Mon.May 01, 2017

article thumbnail

Bimodal IT Is Past Its Due Date: Providing Speed And Innovation Need To Top The CIO's Agenda

Forrester IT

Many CIOs have embraced bimodal IT as a way to create relevance for the technology organization in the age of the customer. With marketing, CX, and other teams increasingly building their own development teams or turning to outside agencies for their technology needs, CIOs have recognized that they need to help drive fast change, not be a source of friction.

Security 371
article thumbnail

How Do You Define Cloud Computing?

Data Center Knowledge

Almost everyone has his or her own definition of cloud from “it’s on the internet” to a full-blown technical explanation of the myriad compute options available from a given cloud service provider. Read More.

Cloud 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Not too late to catch Digital Transformation Forum, 2017

Forrester IT

The moment of truth for your digital re-invention has arrived. Digital technology has rendered your legacy systems obsolete, and has liberated your customers to adopt - and abandon - your offerings at a moment's notice. You already know it's time to change. You need to transform your firm to meet your customers' expectations and ensure flexibility for the future.

Meeting 225
article thumbnail

Dealing with data under GDPR

Computer Weekly

With the General Data Protection Regulation due to be enforced next year, Computer Weekly looks at how to address the requirements to suit your business

Data 221
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Backup and Recovery Startup Rubrik Raises Funds at $1.3B Valuation

Data Center Knowledge

Newly minted unicorn hopes new-gen cloud-compatible backup/recovery software will replace legacy tech by Dell, Veritas Read More.

Backup 189
article thumbnail

Amped Wireless AC2200 is More Than a Simple Range Extender

IT Toolbox

In my work as an occasional analyst and product reviewer, I get to see some pretty cool wireless stuff. And though my heart belongs to enterprise-grade WLAN systems, I do get jazzed when I get to lay hands on decent (and practical) consumer grade Wi-Fi gear.

Wireless 113

More Trending

article thumbnail

Recover Shipping Duties With An Importer Of Record

IT Toolbox

When a shipment of goods arrives at a foreign border, it undergoes a complex and comprehensive process before officials accept it into the country. For specialty items such as IT equipment, dual-use goods, and controlled-use goods, the procedure becomes even more involved as these materials have the capabilities to be used both for peaceful and military applications.

article thumbnail

The Great Data Center Headache – the Internet of Things

Data Center Knowledge

Thought virtualization and cloud computing were challenging? Get ready for the next big thing. Read More.

article thumbnail

Will Technology ever fail you?

IT Toolbox

Technology is now everywhere. It's in your pocket, on your desk, in your automobile, heck it's even in your coffee maker these days. For the most part, this is a good thing because technology helps us with convenience and efficiency (why we're still so busy is another blog post all together).

100
100
article thumbnail

Done Deal: Equinix Closes $3.6B Verizon Data Center Acquisition

Data Center Knowledge

World’s biggest retail colocation provider becomes even bigger Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook exploited emotions of young users to sell ads, leaked document says

Tech Republic Security

A leaked Facebook document describes how the company used algorithms to identify when users as young as 14 are feeling vulnerable, and target advertising to them.

article thumbnail

With LinuxKit, Docker Learns to Love Open Source Once Again

Data Center Knowledge

New Linux Foundation project to help sneak Linux into Windows servers, Mac laptops, IoT devices Read More.

article thumbnail

Identity theft is alive and well--and fraudsters keep getting richer

Tech Republic Security

Last year, cyber criminals netted 16 billion dollars in the US alone. Find out why fraudsters are so successful and what you can do to stay safe.

.Net 122
article thumbnail

How Practical is Dunking Servers in Mineral Oil Exactly?

Data Center Knowledge

Submerging servers in dielectric fluid? Stock up on paper towels. Read More.

142
142
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to resolve SSL certificate warnings produced by the latest Chrome update

Tech Republic Security

The latest Chrome update adds a stringent security feature which can prompt certificate warnings when accessing internal sites. Learn the details and how to mitigate this prompt on Windows systems.

