Tue.Jan 24, 2017

article thumbnail

Asia-Pacific Tech Spending Forecasts: Lackluster in 2017, Acceleration in 2018

Forrester IT

Forrester just released our forecast for the Asia Pacific market for business and government purchases of technology goods and services. CIOs in the Asia Pacific (AP) region will continue to face a business environment of high uncertainty and modest economic growth in 2017, with 3% growth in tech spending. Better economies in 2018 will push growth closer to 6%.

Trends 280
article thumbnail

GDS signals intent to move public sector off PSN

Computer Weekly

Government Digital Service’s Technology Leaders Network determines that the internet is an adequate solution to support the vast majority of public sector work

Internet 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Experiences Just Got Better

Forrester IT

Oh, hello friends, it's been too long! But I couldn't let today's news stay this far under the radar. With a relatively small announcement on its blog, Google announced that the first Instant Apps have gone live! As a reminder, Instant Apps are Android apps that are internally compartmentalized into individual views (atoms) that your users can interact with from web search results.

Mobile 249
article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

Carol M. Evenson. Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. Cloud services are generally pay-as-you-go solutions that offer flexibility and are scalable to business growth. With rising competition among cloud providers, customers benefit from falling prices and improving services.

Cloud 153
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Findings From The Forrester CRM Wave For Midsize Organizations

Forrester IT

We included 11 vendors in the CRM Forrester Wave™ for midsize organizations. These 11 vendors reported a total of about 200,000 midsize customers. Compared to CRM vendors tackling the enterprise space, these vendors typically offer more streamlined - and sometimes simpler - capabilities. We saw some similar - and some strikingly different trends in this market segment.

Trends 215
article thumbnail

On Building a “Data Culture” in a Real Organization

CTOvision

Dennis D. McDonald. In How to build a sustainable, value-focused data culture , Jodi Morton and Robert Parr discuss the role of the Chief Data Officer (CDO) in financial services firms. They state that the push for improved data governance needs to evolve from being reactive and regulation-driven to becoming more integrated with both the firm’s operations and its strategic goals.

Data 153

More Trending

article thumbnail

Update On The Megatrend of Mobility

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity. In this post we dive deeper into the trend of Mobility. This is the greatest leap in humanity's ability to stay connected since the advent of spoken word.

Mobile 150
article thumbnail

Executive interview: Kirk Bresniker, chief architect, HPE

Computer Weekly

HPE has developed a concept computing architecture which it says will power future generations of applications.

article thumbnail

From Monolithic Computing Came Client/Server Computing

IT Toolbox

A key element of the client/server model was that any computer, however, large or small, may function at some point as either a client or a server. It is a matter of what is being accomplished by the software that implements the client/server model.

Software 122
article thumbnail

Bromium mobilises endpoints to fight cyber attacks

Computer Weekly

Bromium evolves its micro-virtualisation security technology to gather threat intelligence from endpoints and automate checks and responses across an enterprise

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Broadband Networks in General

IT Toolbox

Adherence to both international standards and the IAs provide a greater likelihood of multivendor interoperability. BBF efforts are divided among a number of committees, including the Technical Committee, the Inter-Carrier Committee, the Testing and Interoperability Committee, and the Marketing and Education Committee. Other smaller committees and sub-committees have formed also.

Network 122
article thumbnail

Vendors Take Facebook Data Center Switches to Market

Data Center Knowledge

String of hardware and software products seek to commercialize Facebook's open source networking tech Read More.

article thumbnail

Servers and Services on the Network Part 6

IT Toolbox

By rolling all of these functions into the software layers of switches and routers, we were able to make this process a lot easier by modularizing the ports and allowing you to integrate and connect different cable media for different networks for bridging and then handle any protocol integrations within the routers as required.

Network 122
article thumbnail

Stockholm offers sustainable datacentre safe haven to hyperscale cloud firms

Computer Weekly

Sweden's capital city looks to capitalise on recent country-wide tax breaks for datacentre operators, to encourage cloud and colocation firms to set up shop in its new environmentally-friendly business parks

Cloud 120
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Android users beware: New AI can crack your Pattern Lock from afar

Tech Republic Security

New research from a group of universities found that specific video and computer vision algorithm software can unlock an Android Pattern Lock in five attempts.

