Mon.Apr 24, 2017

article thumbnail

For Better Security Operations, Speak to the Pack in its Native Tongue

Forrester IT

I have a huge German Shepherd that ranks only slightly behind my human children when it comes to being spoiled and how much attention he gets. I've been working on training him for nearly a year now, and he amazes me with how intelligent he is. He knows all the basics: sit, stay, here, lay down, etc. But he also picked up detecting scents very quickly and is learning to detect things with his nose that I can't even see with my eyes.

Training 280
article thumbnail

Government must extend machine learning support across education and industry

Computer Weekly

The Royal Society believes the UK is well placed to make the most of machine learning, but it is early days and technical and policy issues need addressing

Education 254
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Apple’s Leased Data Center Energy Use Quadrupled Since 2012

Data Center Knowledge

Colocation energy use now accounts for nearly one-quarter of Apple’s total data center energy consumption Read More.

article thumbnail

One in eight people have suffered a healthcare data breach

Computer Weekly

A quarter of victims had their NI number compromised and 18% saw their biometric identifiers compromised, but most people trust healthcare providers with their data

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IBM Says CEO Pay Is $33 Million. Others Say It Is Far Higher

Data Center Knowledge

Sum hefty for CEO who’s overseen five years of falling revenue, total shareholder return under 0.1 percent Read More.

IBM 203
article thumbnail

Cyber security centre of excellence to open at Cardiff University

Computer Weekly

Cardiff University and Airbus have launched the first centre of its kind in Europe to tackle cyber attacks on critical infrastructure

Security 178

More Trending

article thumbnail

Collaboration is key to fighting cyber crime, say UK police

Computer Weekly

Cyber crime will be defeated only through collaboration, according to UK police, the Global Cyber Alliance, Cyber Defence Alliance and Verizon

159
159
article thumbnail

One Year In, Has DC/OS Changed the Data Center?

Data Center Knowledge

A product that the tech press predicted would change history is healthy and growing today. But maybe history has other plans for it. Read More.

article thumbnail

Online shoppers are losing trust in e-commerce, study finds

Tech Republic Security

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.

Study 162
article thumbnail

Research highlights cloud security complacency in organisations that ditch on-premise tech

Computer Weekly

Enterprise attitudes to cloud security are laid bare in the latest research report from Bitglass, and suggest more could be done to secure corporate data stored off-premise

Research 125
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft’s Docker Strategy: The Future of Windows Containers

Data Center Knowledge

As it makes a big bet on Docker, how does Microsoft see it fitting into the Windows world? Read More.

Windows 159
article thumbnail

Cancer researcher gets Nodeum LTFS tape NAS

Computer Weekly

Belgium-based OncoDNA replaces IBM tape library with flash-powered Nodeum LTFS to provide file access to backup and archive tapes at approaching nearline timescales

Research 128
article thumbnail

CIO Jury: 50% of tech leaders are implementing DevOps

Tech Republic Data Center

As DevOps gains traction in many enterprises, six out of 12 members of the CIO Jury say they have adopted or plan to adopt the workflow in the near future to increase efficiency.

Devops 118
article thumbnail

Criminal Courts Review Commission appoints forensic accountants for Post Office IT system cases

Computer Weekly

Investigation into claims of miscarriages of justice in relation to a Post Office accounting system has appointed a forensic accountant firm

System 139
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Marketo Integration with Enterprise Systems for Account Based Marketing

IT Toolbox

While Marketo may provide the features and functionality needed for account based marketing, it does not always have access to the necessary data.

article thumbnail

SAP board member talks Middle East investment

Computer Weekly

In an interview with Computer Weekly, SAP’s chief financial officer, Luka Mucic, talks up the significance of the UAE and wider Middle East region in terms of IT transformation

SAP 113
article thumbnail

7 patch management practices guaranteed to help protect your data

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments.

article thumbnail

Tips on how to get a Hana implementation off the ground

Computer Weekly

The confusion around SAP’s in-memory database is holding many customers back.

How To 174
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Agile holds back the Digital Transformation (?)

IT Toolbox

continuing from. Enterprise Architecture and Agile do muddy the waters of Digital Transformation.

Agile 100
article thumbnail

Motorola brings big data digital evidence service to UK police forces

Computer Weekly

Motorola is launching a digital evidence management service to UK police forces, backed off into AWS cloud infrastructure

Big Data 131
article thumbnail

Agile holds back the Digital Transformation (i)

IT Toolbox

continuing from. Enterprise Architecture and Agile do muddy the waters of Digital Transformation.

Agile 100
article thumbnail

Gulf Air refreshes storage and server farm hardware with Dell EMC

Computer Weekly

Airline completes major project to revamp its storage infrastructure with Dell EMC technologies

Dell 114
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New products of the week 4.24.17

Network World

New products of the week Image by Acalvio Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.

Network 90
article thumbnail

Security Think Tank: Red teaming can help businesses identify best security controls

Computer Weekly

How can organisations use red teaming to identify security gaps?

Security 131
article thumbnail

Busy in the Data Center? Here’s How to Make Time for Learning

Data Center Knowledge

You know you have to Read More.

article thumbnail

Danish bank group first to offer mobile payments with Dankort

Computer Weekly

A group of banks in Denmark are working together on a mobile payments service

Banking 120
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Customers roast Microsoft over security bulletins' demise

Network World

When Microsoft asked customers last week for feedback on the portal that just replaced the decades-long practice of delivering detailed security bulletins, it got an earful from unhappy users. "Hate hate hate the new security bulletin format. HATE," emphasized Janelle 322 in a support forum where Microsoft urged customers to post thoughts on the change.

article thumbnail

Consortium hopes to drive autonomous car from London to Oxford

Computer Weekly

The Centre for Connected and Autonomous Vehicles has awarded an £8.

126
126
article thumbnail

Bring Your Own Authentication is upending online security practices

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge.

article thumbnail

Texas A&M research team suggests how to defend against collective attention threats

Tech Republic Security

See how cybercriminals craft collective attention threats--and how university researchers plan to get the word out before attacks start.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.