Wed.Jan 25, 2017

article thumbnail

Reinvent the Web to Win the Mobile Moment

Forrester IT

Last time, we talked about how your mobile website sucks. You and your agency partners took a valiant swing at fixing it using responsive web design techniques. But most of you did that without asking a critical question: What are my customers trying to get done on their phones? So you created one-size-fits-all responsive retrofits rather than reinventing your website for the way we live now -- on our phones.

Mobile 232
article thumbnail

Solarflare’s Application Nanosecond TCP Send

CTOvision

Marty Meehan. Certain classes of network application fall into the category of high-performance request-response applications. These applications require either very low latency (<< 1μs) between receipt of request and transmission of response, the ability to handle a very large number of such transactions (>>100ktps), or both. FPGAs can accelerate such applications by speeding up the algorithmic processing and eliminating the cost of moving messages between the network interface

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Twitter botnet has cyber security implications, say reseachers

Computer Weekly

A researcher is urging the security community to consider the implications of massive botnets of fake Twitter accounts

Security 178
article thumbnail

Renown Hacker: ‘People, Not Technology, Most Vulnerable Security Link’

Data Center Knowledge

Despite their link to drugs, murder, extortion—you name it–we glamorize old-time organized crime figures like Al Capone, Bugsy Siegel and Lucky Luciano. These gun-toting thugs, donning pin-striped suits and fedoras and smoking the finest Cuban cigars, exuded a certain class and charm despite.

Security 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Society urged to nurture cyber talent at Microsoft security conference

Computer Weekly

Cyber security investigative reporter Brian Krebs urges society to cultivate more “hackers for good” in today’s age of internet supervillains

article thumbnail

Cisco Interrupts AppDynamics IPO, Agrees to Buy It for $3.7B

Data Center Knowledge

Startup was due to price shares Wednesday in year's first big tech IPO Read More.

169
169

More Trending

article thumbnail

IP: Datagram Reassembly Part 3

IT Toolbox

When adding a new fragment to a list, IP must check to see if it has all the fragments that comprise a datagram. Procedure ipfjoin examines a list of fragments to see if they form a complete datagram.

122
122
article thumbnail

HoloLens tested for bridge inspections

Computer Weekly

Cambridge University is investigating how augmented reality could help improve safety and lower the cost of inspecting large structures, such as bridges

147
147
article thumbnail

IP: Datagram Reassembly Part 2

IT Toolbox

Procedure ipfadd inserts a fragment on a given list. For the normal case, the procedure is trivial; ipfadd merely calls enq to enqueue the fragment and resets the time-to-live field for the datagram.

122
122
article thumbnail

Emergency Services Network will not be ready in time, says PAC

Computer Weekly

A Public Accounts Committee examination of the Emergency Services Network concludes that the controversial project may need more testing and assurance than its delivery date allows for

Network 137
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Should CIOs Do About Their Shadow IT Department?

The Accidental Successful CIO

Within your IT department lurks a shadow IT department Image Credit: Domi. As the CIO of your company’s IT department, you’d like to think that you know what’s going on in your department because of the importance of information technology. I mean, you control the budget for your department and everyone in the department works for you so it makes sense that if you don’t fund it, then it’s not going to happen.

Cloud 122
article thumbnail

Accenture adds voice and VR to data analytics for RBS Six Nations

Computer Weekly

Accenture, in the sixth year of its tech partnership with the RBS Six Nations rugby championship, adds voice interface and more virtual reality to data analytics effort

Data 130
article thumbnail

VoIP phone cases get harder for tougher uses

IT Toolbox

As VoIP phones are rolled out into public spaces, their cases need to be all that much tougher to handle increased use. It’s no surprise that law enforcement and correctional facilities are among the most demanding sectors, especially because they are eager to introduce VoIP for use in their premises but require devices that can stand up to more-than-usual punishment.

VOIP 116
article thumbnail

Norfolk pub becomes first Vodafone Ciss programme hub

Computer Weekly

The Wortwell Bell in Harlestone, Norfolk, becomes the first “community hub” to receive indoor 3G mobile coverage through Vodafone’s Community Indoor Sure Signal scheme

Mobile 129
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Common Email Errors with CRM

IT Toolbox

Email is one of the most powerful tools in a modern marketer's toolbox. Campaigns using email are one of the most powerful ways to reach prospects and to move them to action. If the email is done right, that is. All too often, though, the impact of an email campaign is blunted by simple common mistakes that undercut the message.

