Thu.Mar 23, 2017

article thumbnail

The Disruptive Force of Disruption

Forrester IT

Digital disruption is a fairly well understood dynamic: new entrant uses technology in new ways to upend existing business models and disrupt markets. In other words, digital disruption is a distinct force with a distinct life span that is mostly external to traditional markets and businesses. But what if it is more than that? What if it is the canary in the coal mine representing the first signals of a shift in our economy and society?

403
403
article thumbnail

Apple denies hackers holding millions of iPhones, iCloud accounts ransom

Computer Weekly

Apple reassures customers that none of its systems have been breached, dismissing hackers' claims that millions of iPhones and iCloud accounts are at risk of being wiped

Apple 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mashape, Creator of Top Open Source API Management Tool Kong, Raises $18M

Data Center Knowledge

Andreessen Horowitz leads round, spearheaded by Nicira co-founder Martin Casado Read More.

article thumbnail

How Google is riding the multi-cloud wave to win over the enterprise

Computer Weekly

The Google Cloud Next conference saw the internet giant share details about how enterprise appetite for multi-cloud deployments are working in its favour

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to establish strong microservice security using SSL, TLS and API gateways

Tech Republic Security

Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.

Security 166
article thumbnail

LastPass releases fix browser extension security flaws

Computer Weekly

LastPass has been praised for its quick response in fixing flaws reported in browser extensions for its password manager

Security 145

More Trending

article thumbnail

FTC warns on “Can you hear me now” robocall: Hang up!

Network World

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. The FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money. +More on Network World: U.S. Marshals warn against dual phone scams +.

Financial 132
article thumbnail

Sponsored: Creating Power Capacity Planning Best Practices – Starting With Your PDU

Data Center Knowledge

Almost every organization is now experiencing a digital shift where their data centers have become a direct part of the business. Today, cloud computing, converged infrastructure, and high-density workloads have all placed new types of capacity challenges on the modern data center. IDC says that.

article thumbnail

Almost 45% of men want a robot-led shopping experience in the future

Computer Weekly

Research reveals differences between what male and female, and older and younger consumers want from their shopping experience

Research 137
article thumbnail

Can tech make ads less annoying? 7 experiments from Adobe Labs

Tech Republic Cloud

Even in the digital age, advertising and marketing are blunt instruments. Adobe is one of the companies trying change the game. At Adobe Summit, it offered a sneak peek of some cutting edge projects.

Adobe 128
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Probes Cause of Global Web Outage

Data Center Knowledge

The outage was the second this month for Microsoft’s online services Read More.

Microsoft 155
article thumbnail

The rise of the ODMs: Should the branded hardware suppliers be worried?

Computer Weekly

The use of ODM datacentre hardware makes good economic sense for the hyperscale providers, but what about everyday enterprises?

Hardware 122
article thumbnail

High-Level Vegas Official to Run Switch’s New Smart City Unit

Data Center Knowledge

City manager to leave her job to lead data center company's effort to integrate all aspects of smart city development Read More.

article thumbnail

Logicalis chief technologist defines the new ideology of hybrid IT

IT Toolbox

Learn how adoption of hybrid IT helps IT organizations shift to become strategists and internal service providers.

100
100
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Euro Bank Regulator Watching Closely Banks’ Move to Cloud

Data Center Knowledge

European Central Bank is monitoring as lenders outsource IT to cut cost Read More.

Banking 140
article thumbnail

How to install Config Server Firewall on CentOS 7

Tech Republic Security

Although the default firewall in CentOS is powerful, there's a more flexible option available. Jack Wallen walks you through the steps for installing Config Server Firewall.

article thumbnail

It’s Time to Start Thinking about Cognitive Computing

Data Center Knowledge

We're only on the cusp of it but if you're not yet thinking in cognitive terms, now's the time to start. Read More.

