Thu.Jun 22, 2017

article thumbnail

Telefónica Digitizes Its Operations In Service Of The Customer

Forrester IT

With Dan Bieler. Like many organizations, Telefónica is going through a digital transformation. Our new case study "Telefónica Digitizes Its Operations In Service Of The Customer" investigates the approach that Telefónica has taken to prepare for digital transformation, including the impact of its transformation strategy on its customer experience, its operational setup, and its organizational transformation.

article thumbnail

IIoT? IoT? What is the difference?

CTOvision

The Internet of Things As the number of products on the market described as “smart” has grown, “the internet of things” has become something of a buzzword (or buzz phrase). The phrase “internet of things” suggests a network of connected or computerized devices that work together to make life more convenient and simple for the […].

Internet 216
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Most SAP users plan to stick with older ERP due to costly Hana migration

Computer Weekly

Survey finds many SAP users are considering augmenting their existing enterprise resource planning with cloud applications rather than go to S/4 Hana

SAP 223
article thumbnail

Eight Ways ERP is Improving Supply Chains Now

IT Toolbox

If consumers feel that their lives have sped up and gotten more complex in recent years, they should see the supply chains for the products that support their lives. Globalization and the cloud have eaten away at the possibility of having an inefficient network for sourcing, manufacture and distribution.

Network 201
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian hackers targeted election systems in 21 US states

Computer Weekly

Russian hackers targeted voting systems in nearly 50% of states in the 2016 US presidential election, officials have revealed in testimony before the Senate Intelligence Committee

System 193
article thumbnail

How Technology Increases Efficiency of Executive Management

CTOvision

As a busy executive, you understandably may feel as though you do not have enough time in your day to tackle everything that requires your attention. This can create a great deal of stress and tension in your life. The reality is that some technological enhancements in your office can dramatically improve how efficiently and […].

Big Data 169

More Trending

article thumbnail

CTOvision Assessment On The Megatrend of Robotics

CTOvision

There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive deeper into the trend of Robotics. Operating along a spectrum of human controlled to semi-autonomous to totally independent, robots are already […].

article thumbnail

Does LinkedIn’s Data Center Standard Make Sense for HPE and the Like?

Data Center Knowledge

It’s easy to look at the new Open19 data center rack standard initiative spearheaded by LinkedIn as competition for the Open Compute Project. It does have some of the same vendors involved; in particular, Hewlett Packard Enterprise, which has said it will make its OCP Cloudline.

article thumbnail

Some government departments lost up to 40% of IT contractors after IR35 changes

Computer Weekly

Differing approaches to IR35 tax reforms meant some Whitehall teams were harder hit than others by the changes introduced in April 2017

article thumbnail

Breaking Up with Your Cloud VoIP Provider

IT Toolbox

Your relationship with your cloud voice over IP (VoIP) provider, like all good things, will eventually come to an end. Prices rise. Major outages occur on a regular basis. Support quality drops. VoIP providers go under or are acquired. The day will come when you need to switch providers. Because VoIP is the lifeblood of many businesses, you must prepare for the breakup.

VOIP 168
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Case study: Future Facilities trials VR to pinpoint datacentre performance problems

Computer Weekly

Datacentre performance simulation software provider Future Facilities opens up about its virtual reality trials, and how the technology could change the way the entire industry operates

article thumbnail

How to Make CRM Your Most Valuable Asset

IT Toolbox

Business owners should step back and ask themselves what their most valuable asset is. The answers will vary depending on industry. Real estate brokers may say location is their most valuable asset, while new products and partnerships may be the answer for owners of IT businesses.

article thumbnail

Red Hat launches open source hyper-converged infrastructure

Computer Weekly

Infrastructure bundles OS, hypervisor and storage software components from the open source distributor and is aimed at SMEs and remote office use cases

article thumbnail

Shocking Security Discovery!

