Fri.Feb 17, 2017

article thumbnail

Get ready for Business Intelligence market next wave of M&A

Forrester IT

Business intelligence (BI) is a runaway locomotive that keeps picking up speed in terms of enterprise interest, adoption, and spending levels. The result: Forrester now tracks 73(!) vendors in the segment. Their architectures and user interfaces vary, but they support similar use cases. Forrester started the original research with fewer than 30 vendors in 2014 and ended up with 73 in the current 2017 update.

article thumbnail

High Court rules for SAP, against Diageo in indirect licensing case

Computer Weekly

Judge rejects Diageo’s submission that SAP PI is a “gatekeeper” licence for gaining access to the SAP suite of applications and database

SAP 225
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Futurology Episode 4: The Future of The Connected Workplace

Forrester IT

This post was authored by Claudia Tajima, Researcher at Forrester. On the second part of the forth episode of our Futurology webinar series, Mike Facemire , Julie Ask and James McQuivey convened to discuss the future of the connected workplace. Looking forward, they discussed what change in the workplace will look like and what it will take to get there.

Research 288
article thumbnail

RSAC17: Former MI5 head calls on infosec community to make world safer

Computer Weekly

In a digital era, the information security community has a key role in helping to make the world a safer place, according to former MI5 boss Stella Rimington

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

6 Tips for Creating a Unified Communications Policy

IT Toolbox

Today’s unified communications (UC) solutions are available in many forms and can be comprehensive and integrated across corporations, with many cross-functional business processes. In smaller companies, they can be simple, without any integration with anything.

article thumbnail

HPE services and CSC to become DXC Technology

Computer Weekly

The merger between HP's services division and CSC will launch in April 2017 and is expected to save the companies billions

HP 195

More Trending

article thumbnail

Stemettes launches documentary about Outbox Incubator programme

Computer Weekly

Social enterprise Stemettes has produced a short film featuring its Outbox Incubator programme to highlight the importance of getting girls into science, technology, engineering and maths

Film 154
article thumbnail

Poor Access Management Leads to $5.5M HIPAA Penalty

Data Center Knowledge

Hospital chain settles claim it exposed 80,000 people's private data, leading to identity theft Read More.

Data 155
article thumbnail

Amazon, Apple and Microsoft pledge to support government push for fair cloud storage use

Computer Weekly

Competition and Markets Authority confirms support of Amazon, Apple and Microsoft as it concludes compliance review into cloud storage sector

Storage 166
article thumbnail

Court Throws Out Facebook’s Motion to Dismiss Data Center Design Lawsuit

Data Center Knowledge

Judge concludes BladeRoom has made good-enough argument to continue litigation Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gartner predicts BI market will jump 7.3% to $18.3bn in 2017

Computer Weekly

So-called “modern BI and analytics platforms” outpace traditional business intelligence, but rate will slow down

article thumbnail

IBM launches $200m centre to double down on Watson and IoT

Tech Republic Data Center

The new centre in Munich will see IBM collaborate with BMW and others on how to use cognitive computing to extract useful insights from IoT data.

IBM 133
article thumbnail

Security Think Tank: Integrity of business data key to cyber defence

Computer Weekly

What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?

Data 151
article thumbnail

Amazon Lex: The smart person's guide

Tech Republic Cloud

This resource guide covers Amazon Lex, the brains behind the Alexa personal assistant technology found in the Amazon Echo. Learn how to deploy Amazon Lex in AWS, and how to use it for business.

Resources 118
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

RSAC17: Geopolitical changes driving encryption usage, survey shows

Computer Weekly

More organisations are planning to deploy encryption in response to geopolitical changes, but confidence in organisations’ ability to secure and protect encryption is low, a survey shows

Survey 130
article thumbnail

Event 51 Drive Failure Reporting Tool

Mick's IT Blog

Last year, we had a high level executive that started having slowness and extended drive usage. When the help desk evaluated his system, they found it had been writing an event 51 to the event viewer logs. They were able to backup all of his data and build a new system for him before the drive completely failed. You can read more about event 51 here.

Report 96
article thumbnail

FOI requests reveal appetite for datacentre change in London’s local councils

Computer Weekly

Research conducted by cloud service provider HyperGrid suggests IT departments in local councils are working with outdated and underperforming datacentre infrastructures

Research 128
article thumbnail

Big data privacy is a bigger issue than you think

Tech Republic Big Data

When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.

Big Data 111
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Visa, Bosch and Indiegogo debut IBM Watson IoT partnerships

Computer Weekly

At the inauguration of the Watson IoT HQ in Munich, IBM customers announced a swathe of new partnerships to bring IoT tech to market

IBM 147
article thumbnail

Personal vs. corporate email: The security threats differ, says Google

Tech Republic Security

Hackers differ their approach based on who they're attacking. Here's what that means for your unique situation.

Google 112
article thumbnail

Swedish capital uses Bluetooth and Wi-Fi to cut road congestion

Computer Weekly

Stockholm transport authorities are gaining a better understanding of road traffic through technology

article thumbnail

Zero One: States Woo Cybersecurity Pros

Data Center Knowledge

Virginia is in the vanguard, while others fall behind Read More.

Security 122
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Big data projects need business input and careful management

Computer Weekly

Big data projects need to be managed.

Big Data 202
article thumbnail

IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017

Network World

The Internal Revenue Service rounded up some of the usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents during the 2016 tax season because the agency has been very public about its battle with this scourge. Just this month the IRS issued another warning about what it called a dangerous, evolving W-2 scams that are targeting corporations, school districts and ot

Malware 84
article thumbnail

Video: How IBM's new Watson cybersecurity solution can drastically speed up incident response

Tech Republic Security

At RSA 2017, we caught up with IBM's Diana Kelley and learned how Watson's security-expert-as-a-service can enhance the work that CISOs and other security professionals are doing.

IBM 64
article thumbnail

Insecure Android apps put connected cars at risk

Network World

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could prevent tampering by hackers. Researchers from antivirus vendor Kaspersky Lab took seven of the most popular Android apps that accompany connected cars from various manufacturers and analyzed them from the perspective of a compromised Android device.

Malware 71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Video: How HPE's new security-at-the-edge solution will protect and empower more IoT innovation

Tech Republic Security

HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.

HP 64
article thumbnail

The high price of security shaming [Infographic]

Network World

Bad press following a security breach hits companies hard. In fact, it can be so damaging that “two-thirds of companies would pay an average of $124k to avoid public shaming scandals,” according to a recent Bitdefender survey of 250 IT security professionals. What’s more, “some 14 percent would pay more than $500k.”. If you think that’s a high price to pay, consider this: 34 percent of companies were breached in the past 12 months, according to the report, and “74 percent of IT decision makers d

article thumbnail

Video: What Verizon's data breach research tells us about the state of IoT security

Tech Republic Security

We interviewed Chris Novak from Verizon's incident response team at RSA 2017 and talked about what the company has learned about securing the Internet of Things.

article thumbnail

Ride along to solve these data breaches

Network World

Riding along Image by Daimler AG Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed or where a leak is.

Data 68
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.