Tools 116
article thumbnail

US man jailed for hacking into celebrity accounts

Computer Weekly

Edward Majerczyk is jailed for 9 months and ordered to pay $5,700 compensation for hacking iCloud and Gmail accounts and stealing celebrity nude photos

131
131
article thumbnail

High Tech Snowmobile

IT Toolbox

Snowmobile Delivers 100,000 Terabytes of Data. Since the days when AOL was still sending out free install discs in the mail, speed - or more accurately the lack of it - has always been one of the primary complaints from computer owners.

Data 109
article thumbnail

Outdated IT budget models slow enterprise cloud adoption, CIO research suggests

Computer Weekly

Research from IT services provider Trustmarque suggests the way that enterprises run their IT budgets is out of step with how they consume and pay for cloud

Budget 127
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Career Craft: Chapter 1 Review

IT Toolbox

Welcome to the Career Craft discussion. For those of you who have not been following along in detail, this is a chance to get caught up. I also want to share some of my own perspective on what is happing so far.

article thumbnail

Nordic CIO interview: Peter Krantz, Sweden’s national library

Computer Weekly

Making information accessible for hundreds of years is the challenge facing the CIO at Sweden’s Kungliga Biblioteket

139
139
article thumbnail

A tale of two employees

Eric D. Brown

I was recently talking to a CIO friend of mine. She has a really good team of people working for her and has recently gone through a hiring spell where she has six new-ish employees on her staff. All six have been at the company from anywhere between 1 month to 7 months. While talking to this CIO, she was relating some stories of a few of these employees.

article thumbnail

NetApp: Solidfire to get some Snap functionality but not NVMe

Computer Weekly

NetApp Solidfire execs talk of roadmap SnapMirror and SnapVault functionality in Solidfire, but NVMe will have to wait until customers are ready to pay for it

119
119
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Big Data - Mainframe Performance Tuning

IT Toolbox

Big Data is here, or will soon be here for the majority of IT enterprises. Database Administrators must now deal with large volumes of data and new forms of high-speed data analysis. If your responsibility includes performance tuning, here are the areas to focus on that will become more and more important in the age of Big Data. Source Data Acquisition.

Big Data 109
article thumbnail

Maersk Line underpins shipping operations with network management

Computer Weekly

Container shipping company Maersk Line signs a five-year deal with Riverbed to monitor business-critical apps and services and troubleshoot network performance bottlenecks

Network 114
article thumbnail

Encryption Key to Compliance Requirements as Companies Move to Cloud

Data Center Knowledge

According to the Consumer Loss Barometer from Forbes Insight and KPMG surveys, loss of reputation is the dominant concern for businesses in the event of a breach, even more than the financial losses involved. Read More.

Company 104
article thumbnail

How to back up MySQL databases from the command line in Linux

Tech Republic Data Center

Whether you're running a LAMP stack on Ubuntu or CentOS, you need to back up your MySQL databases. Learn how to do this with the help of the mysqldump command.

How To 105
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Dropbox bug sends years-old deleted files back to user accounts

Tech Republic Security

A recently discovered bug affecting cloud company Dropbox resulted in data that was supposedly deleted years ago being restored back to user accounts.

Cloud 107
article thumbnail

Turbocharge your customer engagement with video messaging

IT Toolbox

Video creation has been painfully slow to expand beyond marketing departments. It often involves high costs, is complex to manage and requires a significant commitment of time and resource - not to mention the large price tags that can be attached to outsourcing altogether.

Video 100
article thumbnail

Russia's FSB arrests Kaspersky's top cybercrime investigator allegedly for treason

Network World

A top-notch cybercrime investigator, who heads up the Kaspersky Lab team that investigates hacks, has been arrested by Russian law enforcement for possible treason. An unnamed source close to Russia’s Federal Security Service (FSB) told the newspaper Kommersant that Ruslan Stoyanov may be linked to an investigating into Sergei Mikhailov, a deputy chief of the FSB’s Center for Information Security.

article thumbnail

Making CRM Mobile

IT Toolbox

Mobile devices are for more than just emails. Today CRM users are finding that the power of a mobile connection allows them to conduct business over their smartphone or other device in the same way they can do it sitting at their desk. Part of this is the result of more capable devices to support people on the road.

Mobile 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.