Cybersecurity remains an elusive business priority

Network World

I’ve been remiss by not blogging earlier this year about ESG’s annual IT spending intentions research. The year 2017 continues to follow a pattern: Cybersecurity is a high business and IT priority for most organizations. Based upon a global survey of 641 IT and cybersecurity professionals, the ESG research reveals: While just over half (53%) of organizations plan on increasing IT spending overall this year, 69% said they are increasing spending on cybersecurity.

Survey 94
article thumbnail

Video: How a public utility navigates cybersecurity

Tech Republic Security

Eric Slavinsky, CIO for PPL Corporation, explains how the utility works within government regulations to take a risk-based approach to cyber safety.

Video 98
article thumbnail

Mobile, security tools among education tech favorites

Network World

In the school district of La Crosse, Vicki Lyons depends on mobile device management software from Jamf to manage the Wisconsin district’s fleet of iPads and MacBook Air devices. The Apple device management platform plays a key role in the district’s efforts to provide equitable access to technology to all of its students. “We use Jamf Pro as our device management solution for our 1:1 iPad program district-wide.

Mobile 84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Will cloud vendors dominate machine learning? Early signs point to yes

Tech Republic Data Center

Vendors like Cloudera and Hortonworks have their work cut out for them in the machine learning battle, as data gravity increasingly favors the cloud.

Cloud 88
article thumbnail

At $175, this ransomware service is a boon to cybercriminals

Network World

Cybercriminals have another easy-to-use ransomware kit to add to their arsenals, thanks to a new variant called Karmen that hackers can buy on the black market for $175. A Russian-speaking user called DevBitox has been advertising the ransomware in underground forums, security firm Recorded Future said in a blog post on Tuesday. Karmen is what experts call ransomware-as-a-service -- a particularly worrisome trend.

article thumbnail

How to build Apache Mesos on Ubuntu Server 16.04

Tech Republic Data Center

If you're looking for a large-scale tool for deploying containers over a clustered environment, Jack Wallen walks you through the installation of such a system with Apache Mesos.

How To 62
article thumbnail

Experts contend Microsoft canceled Feb. updates to patch NSA exploits

Network World

Microsoft delayed its February security update slate to finish patching critical flaws in Windows that a hacker gang tried to sell, several security experts have argued. "Looks like Microsoft had been informed by 'someone,' and purposely delayed [February's] Patch Tuesday to successfully deliver MS17-010," tweeted Matt Suiche, founder of Dubai-based security firm Comae Technologies.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.