Fri.Jan 27, 2017

article thumbnail

Not Only GDPR. A New Set Of Privacy Rules Is Here.

Forrester IT

Just after a few months since the European Parliament approved the final version of the new General Data Protection Regulation (GDPR) , the European Commission is working on updating yet another set of privacy rules. The European Commission published a new text that, when approved, will replace the current ePrivacy Directive : the EU law that ensures confidentiality of communication and the protection of personal data in the electronic communications sector.

Data 227
article thumbnail

GDPR highlighted on Data Protection Day

Computer Weekly

Businesses dealing with EU citizens' data urged to ensure they are on track to comply with the GDPR in less than 16 months, as the world marks Data Protection Day 2017

Data 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving Distributed Analytics and Private Cloud Through Enhanced Networking

CTOvision

Marty Meehan. Every agency buys computational capacity to enable its mission objectives. Servers provide these agencies with the computational horsepower needed to tackle todays complicated national security and intelligence problem sets. Unfortunately, the commoditization of the server market has led to decision makers focusing solely on components (such as CPU’s, memory, and disks) when developing the specifications for new server procurements.

Network 151
article thumbnail

Cloud gives financial boost to Alphabet, Microsoft and Intel

Computer Weekly

Cloud computing is making significant contributions to driving the revenues for companies in the technology sector, according to quarterly results posted by Alphabet, Microsoft and Intel

Intel 150
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cloud Integration: Oracle Eloqua Marketing Cloud Service REST API 2.0

IT Toolbox

In this article, we will identify how Magic xpi Integration Platform can access the extended capabilities of the Oracle Eloqua Marketing Cloud REST API 2.0 for the same basic structures of Data Integration and Process Integration handled by the REST API 1.0.

Oracle 130
article thumbnail

Post Office facing group litigation over Horizon computer system after watershed decision

Computer Weekly

The group action against the Post Office that alleges sub-postmasters have been wrongly punished for accounting errors gets a green light from the High Court of Justice

Groups 152

More Trending

article thumbnail

Bett 2017: Knowing what edtech to invest in is a challenge for schools

Computer Weekly

Minster Rob Halfon has urged those building use cases for tech in schools to help others choose the right technology for use in the classroom

140
140
article thumbnail

How UC is Falling Short - it's Telephony-Centric

IT Toolbox

I began this series by talking about the dangers of letting vendors set expectations when planning for UC. Pretty much all businesses need better tools and processes to enable collaboration, so the underlying appeal of UC is clear.

Tools 122
article thumbnail

Growing UK's tech skills base will make or break prime minister's industrial strategy, panel claims

Computer Weekly

Speakers at the Parliamentary Office of Science and Technology's industrial strategy debate demand greater clarity on how the government intends to tackle the UK tech and science sector's skills, diversity and regional inequalities

Strategy 124
article thumbnail

Five Ways to Harden Your SaaS Security

IT Toolbox

Trust us, we’ll make sure your data is secure. That’s not a lot of real certainty, especially when it comes to customer and proprietary data that can ruin your business if leaked. Yet, many businesses hand over their data to software-as-a-service (Saas) providers and more or less trust that the SaaS provider will keep the data safe. This is a huge leap of faith.

Security 116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

#techmums uses corporate partnerships to reach a million mums by 2020

Computer Weekly

Not-for-profit #techmums hopes to give technology skills to one million mothers by 2020 through partnerships with corporate firms

140
140
article thumbnail

The rise of the Cloud that moves the IT out of the enterprise (v)

IT Toolbox

continuing from. Still, most enterprises are not in the business of IT (iv). Virtualisation to the aid of the enterprise IT optimisation (iii).

article thumbnail

NHS Digital picks peering exchange provider for HSCN

Computer Weekly

The development of the new Health and Social Care Network is moving ahead as NHS Digital signs Redcentric to provide peering exchange services

Social 127
article thumbnail

How to use Zarp for penetration testing

Tech Republic Security

Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Union to fight CSC job cuts that threaten NHS services

Computer Weekly

Union to fight a planned 22% cut to CSC's UK workforce, which could impact customers including the NHS

