Thu.Jan 25, 2018

article thumbnail

Which Technologies Will Help Usher in Big Data?

CTOvision

Big Data and Technology Become Intertwined The technology revolution has arrived and it is only going to grow and grow. When Gutenberg invented the printing press, the dissemination of information grew at an incredible rate. Equally important was the printing press’ ability to store information. Informational repositories can be tapped for many additional uses.

Big Data 219
article thumbnail

The moving target of IoT security

Network World

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure and is much more likely to be made up of hardware and software from different sources.

Security 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Docker Machine with Azure

Scott Lowe

I’ve written about using Docker Machine with a number of different providers, such as with AWS , with OpenStack , and even with a local KVM/Libvirt daemon. In this post, I’ll expand that series to show using Docker Machine with Azure. (This is a follow-up to my earlier post on experimenting with Azure.). As with most of the other Docker Machine providers, using Docker Machine with Azure is reasonably straightforward.

article thumbnail

Tech Talk: The beginning of the end of the password in 2018

Network World

Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password security.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three Digital Competencies Differentiate IT Leaders from Laggard

Future of CIO

Organizations rely more and more on information and technology. It is simply not sufficient to run IT as a commodity service provider. IT organizations have more and more to offer, but also have more obstacles to overcome. A clear understanding of what services or solutions are supporting business advantage is a strategic imperative. However, many organizations suffer from overloaded tasks for “keeping the lights on” only and get stuck at the lower level of maturity.

article thumbnail

Data Infrastructure Resource Links cloud data protection tradecraft trends

Storage IO Blog

Data Infrastructure Resource Links Server Storage I/O Network By Greg Schulz – www.storageioblog.com January 25, 2018 Various data infrastructure resource links. The following are a collection of server storageioblog data infrastructure resource links. Where to learn more politics and storage or storage in an election year v2008 sherwood becomes atrato updated look and feel chargeback […] The post Data Infrastructure Resource Links cloud data protection tradecraft trends appeared fir

article thumbnail

Announcing Girls in Tech’s Newest Board Member

Nutanix

Of all the blog posts I’ve written since starting Nutanix, this one is particularly special to me because it deals with an organization that’s helped me on my personal and professional journey.

20