IT Toolbox

At work, I've just received a course in application security for Product Managers. It's not something I've really focused on before to this extent. As a result, I've learned a lot, and I now better understand why companies have departments and senior leaders who focus on this topic. My takeaway is twofold: Being secure is a lot of work.

Security 147
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Insurance industry transformation will mirror travel sector through insurtech

Computer Weekly

Insurtech is gaining momentum, and companies in the sector of all sizes and ages can learn from startups

Insurance 203
article thumbnail

5 Ways to Protect Your Online Identity

IT Toolbox

Since this can be a huge problem, you should be very cautious about what you do online, and take necessary measures to keep your data safe.

Data 165
article thumbnail

Voice biometrics still relatively unheard

Computer Weekly

Authentication system could help reduce UK fraud by making it hard for fraudsters to glean information from contact centres

article thumbnail

The 4 types of cybersecurity threats and a formula to fight them

Tech Republic Security

Banks have long been forced to the front lines of cybersecurity and at the 2017 Borderless Cyber event, the CISO of Wells Fargo explained how to pick your battles.

Banking 166
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Five Ways Your Business Will Benefit From an ERP System

IT Toolbox

Regardless of the type or size of your business, an enterprise resource planning (ERP) system can provide you with an invaluable tool for increasing productivity, decreasing workload and boosting ROI. Thanks to new features such as expanded cloud platforms and SaaS compatibility, today's ERP software can help you take your business to a whole new level.

System 138
article thumbnail

Ucas reworks university admissions access with API

Computer Weekly

Over the next few years, the existing access to Ucas' systems will be switched off.

System 202
article thumbnail

How to set up ssh key authentication

Tech Republic Security

Out of the box, secure shell is fairly secure. With the help of ssh key authentication, you can lock down secure shell so that only specific machines can log in. Here's how.

article thumbnail

Security Think Tank: Ad hoc patching is inadequate

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive?

Security 148
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MSP Fights to Hire Scarce Cloud Engineers

Data Center Knowledge

At CorpInfo LLC, cloud is their business and business has been very good. So good, in fact, that the cloud-focused subsidiary of a legacy reseller has grown from fewer than a handful of full-time staffers 18 months ago, to 54 employees today. They expect that headcount to swell past 150… Read.

Cloud 129
article thumbnail

Best of VMworld Awards 2017 nominations now open until 18 August

Computer Weekly

Read the criteria for the Best of VMworld Europe User Awards and find out how to submit your nomination

How To 177
article thumbnail

Intent-Based Networking, Machine-Learning Networks, etc. Are Here- but It's Time for Vendors to Do the Right Thing First

IT Toolbox

Fate has a way of being heard. As I was contemplating what was bothering me about various recent announcements from big network vendors about SD-whatever , Machine-Learning blah blah blah, and Intent-Based Networking, I happened to glance at my email inbox.

Network 127
article thumbnail

How the public sector can use AI to streamline digital services

Computer Weekly

Chatbots have the potential to reduce the load on contact centres.

208
208
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Report: Companies are wasting massive amounts of money on ineffective security solutions

Tech Republic Security

A report by Absolute and Ponemon Institute revealed some insights into the costs behind insecure endpoints. Learn more about their discoveries and some strategies for threat protection.

Report 145
article thumbnail

Virgin Media hit by second router security risk in two weeks

Computer Weekly

Virgin Media has been forced to act on a second security risk warning about its wireless routers in as many weeks

Media 164
article thumbnail

South Korean Web Host Pays $1 Million to Recover Customer Data

Data Center Knowledge

A web host based in South Korea has paid over $1 million to a ransomware operation, called Erebus, that encrypted customer data related to 3,400 customer websites. According to a report by Ars Technica, Nayana is working to recover the data from 153 Linux servers, but warned customers it.

Data 121
article thumbnail

Financial institutions need to rethink security, say analysts

Computer Weekly

Financial services providers need to rethink their approach to information security, according to the results of a global survey

Financial 139
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.