139
139
article thumbnail

Five Best Practices for Securing Your Data Center

IT Toolbox

A mere 10 years ago, best practices for keeping your enterprise data center secure were entirely different. With the cloud, BYOD and virtualization firmly entrenched in most data centers, securing data is a dramatically different proposition from what it used to be.

article thumbnail

Microsoft to teach more than 560,000 people digital skills

Computer Weekly

Technology giant Microsoft announces a programme designed to boost digital skills and tech job prospects across the UK

Microsoft 122
article thumbnail

Technology That Could Mean The Difference Between Businesses Winning And Losing

IT Toolbox

Trying to grow a business without it today will give competitors the edge over you. If you want to stay ahead of the game you need to be using the technology everyone else is, so let's look specifically at a few different things that could mean the difference between winning and losing.

109
109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BT profits plunge after Italian accounting scandal

Computer Weekly

BT’s pre-tax profit drops 37% as the telecoms giant comes to terms with the extent of massive corruption at its Italian business

117
117
article thumbnail

Six Security Questions to Ask Your Cloud Provider

IT Toolbox

At first businesses shunned the cloud because of security concerns. Then business embraced it as a better, simpler way to handle security (let someone else handle it). But the cloud brings a false sense of safety to many businesses. “The cloud is built on software, and all software has defects.

Cloud 100
article thumbnail

Report: Digital Bridge to Acquire Vantage Data Centers

Data Center Knowledge

Deal would be DB’s second data center provider acquisition this year Read More.

article thumbnail

Is your security program based on hard evidence or compliance voodoo?

IT Toolbox

What do you think of when you hear information security ? If you’ve been working in and around IT for a while, I’m guessing that things like documented security policies, network and endpoint controls, user training, disaster recovery plans and the like come to mind. After all, these elements make up the essence of a solid information risk management program.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amazon launches Cloud Directory, purpose-built storage for hierarchical data

Tech Republic Cloud

AWS recently launched Cloud Directory to the public. It is a scalable, managed service geared toward cloud and mobile applications, and you can try it free for a year.

Cloud 94
article thumbnail

How to think like a criminal hacker to strengthen your network environment

IT Toolbox

It’s easy to talk about how security testing initiatives are carried out from the perspective of an attacker but quite another to actually do it well. Whether it’s in-house or outsourced, this approach must be taken.

Network 100
article thumbnail

IBM Says SoftLayer Cloud Outage Limited to User Portal

Data Center Knowledge

Not having access to the user interface is not a small issue for customers Read More.

IBM 122
article thumbnail

Nixing credential re-use across unrelated systems

IT Toolbox

It’s no surprise that weak passwords are one of the most common security exploits. Regardless of an organization’s size, industry, or security maturity – no network is immune to this weakness. Based on my experience, I would argue that weak passwords are the weakness that creating the most business risk – both measurable and immeasurable.

System 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

H5 Acquires ByteGrid’s Massive Cleveland Data Center

Data Center Knowledge

Plans to expand capacity, go after wholesale cloud deals Read More.

article thumbnail

5 Ways To Step Out Of Your Bubble To Help Skyrocket Your Business

IT Toolbox

If you live in a bubble it's hard to see how your business is going to grow. Even though it's possible to find success when you don't challenge yourself, it's fairly obvious you'll be leaving money on the table. Lots of money if you have tons of potential. To prevent that from ever happening we're going to look at a few different ways you can step out of your comfort zone.

100
100
article thumbnail

Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition

Network World

Researchers at the Intelligence Advanced Research Projects Activity (IARPA) are looking to the public to build a next-generation, automated fingerprint recognition system. The idea behind the competition, called the “ Nail to Nail (N2N) Fingerprint Challenge ” – which offers $325,000 worth of prizes – is to develop a system that allows for more distinguishing data to be collected from fingerprint biometrics but also eliminates the time and cost associated with using human operators, IARPA said.

article thumbnail

Prep your Enterprise Data Warehouse for Big Data

IT Toolbox

Using advanced analytics to analyze business data is common, especially in large companies with many customer-facing systems. As more and more data is made available the enterprise stages large data stores into the enterprise data warehouse.

Big Data 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.