Mon.Aug 07, 2017

article thumbnail

Forrester warns CIOs of cloud market consolidation risks and rewards

Computer Weekly

Market watcher's latest cloud report outlines how the consolidation of the cloud software and infrastructure market can mean good and bad news for enterprises

Cloud 253
article thumbnail

Three Ways to Generate Profit With the Data You Already Have By Andrew Wells and Kathy Chiang

CTOvision

Editor's note: This article captures insights from Andrew Wells and Kathy Chiang, co-authors of the new book, Monetizing Your Data: A Guide to Turning Data into Profit-Driving Strategies and Solutions. -bg Build it and they will come. That is the view many organizations maintain about their data lakes and data warehouses. Companies are rapidly investing in […].

Data 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

UK mulls hefty fines for CNI providers with poor cyber security

Computer Weekly

The UK is considering the same hefty fines for critical national infrastructure (CNI) providers with poor cyber security as those failing to protect the personal data of UK citizens

Security 193
article thumbnail

O’Reilly Velocity Conference NYC 1-4 Oct 2017

CTOvision

The O'Reilly Velocity Conference is the best place on the planet for web ops and systems engineering professionals like you to learn from your peers, exchange ideas with experts, and share best practices and lessons learned for handling modern systems and applications. Register Today for O'Reilly Velocity Conference New York, 2017. Save 20% with code: […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cultural change a critical but neglected element of IoT security

Computer Weekly

Managing how people within an enterprise deal with data is a vital element of shoring up security around the internet of things, says Vodafone

Security 205
article thumbnail

The Era of Mobile Apps Are Changing Small Business as We Know It

IT Toolbox

Mobile phone technology has gotten to the point that a survey has shown that Americans now spend more time looking at their phones than they do watching television. Out of all that mobile phone time, nearly 90 percent of it is devoted to using applications.

More Trending

article thumbnail

IBM Says It Has Beat Facebook’s AI Server Scaling Record

Data Center Knowledge

Researchers design a way to manage massive GPU clusters while keeping network bottlenecks to a minimum. Read More.

IBM 204
article thumbnail

The LAN: A History Network Operating Systems Part 1

IT Toolbox

Under the best of circumstances, the end-user should not even know that a network exists. If he wishes to do something simple, like copy a file from one place to another, it should be possible to use something like the old MS/DOS copy command and simply type: COPY c:mydata.dat p:yourdata.dat.

article thumbnail

Security industry welcomes planned UK Data Protection Bill

Computer Weekly

The cyber security industry has generally welcomed planned UK data protection legislation, but some say it is hypocritical in the light of the Investigatory Powers Act

Industry 139
article thumbnail

IoT-device swarm intelligence: Think about security before it's too late

Tech Republic Security

Researchers warn that security is historically an afterthought. With everything from thermostats to drones likely belonging to IoT-device swarms in the near future, that's not wise.

Security 150
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Systems of insight light way ahead for data

Computer Weekly

Computer Weekly looks at why data management must become oriented towards business outcomes, not technology management outcomes

System 163
article thumbnail

How to Rapidly Plan Digital Products and bring Amazing MVPs to Market Smarter and Faster

Social, Agile and Transformation

When it comes to planning new digital products, I find many organizations fall into one of two camps. "Analysis Paralysis" Camp - These organizations are slow to endorse new product ideas. They send sponsors and product managers back for more and more market research, industry analysis, financial forecasting, and other activities to build up organizational confidence that they are embarking.

Analysis 123
article thumbnail

Gaming apps ‘main source’ of mobile phishing attacks, research shows

Computer Weekly

Analysis of 100,000 corporate devices shows more than a quarter of traffic going to phishing domains was from gaming apps

Research 163
article thumbnail

Stop treating users as the enemy when it comes to cybersecurity

Tech Republic Security

Users get a bad rap for cybersecurity. Find out why making them part of your organization's cybersecurity solution is critical to staying secure.

Security 141
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

TSG 1899 Hoffenheim gets 'faster in the head' with SAP analytics

Computer Weekly

TSG 1899 Hoffenheim has been using SAP’s Hana database and applications to speed up players mentally, as well as using SAP Hybris to sell shirts

SAP 145
article thumbnail

IBM’s Tape Breakthrough May Change Cold Storage – But Not Anytime Soon

Data Center Knowledge

Researchers find a way to jam more data than ever onto a square inch of tape Read More.

Storage 160
article thumbnail

UK government starts recruiting digital experts for Brexit

Computer Weekly

Department for International Trade advertises job for digital designer to support future trade arrangements

article thumbnail

NTT’s Dimension Data Said to Attract Interest From MTN, Vodacom

Data Center Knowledge

Didata management is said to also mull buy back of business; MTN is said to weigh offer of as much as $600 million for unit Read More.

Data 117
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Cloud Machine Learning Engine: The smart person's guide

Tech Republic Cloud

In 2016, Google gave businesses the ability to build machine learning models using its cloud platform. TechRepublic's comprehensive guide explains how it works and why it matters.

Google 113
article thumbnail

As Tech Execs Rally Around Kushner, Government Cloud Adoption Still Has Ways to Go

Data Center Knowledge

White House starting to work with companies, including Apple and Google, to get government to more effectively use technology Read More.

article thumbnail

Top tips to avoid a costly Office 365 subscription bill

Computer Weekly

The Office 365 cloud-based productivity suite is Microsoft’s next strategic platform.

Licensing 137
article thumbnail

Cisco Says it Lost Some Meraki Customer Data

Data Center Knowledge

A configuration mistake is to blame, according to the company. Read More.

Data 144
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to calculate the cost of data breaches

Tech Republic Security

The cost of data breaches in the US is on the rise. Wendi Whitmore, of IBM's X-Force Incident Response & Intelligence Services, tells how to reduce the cost of cyber-attacks.

How To 103
article thumbnail

The 4 Apps Every Student Needs

IT Toolbox

This post looks at a few great apps for students.

124
124
article thumbnail

UK may fine tech companies millions if they can't protect your data from a breach

Tech Republic Security

The UK government's plans to update its data protection laws could result in fines for companies that neglect to properly secure and manage user data.

Company 108
article thumbnail

VMware Applies Polish in Latest vSphere Release

Data Center Knowledge

Says first update to vSphere 6.5 makes it a stable release Read More.

Vmware 107
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to get users on board with two-factor authentication

Tech Republic Security

Having trouble convincing employees in your organization to use two-factor authentication? Here's a guide on how to break it down in a way that makes sense to the average user.

article thumbnail

DevOps is a waste of your time if you aren't fully committed

Tech Republic Data Center

A new survey from New Relic suggests that a half-hearted approach to DevOps may be detrimental to your company's success in digital transformation.

Devops 83
article thumbnail

Red Hot Steel, Riches, and the Revolution

IT Toolbox

Is your life is shackled to technology?

113
113
article thumbnail

UK mandates hacking protection for the cars of the future

Tech Republic Security

New government guidance coming out of the UK will require automobile engineers to make sure their connected and automated vehicles are better protected from hackers.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.