Mon.May 08, 2017

article thumbnail

Effective Risk Management in the Data Center

Data Center Knowledge

A standards-based risk management methodology can help prioritize risks and prepare for a data center or critical environments audit. Where to start? Read More.

article thumbnail

Driving Digital: The CIO's Playbook

Social, Agile and Transformation

Thanks to Landmark Ventures and Anthony Juliano for a great CIO Summit last week and for giving me a speaking spot for Driving Digital: The CIO's Playbook. If you weren't there - here's what I covered Don't let your business fall off the disruption cliff Digital disruption is affecting many industries 10 ways to improve IT culture - I spoke about two Become a data driven organization.

Industry 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How New Home Automation Systems Are Disrupting The Security Business

CTOvision

Jeremy Sutter. For a long time, the home security industry has been dominated by big companies that offered an all-inclusive home security system. The wholesome security system was ideal for many consumers with various security needs. However, in recent years, emerging companies that use innovative technology have invaded the home security industry.

System 157
article thumbnail

There are Dutch lessons in breach notification as GDPR approaches

Computer Weekly

The Netherlands is a pioneer when it comes to legislating around data protection, so GDPR might not be as much of a shock as in other countries.

Data 193
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Video: Inside the New Facebook Data Center in Texas

Data Center Knowledge

First building on what will eventually become a sprawling server farm campus is now online Read More.

article thumbnail

Unit4 adds machine learning to services-centric ERP system

Computer Weekly

Unit4, which majors on business applications software for professional services firms and universities, adds machine learning to its product suite, as announced at a customer event in Rotterdam

System 167

More Trending

article thumbnail

IoT platform takes apartments into the cloud in Stockholm

Computer Weekly

Swedish property management company Stockrose is using IoT the Azure cloud to offer its clients 'buildings as a service.

Cloud 206
article thumbnail

Leveraging Customer Loyalty

IT Toolbox

Building Customer Loyalty One Doughnut at a Time. According research from the Temkin Group, loyal customers are seven times more likely to try a new offer, four times more likely to recommend a product to others, and five times more likely to repurchase items from the same company.

Groups 133
article thumbnail

How to Lead in the Age of Analytics

Data Center Knowledge

Companies that leverage data to drive the performance of their organization’s decisions are winning at a faster rate than their competition. Read More.

How To 138
article thumbnail

Engaging Your Employees for Better Customer Service

IT Toolbox

One of the most important aspects of superior customer service isn't physical – it's the engagement of your people. Active, positively engaged employees are a major part of business success. The attitude of your people will transfer to your customers and help build customer loyalty, engagement, and sales. This isn't automatic.

133
133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 questions every business must ask about big data architecture

Tech Republic Data Center

At the 2017 Dell EMC World conference, Dell EMC systems engineer Cory Minton explained how IT leaders can better think through their big data deployments.

Big Data 150
article thumbnail

Three Core Parameters for Vertical Market Collaboration Solutions, Part 2

IT Toolbox

My previous post didn’t touch on these parameters until the end, but for good reason. While this series is about the value-add from UC with a vertical market focus, it’s also about understanding what collaboration means in 2017.

113
113
article thumbnail

Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

Tech Republic Security

Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe.

Company 125
article thumbnail

5 Little-Known Technologies That Will Improve Everyday Life

IT Toolbox

Humanity is moving forward and making great strides in technology. Every part of our lives is rampant with so many different devices that we don?t even notice anymore.

113
113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Zero day exploits: The smart person's guide

Tech Republic Security

This guide covers everything you need to know about zero day security exploits, which are secret vulnerabilities used by hackers to infiltrate PCs, networks, mobile phones, and IoT devices.

Mobile 122
article thumbnail

Install Guide: How To Run Windows 10 On Your Mac Computer

IT Toolbox

The primary operating system on your computer is Mac OS, but sometimes, you might need to work with Windows. So, what is the best solution to handle this situation?

Windows 113
article thumbnail

Building an Awesome CLI App in Go – OSCON 2017

SPF13

A workshop written and delivered by Steve Francia and Ashley McNamara at OSCON 2017 outlining the techniques, principles, and libraries you need to create user-friendly command-line interfaces and command suites before walking you through building your own app. Along the way, you’ll cover everything from how to design and build commands to working with and parsing flags, config files and remote config systems, and how to work with environment variables and 12-factor apps.

How To 100
article thumbnail

Intelligence community finds fix for VoIP security issues

IT Toolbox

The balance between protecting and sharing critical information has never been more crucial than in military environments where units from various countries are operating together. In such cases, VoIP and point-to-point video is becoming an increasingly important tool in high pressure security situations faced by the intelligence community and the Department of Defense.

VOIP 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3 simple tips to help you avoid hybrid cloud catastrophe

Tech Republic Cloud

Dell EMC's Heath Reynolds and Brian Ragazzi led a breakout session at the 2017 Dell EMC World detailing some of the major challenges businesses face with hybrid cloud and how to avoid them.

Dell 119
article thumbnail

Sportsman Boats floats on the ERP tide

IT Toolbox

Growing from six employees to 200 in four years is hard enough. Try doing that while adding an order of magnitude to the company’s manufacturing space. It’s no wonder Sportsman Boats needed a top-quality ERP solution – and fast.

Software 100
article thumbnail

Cracking Hitler's unbreakable code: How the Colossus computer helped beat the Nazis

Tech Republic Security

Hear recollections from Bletchley Park veterans on how efforts to crack the Lorenz cipher led to the creation of one of the world's first computers.

117
117
article thumbnail

CRM System Maintenance

IT Toolbox

Sooner or later your system is going to go sideways and it’s going to get sufficiently sideways that you're going to need help getting it right again. All things considered modern computers are quite reliable. But they still fail occasionally. When repair goes beyond a simple reboot, you're going to need help.

System 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Zayo Scores Two More California Data Centers

Data Center Knowledge

Acquires 2MW and 100,000 square feet in San Diego from Mexico's KIO Networks Read More.

article thumbnail

Awesome Procurement -Survey shows how business networks fuel innovation and business transformation

IT Toolbox

Uncover unique new research that identifies and measures how innovative companies have optimized their practices to overcome the many challenges facing business-to-business (B2B) commerce.

article thumbnail

Rackspace and Dell EMC Partner on Private OpenStack Cloud

Data Center Knowledge

Partnership aims to make private cloud easier for users Read More.

Dell 135
article thumbnail

Hybrid Cloud-The Past, Present, and Future

IT Toolbox

This post looks at the hybrid cloud in detail.

Cloud 183
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Dell EMC makes 6 key investments in the future of the data center and HCI

Tech Republic Data Center

At the 2017 Dell EMC World, the company unveiled new data, storage, and server products that aim to help customers more easily jump into hyperconverged infrastructure.

Dell 97
article thumbnail

Dell Venture Arm Has Been Quietly Funding Data Center Startups

Data Center Knowledge

Group that has been putting $100M annually into infrastructure firms comes out of stealth Read More.

Dell 107
article thumbnail

6 tips to protect your G Suite account from phishing scams

Tech Republic Security

After last week's phishing attack, Google detailed how it protects users, and what business customers can do to avoid similar scams.

Google 109
article thumbnail

12 top tech fields of the future

Network World

Top jobs Image by Thinkstock Tech jobs of the future will include programmers, analysts, application and system developers, database and network administrators, engineers, designers, architects, scientists, researchers, statisticians, specialists, project and system managers, system and data integrators, technicians and tech support, quality controllers, trainers, and consultants in each of the following 12 areas.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.