Video 124
article thumbnail

CRM provider unveils mobile app in major upgrade

IT Toolbox

Mobile CRM packages are becoming increasingly important for sales people and senior management on the move. As a result, a number of CRM firms are focusing their efforts on this area in a drive to improve usability and deliver more features via mobile devices. Taking this into account, Denver-based Swiftpage, the maker of CRM platform Act!

Mobile 118
article thumbnail

Post Office offers banking for all UK accounts as bank branch closures continue

Computer Weekly

Customers of all UK banks can receive branch services through the Post Office after a deal agreed last year takes effect

Banking 138
article thumbnail

Leading VoIP phone maker reassures buyers following acquisition

IT Toolbox

Following its acquisition by VTech in November, leading VoIP phone manufacturer Snom Technology has issued a statement to reassure clients that its business will continue as usual under the VTech banner, with upgrades on various fronts as well as new products on the horizon.

VOIP 109
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

TechUK outlines its Brexit negotiation priorities

Computer Weekly

IT industry body TechUK outlines what it believes are the Brexit negotiation priorities for the UK IT sector

Industry 131
article thumbnail

Include the DBA when designing your application

IT Toolbox

The design requirements of an application usually determine the most effective database design and database administration support processes. If, however, the database administrator (DBA) is not present during the requirements definition process, sub-par performance can result. Essential DBA Choices and Processes.

article thumbnail

SAP 2016 results: cloud revenue almost €3bn, 5,400 S/4 customers

Computer Weekly

SAP declares full-year 2016 revenue of €22bn, of which nearly €3bn was cloud – almost 14%

SAP 137
article thumbnail

More Collaboration Strategies for Gen Z - Provide the Tools

IT Toolbox

The back end of this series is focused on strategies businesses can take to help Gen Z workers succeed as they enter the workforce. In many regards, their needs are no different than any other freshman class, and ultimately each new employee will go through their sink or swim phase.

Strategy 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Video: Top 5 ways to secure your IoT

Tech Republic Security

Don't let your smart bulbs and thermostats fall prey to attack by bots. Use these five tactics to secure your IoT devices.

Security 115
article thumbnail

4 Must-Read Benefits of Expense Management Software

IT Toolbox

Expense management software is a valuable resource for cost saving, auditing and financial analysis. It automates many of the tasks that are linked to expense management, such as payment processing and compliance. These programs are just as popular as manual expense reports, too.

Software 100
article thumbnail

Saudi Arabia again hit with disk-wiping malware Shamoon 2

Network World

The disk-wiping Shamoon malware, which was used in attacks that destroyed data on 35,000 computers at Saudi Aramco in 2012, is back; the Shamoon variant prompted Saudi Arabia to issue a warning on Monday. An alert from the telecoms authority, seen by Reuters, warned all organizations to be on the lookout for the variant Shamoon 2. CrowdStrike VP Adam Meyers told Reuters, “The Shamoon hackers were likely working on behalf of the Iranian government in the 2012 campaign and the more-recent attacks.

Malware 92
article thumbnail

5 Big Changes Businesses Will Go Through When Virtual Reality Hits

IT Toolbox

When people talk about virtual reality it's usually related to gaming. It's also only a few years away too, so are you prepared for what is about to come? Let's focus on some of the big ways it's going to change everything.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CIO interview: Bas Anneveld, Gumtree

Computer Weekly

When your parent is the internet phenomenon eBay, how do you make a difference?

Internet 120
article thumbnail

Case Study: Manufacturing ERP brings company up to speed at all levels

IT Toolbox

After business expanded eight-fold over a decade, parts manufacturer Quatro Composites knew it had outgrown its antiquated, spreadsheet-based data management system. But which of the 40 ERP systems under consideration would best help the company move forward? A wholly-owned subsidiary of Tec Industries, Quatro’s needs were multiple.

article thumbnail

Forrester: What can we learn from a disastrous year of hacks and breaches?

Tech Republic Security

2016 may go down on record as one of the worst for cybersecurity. Hacks, breaches, and leaks were everywhere in the news. Forrester has a few things for us to remember going forward.

87
article thumbnail

5 Ways Technology Will Create Huge Change In The Auto Insurance Industry

IT Toolbox

The car insurance industry hasn't seen a huge amount of change in the last hundred years. Here are some of the big changes about to affect the industry, which will hopefully be good for everyone.

Insurance 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.