Thu.May 25, 2017

article thumbnail

Tips for Mitigating IoT Device and Insider Risk

CTOvision

Crystal Lister. Organizations today are increasingly adopting Internet of Things (IoT) devices lacking sufficient security protocols which creates unique insider risks that IT teams must address. These organizations were already facing enduring risks from malicious and non-malicious insiders and the intersection with IoT devices further complicates the attack surface that IT teams must defend.

Internet 152
article thumbnail

How BI is Changing in ERP Systems

IT Toolbox

As Silicon Valley increasingly looks like the center of the business world, so too are businesses the world over starting to resemble the technology firms that dot the Valley. Business has never been more driven by information technology, and competitive advantage now often rests more on effective technology than on any other factor.

System 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Switch Plans Gigantic Atlanta Data Center Campus

Data Center Knowledge

Fourth dot on US map completes list of US markets company can reach with low-latency connectivity Read More.

article thumbnail

IT firm gets Scality object storage to boost S3-based offerings

Computer Weekly

Blue Chip deploys Scality Ring object storage on commodity hardware with S3 connectivity to enable new cloud, backup and archiving product offerings at “a few pence a gigabyte”

Storage 159
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Match Made in the Data Center – AI and Robotics

Data Center Knowledge

AI will “drive faster business decisions in marketing, e-commerce, product management, and other areas of the business by helping close the gap from insights to action.” Read More.

article thumbnail

GDPR: One year to compliance and opportunity

Computer Weekly

With a year to go before all companies dealing with European Union citizens’ data have to comply with new EU data protection rules, the focus for many is on compliance, but some believe business should be the top priority

Data 159

More Trending

article thumbnail

CBRE: Demand for colocation space in London holds firm in face of Brexit

Computer Weekly

The latest CBRE quarterly report, charting the performance of the European colocation market, shows demand for capacity in London has so far been unaffected by the triggering of Article 50

Report 154
article thumbnail

How to conduct an IoT pen test

Network World

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points? Claud Xiao, principal security researcher, Unit 42 at Palo Alto Networks, said for just testing some network services on IoT devices in a black box way,

How To 127
article thumbnail

Security Think Tank: Minimise malware risks through education, process and technology

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

Malware 156
article thumbnail

What You Can Learn about Business from Cisco’s John Chambers

Data Center Knowledge

Network technology giant's firmer CEO says nearly every mistake he’s made has been because he’s moved too slowly Read More.

Network 131
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mobile users’ expectations are sky high, says Gemalto

Computer Weekly

Consumers have extremely high expectations for rapid mobile development in the coming years, according to a Gemalto report

Mobile 151
article thumbnail

Separate then Solve: A model for solving problems

IT Toolbox

As a product manager, I am often faced with very large, knotty problems that I have to solve. Over the years, I've discovered that there is an art to doing this well. Where people around me seem to struggle, I seem to do very well. In recent months, this knotty-problem problem has taken an even more challenging twist.

100
100
article thumbnail

The growing influence of the CIO

Computer Weekly

The role of IT leaders has changed radically over the past decade.

Budget 197
article thumbnail

Linux's X.org server is vulnerable. Here's how to stay safe.

Tech Republic Security

Security has come front and center for every aspect of technology — even the display server. Jack Wallen shines a spotlight on the Linux X.org server, why it's insecure, and what you can do.

Linux 108
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

UK businesses urged to prepare for GDPR

Computer Weekly

With one year to the compliance deadline, the Information Commissioner’s Office has urged UK firms to seize the business benefits of being GDPR-ready

132
132
article thumbnail

IDG Contributor Network: Network analysis can find malware before it strikes

Network World

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain in an article on the school’s website. The researchers, who have been studying historic network traffic patterns, say the latest malware tracking should take advantage of inherent network-supplied barometers and stop simply focusing on tryi

Malware 94
article thumbnail

Debit card transactions to overtake cash payments, thanks to contactless

Computer Weekly

The number of payments made using debit cards will exceed the number made by cash three years earlier than expected, as a result of the success of contactless technology

118
118
article thumbnail

Former EarthLink CEO to Head Rackspace as Its New Chief Exec

Data Center Knowledge

Interim CEO Cotten, who stepped in to replace Rhodes, will remain president Read More.

116
116
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Old foes, new friends: Nordic banks and startups increase collaboration

Computer Weekly

Banks and startups in the Nordic region are working together to develop new ideas in financial technology

Banking 129
article thumbnail

The complexity of password complexity

Network World

Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users' passwords will all have twelve or more characters. Let's stroll down Complexity Boulevard and see how the settings work and examine some settings worth considering.

Linux 74
article thumbnail

Open19: LinkedIn's bid to lower barriers to open source datacentre tech adoption gathers pace

Computer Weekly

The Open19 Foundation's mission to create new open industry standards for 19-inch servers continues apace

article thumbnail

Eight steps to the GDPR countdown

Network World

With only one year until this business-changing regulation goes into effect, it's time for companies to start planning their approach. Let's run through eight steps you can take to be ready.

Company 68
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Aggreko powers predictive maintenance with Azure machine learning

Computer Weekly

Temporary power company moves from reactive to proactive, and now predictive maintenance

Company 137
article thumbnail

The complexity of password complexity

Network World

Password complexity settings on Linux systems is a lot more interesting -- and complex -- than it might appear.

Linux 81
article thumbnail

Rackspace senior management reshuffle continues with new CEO appointment

Computer Weekly

Rackspace confirms new CEO appointment, six months after being acquired by private equity house Apollo Global

120
120
article thumbnail

The complexity of password complexity

Network World

Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users' passwords will all have twelve or more characters. Let's stroll down Complexity Boulevard and see how the settings work and examine some settings worth considering.

Linux 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Bastion Hosts and Custom SSH Configurations

Scott Lowe

The idea of an SSH bastion host is something I discussed here about 18 months ago. For the most part, it’s a pretty simple concept (yes, things can get quite complex in some situations, but I think these are largely corner cases). For the last few months, though, I’ve been trying to use an SSH bastion host and failing, and I could not figure out why it wouldn’t work.

article thumbnail

Eight steps to the GDPR countdown

Network World

One year from today, the recently passed regulation known as “GDPR” (General Data Protection Regulation) goes into effect. While EU-specific, it can still dramatically affect how businesses that work with personal data of citizens and residents of the EU. GDPR was approved a year ago and will be going into effect in another year. It applies directly to organizations within the EU, but also applies to organizations outside the EU if they 1) offer goods and services to the EU, 2) monitor the behav

Data 60
article thumbnail

Technology Short Take #83

Scott Lowe

Welcome to Technology Short Take #83! This is a slightly shorter TST than usual, which might be a nice break from the typical information overload. In any case, enjoy! Networking. I enjoyed Dave McCrory’s series on the future of the network (see part 1 , part 2 , part 3 , and part 4 —part 5 hadn’t gone live yet when I published this). In my humble opinion, he’s spot on in his viewpoint that network equipment is increasingly becoming more like servers, so why not embed services and functions in t

Linux 60
article thumbnail

GDPR goes into effect May 25 2018 Are You Ready?

Storage IO Blog

If your initial response is that you are not in Europe and do not need to be concerned about GDPR you might want to step back and review that thought. While it is possible that some organizations may not be affected by GDPR in Europe directly, there might be indirect considerations. For example, GDPR, while focused on Europe, has ties to other initiatives in place or being planned for elsewhere in the world.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.