Wed.Jun 14, 2017

article thumbnail

The Machine of Tomorrow Today: Quantum Computing on the Verge

Data Center Knowledge

Startups, universities, government labs, and companies like IBM are racing to build computers that could potentially solve some problems that are now intractable. Read More.

IBM 190
article thumbnail

5 ERP Security Concerns You May Have Overlooked

IT Toolbox

The open-office floor plan (both loved and loathed) is a craze that swept corporate America in the past several years, eliminating walls and cubicles in favor of a communal environment. The idea is to increase collaboration and decrease hierarchy, but no matter how open an office became, there were always a few functions that remained behind closed doors — the back office.

Security 168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HR technology essential to cutting-edge customer service, say big businesses

Computer Weekly

If you can’t get your internal HR systems right, the business will suffer – Jaguar Land Rover, Lufthansa and Russia’s Sberbank explain why

System 175
article thumbnail

Vacation Troubles

IT Toolbox

I'm taking a home vacation day today. It's a real struggle not to go into work today! I've been racking up unused PTO for a while. I know it's there. I know it's mine to take. I know it's not weak to want to take time off. But for whatever reason, I just keep putting it off. "I'm too busy" I tell myself.

147
147
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Baby Boomers taking to social media in greater numbers

Computer Weekly

Older adults are more connected than ever before, says Ofcom, with almost half of 65 to 74-year-olds now having a social media profile

Media 172
article thumbnail

VoIP: What's the Latest Word?

IT Toolbox

Think for a minute: Do you think of anyone who doesn't have a mobile phone? Chances are you can't. Our mobile phones are always with us, but that doesn't mean our phone service is always there. We've all experienced the "no service" on our screens or that call we've been waiting for dropping after the first 10 seconds. There is a better way to communicate.

VOIP 145

More Trending

article thumbnail

Tech Savvy? You May Be More Susceptible to Cyber Crime

IT Toolbox

With this threat looming and with the possibilities of technology expanding constantly, we have seen the emergence of stereotypes that comment on how certain demographics interact with technology.

138
138
article thumbnail

How Can CIOs Help Their Staff To Better Understand Millennials?

The Accidental Successful CIO

CIOs have a responsibility to teach their staff how to manage millennials Image Credit: Scott Lewis. As the person with the CIO job it is your responsibility to make sure that your direct reports are doing a good job of managing their staff. After all, collectively these are the people who make up your IT department and your ability to deliver on the importance of information technology depends on their abilities.

Social 138
article thumbnail

Palo Alto Networks set to drive new era in security innovation

Computer Weekly

Palo Alto Networks announces a cloud-based application framework the company claims will enable its security platform to disrupt and change the security industry completely within a decade

Network 135
article thumbnail

How To: Resolving a System Hang During Patching, Remotely!

IT Toolbox

The time between clicking the "Restart Now" button and a successful reboot is always trying, but more so when a production server is concerned. What can you do if it's taking too long? Read on to find out!

System 133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Risk of major database attack, warns Rapid7

Computer Weekly

There will be a major database attack in the next year, unless businesses act to put in appropriate protection measures, a security firm has warned

Security 150
article thumbnail

Alibaba Cloud to Launch Data Centers in India, Indonesia

Data Center Knowledge

Future sites will bring total number of Alibaba Cloud locations to 17 Read More.

article thumbnail

Microchips implanted in hands could be in use for payments in 20 years

Computer Weekly

UK consumers are becoming more accepting that biometric authentication will become the norm for payments

article thumbnail

Alibaba to Use Own Immersion Cooling Tech in Cloud Data Centers

Data Center Knowledge

Plans to contribute technology to Open Compute Project Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Government stresses continuity of broadband policy after election

Computer Weekly

At the Connected Britain conference in London, digital minister Matt Hancock recommits to already-established broadband and mobile networking policy

Policies 139
article thumbnail

Light 4j Docker Container Chassis Ideal for IOT

IT Toolbox

ResinOS and Light 4J based containers could offer some of the highest performing utilities in the IOT space.

154
154
article thumbnail

Cloud service maturity up in the Nordics

Computer Weekly

Nordic businesses are increasing their use of the cloud, but more work is needed to make investments support business strategies

Cloud 144
article thumbnail

Power for the people gadgets

IT Toolbox

Just about, actually I would say all, technological knick nacks and doo dads we love to wear, carry and play with need electricity to run. It is these busy bee electrons which are tirelessly working to provide for our entertainment, computational and living needs. This power comes from several sources and for us, it starts with a plug and a wall socket.

113
113
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

British Airways to outsource contact centre work

Computer Weekly

British Airways is evaluating technologies from an outsourcing company as an option to replace contact centre staff

Company 147
article thumbnail

Five traits employers should look for when hiring cyber security professionals

Tech Republic Security

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

Security 152
article thumbnail

Lancaster University begins datacentre research to establish cloud latency causes

Computer Weekly

Researchers, in collaboration with Microsoft and others, want to stamp out data processing delays in datacentres to improve user experience and energy efficiency

Research 120
article thumbnail

How to Fix Your Data Growth Problems with Object Storage

Data Center Knowledge

Cloud object storage has a lot to offer the enterprise IT leader with exabyte-level scalability demands and budgetary constraints. Read More.

Storage 122
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lufthansa Systems ‘crowdfunds’ BI to mine flight data

Computer Weekly

Open source business intelligence tool enables airline to gain new insights from a decade’s worth of ticket sales

Airlines 139
article thumbnail

New Windows XP patch: Microsoft issues extraordinary fix to protect PCs against next WannaCry

Tech Republic Security

To limit the number of machines at risk from self-replicating malware like WannaCry, Microsoft yesterday patched vulnerabilities on Windows XP and other unsupported operating systems.

Windows 124
article thumbnail

DataBank Continues Buying Spree, Acquires Stream’s Dallas Data Center

Data Center Knowledge

Facility becomes its largest data center in the red-hot Dallas data center market Read More.

article thumbnail

MDT Windows Updates Build Report

Mick's IT Blog

I found it nice to be able to get a clean, filtered report on what Windows updates got installed during the build process. This allows me to inject those updates into the MDT Packages so they get injected into the image before it is laid down to speed the process up. I had published this tool two years ago and decided to revamp it to also include email functionality.

Windows 109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Report: 19% of business passwords 'easily compromised'

Tech Republic Security

Nearly one in five enterprise users have passwords that are weak or shared, putting their business at risk for cyber attack, according to a new report from Preempt.

Report 122
article thumbnail

Gatwick and six other airports to hold international hackathon

Computer Weekly

Trans-global hackathon aims to develop applications to improve air passenger experience

article thumbnail

US indicts North Korea for host of cyberattacks, expects more to come

Tech Republic Security

A North Korean entity called Hidden Cobra was behind a series of cyberattacks in the US using sophisticated tools and targeting a diverse group of entities.

Groups 126
article thumbnail

Cyber-hygiene

IT Toolbox

Why is it apparently so easy for hackers to mount cyber attacks?

147
147
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.