Wed.May 10, 2017

article thumbnail

Edward Snowden: Closed public cloud platforms risk "disempowering" enterprises

Computer Weekly

NSA whistleblower tells OpenStack Summit, via video link, that investing in closed public cloud platforms can lead to users parting with more than just their money

Cloud 233
article thumbnail

Should CIOs Learn How To Forgive?

The Accidental Successful CIO

To forgive is divine, but is this something that CIOs should be doing? Image Credit: timlewisnm. Ah, the process of getting older. Each one of us is doing this every day and, with a little luck, we really don’t spent all that much time thinking about it. However, with increasing age comes more time for us to think about all of the things that have happened to us during our lives.

How To 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dell EMC World brings “bigger, faster, stronger” storage upgrades

Computer Weekly

All-flash additions plus hardware and software upgrades see platform refreshes across all Dell EMC storage offerings, as well as design changes in Isilon and Xtremio

Dell 189
article thumbnail

9 best practices to improve security in industrial IoT

Tech Republic Security

Dell EMC's senior product manager for IoT security, Rohan Kotian, hosted a presentation at Dell EMC World explaining how industrial enterprises can protect their IoT deployments.

Industry 167
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Blockchain economy on the horizon

Computer Weekly

Blockchain technologies will enable many new and disruptive business models than the internet itself, an expert predicts

Internet 222
article thumbnail

Microsoft Unveils New Cloud Services for AI and Industrial Sensors

Data Center Knowledge

Azure IoT Edge will allow that computing to take place on-site in local computing devices to speed things up. Read More.

Industry 180

More Trending

article thumbnail

4 questions businesses should be asking about cybersecurity attacks

Tech Republic Security

At the 2017 Dell EMC World conference, RSA senior director of advanced cyber defense, Peter Tran, walked through examples of real-world IT questions and how they could be answered.

Dell 157
article thumbnail

Durham Police to use artificial intelligence to help decide if suspects should be held in custody

Computer Weekly

Durham Police are to use artificial intelligence to help them decide whether or not to keep suspects in custody

article thumbnail

5 Reasons Why Your Business Needs ERP Software

IT Toolbox

Enterprise resource planning (ERP) solutions have been helping businesses to achieve their goals and objectives for a number of years. Ever since the early '90s, the ERP software industry began to take off to fill in a number of gaps and problems facing businesses from human resources to supply chain management. That rule hasn't changed. To this day, ERP software is the No.

Software 140
article thumbnail

The Data Center of the Future and Cloud Disaster Recovery

Data Center Knowledge

Disaster recovery and business continuity -- no longer a cumbersome duo. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Never trust cell phone networks with sensitive information

IT Toolbox

If you think cell phone SMS and voice communications are secure, think again.

Network 193
article thumbnail

Google Launches Its First Cloud Data Centers in AWS’s Virginia Backyard

Data Center Knowledge

Brings latest cloud region online in one of internet’s key nerve centers Read More.

article thumbnail

Vertical Market Collaboration Scenarios - Education

IT Toolbox

My last post looked at the healthcare vertical, and now the focus shifts to education. Before getting to that, some context needs to be added. The earlier posts have looked at the broader challenge of defining collaboration, and then understanding what that means for your organization.

Education 124
article thumbnail

Data Centers Need Better SLAs

Data Center Knowledge

Although buying a basic OEM warranty saves money in the short-term, upgrading a warranty package is extremely costly. Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Nordic region competes for datacentre dominance

Computer Weekly

The Nordic region is an attractive region for datacentres as demand for cloud services in the area grows

Cloud 157
article thumbnail

Massive, Six-Story Data Center in a Norwegian Mine Comes Online

Data Center Knowledge

It's cooled by fjord water, it expands one or several containers at a time, and it's enormous. Read More.

article thumbnail

Automation can turn tables on cyber attackers

Computer Weekly

Security defenders should use automation to turn the tables on attackers, according to the CTO of the US Department of Homeland Security

CTO 134
article thumbnail

Kubernetes: The smart person's guide

Tech Republic Data Center

Kubernetes is a series of open source projects for automating the deployment, scaling, and management of containerized applications. Find out why the ecosystem matters, how to use it, and more.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Trump’s ‘hire American’ rhetoric is stalling global IT services sector

Computer Weekly

The IT services sector is facing an important period as political decisions impact their business models

147
147
article thumbnail

French Websites Knocked Offline in Cyber-Attack on Cedexis

Data Center Knowledge

Three of five networks that Cedexis operates to manage web traffic for clients were partly disabled. Read More.

Network 140
article thumbnail

Customize Delivered Objects? Forget About It! Use Event Mapping Instead

IT Toolbox

In PeopleTools 8.55, the Related Content Framework gained a new feature that could change the way developers approach customizations. Event Mapping lets you inject your custom code without modifying any delivered objects.

article thumbnail

Crews Break Ground on Fourth Facebook Data Center in Iowa

Data Center Knowledge

Company says this is the largest of its nine data center construction sites. Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Network World

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year. Cisco had in March issued a “critical” security advisory for the IOS software that runs on some 300 models of its Catalyst switches and other networking equipment. +More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed + Cisco this week wrote : “A vulnerability in the Cisco Cluster Management Protocol (

Security 117
article thumbnail

How to quickly scan a document to your Dropbox account with Android

Tech Republic Cloud

Dropbox on Android finally receives a feature found on the iOS iteration — scanning. Here's how to quickly scan an image and save it to your Dropbox account as a pdf or jpg.

How To 116
article thumbnail

EnterpriseDB Postgres powers TfL tunnel monitoring

Computer Weekly

EDB, based on the open source Postgres database, is powering a new monitoring application at Transport for London

article thumbnail

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Network World

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks. The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.

Malware 107
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

RBS cuts hundreds of UK IT jobs

Computer Weekly

The Royal Bank of Scotland is cutting hundreds of tech jobs as it prepares for life as a smaller organisation

Banking 116
article thumbnail

How online marketplace Silk Road became the Craigslist for illegal drugs

Tech Republic Security

In less than two years, a Dark Web marketplace created by a twenty-something libertarian from Texas had generated more than $1.2 billion by selling drugs, weapons and cyanide online.

105
105
article thumbnail

Check Point boosts cloud-security education to help IT security pros stay relevant

Network World

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Check Point. “We try to explain how to be relevant in the cloud,” says Itai Greenberg, head of cloud security for Check Point.

article thumbnail

Beyond the fingerprint: IBM bolsters enterprise app security with behavioral biometrics

Tech Republic Security

IBM and SecuredTouch are bringing new behavioral biometric authentication based on factors such as typing patterns to enterprise applications.

IBM 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.