Mon.Mar 27, 2017

article thumbnail

Bosch Connected World 2017 – Lessons From IoT Practitioners

Forrester IT

With Paul Miller. In March 2017, Bosch hosted its annual internet-of-things (IoT) conference, Bosch Connected World (BCW), in Berlin. Since last year, the event has doubled in size, attracting 2,500 attendees from businesses and vendors. This jump reflects the growing interest in IoT. The number of attendees, however, also highlights the relative immaturity of IoT compared with bigger technology themes.

Internet 297
article thumbnail

Nearly half of UK businesses lack a cyber security strategy

Computer Weekly

Commentators call on security industry to do more to help businesses understand the value of data and how best to protect it

Security 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Do Service Companies Use Customer-Generated IoT Data?

IT Toolbox

The Internet of Things (IoT) is about “things.” How these “things” are used in service businesses varies widely, and companies don’t often think of it when they examine their service delivery processes. In many service companies, “things” tend to be of less importance than customer service, on-time performance, quality metrics, and so on.

Company 130
article thumbnail

UK business least likely to offer rewards to infosec professionals

Computer Weekly

UK firms need to rethink incentives to attract and retain people with cyber security skills, according to the findings of a recent global study

Study 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Digital Bridge Buys Vantage, Silicon Valley’s Largest Wholesale Data Center Firm

Data Center Knowledge

Santa Clara company becomes new US data center market consolidator's wholesale platform Read More.

article thumbnail

Ease off on the security certifications and focus on these things instead

IT Toolbox

Are you thinking of getting an IT information security-related certification? Perhaps you want to go for Security+, Certified Ethical Hacker (CEH), or, assuming you have the required experience, the CISSP? These certifications not only look good on your resume but, the best part to me, is that you learn some great material along the way.

Security 116

More Trending

article thumbnail

Cisco announces cornucopia of product updates at Enterprise Connect

Network World

The industry’s largest collaboration show, Enterprise Connect , gets underway this week in Orlando, Florida. The show has become the place for vendors to show off the latest and greatest, and the week started off with Cisco announcing some new products and updates to existing ones. Cisco’s collaboration business has been on quite a roll of late, as it has released a number of new solutions, including the game-changing Spark Board , which was unveiled earlier this year.

article thumbnail

Don’t Let Security Misconceptions Cloud Your Judgment

Data Center Knowledge

There are cloud service providers that have developed platforms with extensive abilities to monitor, detect, and identify potential threats, and there are third parties rapidly creating advanced security tools to leverage these platforms. Read More.

Cloud 121
article thumbnail

5 Ways the LinkedIn Acquisition Could Hobble Microsoft CRM Dynamics

IT Toolbox

Some in the customer relationship management (CRM) industry saw Microsoft’s 2016 acquisition of LinkedIn as a huge win for Microsoft Dynamics CRM.

Microsoft 116
article thumbnail

Deep Learning Driving Up Data Center Power Density

Data Center Knowledge

Hosting AI hardware is an engineering puzzle all its own. Read More.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Consumers want to use retailer apps in-store

Computer Weekly

Consumers want retailers to implement applications that can be used in-store to offer personalisation and convenience

Retail 127
article thumbnail

Evernote: The smart person's guide

Tech Republic Cloud

The age of the notepad has ended. In its place are apps like Evernote, which puts your notes in the cloud so you can grab them from anywhere. Find out everything you need to know about it here.

Cloud 107
article thumbnail

Businesses beware: Smartphone malware rises 400% in 2016, Nokia reports

Tech Republic Security

Android smartphones and Internet of Things devices are increasingly at risk of attack, according to a new Nokia report. Here's how to keep your business safe.

Report 106
article thumbnail

Red Hat adds Gluster metadata cache and container deployment

Computer Weekly

Scale out NAS parallel file system speeds operations with client-side caching, and allows container deployment and faster self-healing volumes

System 112
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Beyond Translation: Transcreation and the Transformation of ERP

IT Toolbox

As more people across the globe gain access to online resources, the business world is hurrying to meet their needs. Some of this involves translating existing services, marketing materials and sales copy into different languages, without changing the meaning of the information. But many businesses are changing their localization model away from translation and toward transcreation.

Meeting 100
article thumbnail

Security Think Tank: Enable people using good security and risk methodology

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

Security 121
article thumbnail

Change the Information Flow to change the Outcome

IT Toolbox

Organizations establish normal flows of information that make sure people who need to know get the information they require. But to the Change Agent, these organizational information flows are a potential barrier to getting their change through. Last time I wrote about

article thumbnail

Ofcom scuppers BT’s ‘deemed consent’ ploy

Computer Weekly

Telco regulator fines BT for abuse of an opt-out clause that avoids service level fines on delays to Ethernet installations

109
109
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Who or what do you trust?

IT Toolbox

The idea of a trust certificate is that, when you download software from a website, the certificate confirms that you are indeed who you say you are.

Software 100
article thumbnail

New products of the week 3.27.17

Network World

New products of the week Image by Array Networks Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. NetCrunch Tools 2.

Network 88
article thumbnail

Essentials Tips to Improve the ROI of Your Website

IT Toolbox

A successful website is not built in one day, it?s a constant effort of months of hard work.

116
116
article thumbnail

What’s Fueling the Rise of Micro Data Centers

Data Center Knowledge

In two words, latency and cost, but there's more to it. Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AWS London users suffer "insufficient capacity" problems with T2 Micro Instances

Computer Weekly

Users of AWS's London-hosted T2 Micro Instances suffered capacity issues on Friday 24 March

112
112
article thumbnail

Carnegie Mellon hacking contest aims to get IT security talent started young

Network World

Carnegie Mellon University this week launches its third annual online capture the flag (CTF) contest aimed at introducing middle and high school students to the world of IT security — and just maybe attract some of them into a segment of the job market hungry for talent. Anyone can register to play the free picoCTF online hacking contest beginning on March 31 and ending April 14, but only U.S. students in grades 6-12 are eligible for some $30K in prizes.

article thumbnail

Time to restore from backup: Do you know where your data is?

Computer Weekly

Making a backup is only the start of the process.

Backup 130
article thumbnail

SecureMyEmail is email encryption for everyone

Tech Republic Security

If you're looking for the simplest route to email encryption, SecureMyEmail might be the answer.

102
102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hitachi reveals new AI for real-time identity detection and tracking

Network World

Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems. Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track

article thumbnail

Experian CIO embraces APIs and microservices to improve data transfer

ComputerWorld IT Management

Data is the lifeblood of Experian , a global business that handles staggeringly large volumes of financial and consumer information. But when Barry Libenson arrived as CIO in June 2015, he found that the company didn’t distribute data between its divisions and to its customers as fast or as efficiently as it should. To address the situation, he launched several IT initiatives, such as implementing application programming interfaces (API), to improve data transfer, create other efficiencies and u

Data 68
article thumbnail

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Network World

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match. As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy.

article thumbnail

Herman Hollerith, and the Job That Disappeared

IT Toolbox

Never work someplace without a sense of humor.

100
100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.