How To 104
article thumbnail

Network monitoring tools: Features users love and hate

Network World

Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need a robust network monitoring tool that helps them manage the network, identify problems before they cause downtime, and quickly resolve issues when something goes wrong. Five of the top network monitoring products on the market, according to users in the IT Central Station community, are CA Unified Infrastructure Management, SevOne, Microsoft System Cent

Network 101
article thumbnail

Smart Cincy Summit: 11 ways to become a smarter city

Tech Republic Big Data

In Ohio, Cincinnati officials are focusing on data and analytics to become a connected city. Here are 11 video interviews with public and private sector leaders who are helping to make this happen.

Video 109
article thumbnail

IDG Contributor Network: Data breaches: It’s still personal

Network World

In a blog post last September, I highlighted how data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something much more personal—identities. Unsurprisingly, this trend continued throughout the remainder of the year. According to the recently released Breach Level Index , 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86 percent compared to 2015.

Data 96
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Free PDF ebook: The cloud v. data center decision

Tech Republic Data Center

In this joint special feature from ZDNet and TechRepublic, we examine the pros and cons of shifting workloads to the cloud and keeping them on premises. The whole series of articles is available as a free download.

article thumbnail

Leaked document shows how Facebook can target emotionally vulnerable teens for ads

Network World

Facebook is so proud of its algorithms, it conducted research about exploiting posts by kids as young as 14 to show how its algorithms could help advertisers pinpoint emotionally vulnerable moments for the purpose of targeted ads. The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez.

article thumbnail

Report: Despite cloud growth, on premise data centers still dominate enterprise compute

Tech Republic Data Center

While most companies are moving some of their workloads to the cloud, 65% of workloads remain in enterprise owned and operated data centers.

article thumbnail

8 Ways Businesses are Vulnerable to Cyber Attacks

IT Toolbox

This post looks at a few ways businesses are vulnerable to online attacks.

113
113
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Network monitoring tools: Features users love and hate

Network World

Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need a robust network monitoring tool that helps them manage the network, identify problems before they cause downtime, and quickly resolve issues when something goes wrong. Five of the top network monitoring products on the market, according to users in the IT Central Station community, are CA Unified Infrastructure Management, SevOne, Microsoft System Cent

Network 74
article thumbnail

Cloudera's new data science tool aims to boost big data and machine learning for businesses

Tech Republic Big Data

Cloudera has announced the general availability of its Data Science Workbench, a new self-service tool that could help speed the time to value for advanced analytics and deep learning.

Tools 84
article thumbnail

New products of the week 5.1.17

Network World

New products of the week Image by HPE Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.

Network 74
article thumbnail

Speed Phreak #2: Matching Inflows and Outflows

IT Toolbox

Priceless: At least so far, it's easier to ignore price

100
100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Public clouds are calling to IT engineers -- and their wallets

ComputerWorld IT Management

Less than one-fifth of enterprise IT assets are in the cloud, but it looks like more are on the way. One-third of data-center professionals and IT practitioners plan to deploy workloads in the cloud in the next year, according to a survey by the Uptime Institute, an advisory group focused on improving critical infrastructure. Companies still rely mostly on their own infrastructure and multi-tenant data centers, including collocation facilities, the survey found.

Cloud 75
article thumbnail

Vulnerability hits Intel enterprise PCs going back 10 years

Network World

Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over nearly the past decade. The vulnerability, disclosed on Monday, affects features in Intel firmware that are designed for enterprise IT management. Enterprises using Intel Active Management Technology, Intel Small Business Technology and Intel Standard Manageability on their systems should patch them as soon as possible, the company says.

Intel 64
article thumbnail

The Business Implications of Machine Learning

Dataconomy

As buzzwords become ubiquitous they become easier to tune out. We’ve finely honed this defense mechanism, for good purpose. It’s better to focus on what’s in front of us than the flavor of the week. CRISPR might change our lives, but knowing how it works doesn’t help you. VR could. The post The Business Implications of Machine Learning appeared first on Dataconomy.

article thumbnail

Career Watch: Be wary of IT employment contracts

Network World

Jeffrey Scolaro , an attorney at Daley Mohan Groble PC in Chicago and a member of Legal Services Link , answers questions about employment contracts. Are employment contracts for IT workers negotiable, or are they one-size-fits-all? The axiom that “everything is negotiable” should be where all IT professionals begin their assessment of proposed employment contracts.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.