Big Data 105
article thumbnail

Cisco security researcher: Ransomware crowd big on customer service

Network World

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. “They’re in it to make money…Good customer service is important to these people,” he said, and not at all tongue in cheek, during his lunchtime address on the opening day of SecureWorld Boston this week.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Technology Short Take #80

Scott Lowe

Welcome to Technology Short Take #80! This post is a week late (I try to publish these every other Friday), so my apologies for the delay. However, hopefully I’ve managed to gather together some articles with useful information for you. Enjoy! Networking. Biruk Mekonnen has an introductory article on using Netmiko for network automation. It’s short and light on details, but it does provide an example snippet of Python code to illustrate what can be done with Netmiko.

article thumbnail

If incident response automation is hot, threat detection automation is sizzling

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In a recent Network World article Jon Oltsik noted that Incident Response (IR) automation is becoming a very hot topic in the info security world. Oltsik called out multiple factors driving demand for IR automation and orchestration, including the manual nature of IR work, the cyber skills shortage and the difficulty of coordinat

Devops 82
article thumbnail

Data fogginess

IT Toolbox

a ?cyberfog?

Data 100
article thumbnail

Leaked iCloud credentials obtained from third parties, Apple says

Network World

A group of hackers threatening to wipe data from Apple devices attached to millions of iCloud accounts didn't obtain whatever log-in credentials they have through a breach of the company's services, Apple said. "There have not been any breaches in any of Apple's systems including iCloud and Apple ID," an Apple representative said in an emailed statement.

Apple 73
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Seizing Opportunities in with Data-as-a-Service Products

Dataconomy

We’ve published a white paper, where we look back at the big data and business intelligence trends over the past years and highlight examples of successful Data-as-a-Service products with deep dives into Social Media Monitoring, Self-Service BI and Visual Data Discovery and Analytics Merging the Physical and Virtual Worlds, complete with lessons.

Data 64
article thumbnail

Look before you leap: 4 hard truths about IoT

Network World

Most technologies go through a stage when everything seems possible. Personal computers in the early 1980s, the internet in the late 1990s and mobile apps around the beginning of this decade were like that. But so was the first unboxing of a Galaxy Note 7. In time, either suddenly or gradually, reality sets in. The internet of things still looks promising, with vendors and analysts forecasting billions of connected devices that will solve all sorts of problems in homes and enterprises.

article thumbnail

The Organization’s Digital Fit

Future of CIO

The digital paradigm shift is inevitable. Keeping digital fit means the fitting mindset, fitting attitude, fitting structure, and fitting speed. The multidimensional digital transformation provides impressive advantages in terms of the speed of delivering business solutions and ability to adapt to changes. Either be a disrupter or being disrupted, digital makes significant impacts on every aspect of the business from people, processes, to technology and capability both horizontally and verticall

Agile 40
article thumbnail

FBI director floats international framework on access to encrypted data

Network World

FBI director James Comey has suggested that an international agreement between governments could ease fears about IT products with government-mandated backdoors, but privacy advocates are doubtful. Speaking on Thursday, Comey suggested that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Interview: Margaret Franco, SVP of Marketing EMEA at Dell EMC – Part 2

ComputerWorld IT Management

Margaret Franco, SVP of Marketing EMEA at Dell EMC, shares her insights on how predictive modeling and personalizing content has helped to improve Dell EMC’s marketing results and enhance the customer journey.

Dell 40
article thumbnail

Snowden's ex-boss offers tips on stopping insider threats

Network World

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the U.S. National Security Agency. Recalling the day he learned Snowden had been behind the NSA leaks back in June 2013, Bay said he received texts about the breaking news while in a leadership meeting at a church.

Meeting 60
article thumbnail

IT enough for ya?

ComputerWorld IT Management

After a series of company acquisitions, this IT pilot fish is on the team tasked with migrating everyone to a standardized desktop. "Naturally, some PCs had issues post-migration," says fish. "We were able to make many of them usable again, but a few encountered problems we had not seen before and eventually the PC needed to be reimaged. "We had one user who objected to this and insisted we fix his computer.

Windows 40
article thumbnail

Senate votes to kill FCC's broadband privacy rules

Network World

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without their permission. The Senate's 50-48 vote Thursday on a resolution of disapproval would roll back Federal Communications Commission rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.