Thu.Feb 16, 2017

article thumbnail

Why “Data Ownership” Matters

CTOvision

Dennis D. McDonald. Ownership rules. In Understanding data ownership in the data lake Elizabeth Koumpan, Executive Architect at IBM, writes: Depending on the organizational point of view, different ownership rules may apply in different situations to data. It is a tricky part when we deal with Data ownership while using external sources, especially if we use social data which is an essential element, as we build our cases for front office digitization, customer sensitive analysis and so on.

Data 182
article thumbnail

RSAC17: More ransomware and IoT-enabled attacks on the way, warns expert

Computer Weekly

Security expert Ed Skoudis says that in 2017 organisations need to prepare for evolving ransomware and IoT-enabled attacks, as well as a combination of the two

Security 188
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will the Submarine Cable Boom Drive More Revenue to Colos?

Data Center Knowledge

The way undersea cable capacity is priced and sold could accelerate enterprise adoption of multi-cloud IT architecture. Read More.

article thumbnail

Security platforms to disrupt industry, predicts Palo Alto Networks

Computer Weekly

Collaborative security platforms will enable developers to focus on innovation and force the security industry to change business models, predicts Palo Alto Networks

Industry 170
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Free charging stations can hack your phone, here's how to protect yourself

Tech Republic Security

A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.

How To 156
article thumbnail

Microsoft PCs get Brexit-fuelled price increase

Computer Weekly

Microsoft has raised the price of its Surface PCs by as much as 15% in the UK because of the falling value of the pound since the country voted to leave the EU

Microsoft 168

More Trending

article thumbnail

Oracle executives claim more comprehensive reach for cloud business

Computer Weekly

At a recent customer conference in London, US-based Oracle executives gave accounts of the supplier’s cloud business as becoming at once more enterprise and more mid-market

Oracle 135
article thumbnail

The Impacts of IBM's SNA Networking on LANs Part 2

IT Toolbox

IBM did not, for the most part, sell SNA as a generalized networking solution independent of its own product line. It was designed to be a networking solution primarily revolving around an information environment that has IBM-designed large or mid-range computers at the center.

IBM 133
article thumbnail

NatWest launches digital lending platform to compete with fintech startups

Computer Weekly

NatWest has launched a lending platform that promises loan approval times as fast as those offered by peer-to-peer lenders

162
162
article thumbnail

4 IT Trends to Look Out For in 2017

IT Toolbox

2016 was all about blockchain and machine learning and intelligent apps. This year, expect brand new innovations to dominate the IT landscape, which will make people's lives simpler and safer. Here are four IT trends to watch out for in 2017. 1. Internet of Everything.

Trends 133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Government is quietly asking suppliers to pick up the tab for cyber security

Computer Weekly

The government's new approach to working with cyber security suppliers is bringing a shift in responsibility and risk to the private sector

article thumbnail

VoIP provider breaks into four states to serve small businesses

IT Toolbox

As VoIP expands into the small business market, a recurring theme for customers has been a focus on cost-effective, highly customizable solutions. That need has opened an opportunity for smaller players to push out of their local heartland and quickly acquire clients in new regions using a service tailored specifically to small business requirements.

article thumbnail

Don’t forget the “Science” in Data Science

Eric D. Brown

Just a reminder to everyone out there: This isn’t Data Magic… it is Data Science. The word ‘science’ is included there for a reason. I would LOVE for magic to be involved in data analytics. I could then whip up a couple of spells and say “abra cadabra’ and have my data tell me something meaningful. But that’s not how it works.You can say fancy incantations all day long, but your data is going to be meaningless until you do some work on it.

Data 124
article thumbnail

Tips to Becoming a Netflix Binge Boss

IT Toolbox

In order to master Netflix, all you need to do is become aware of some of these tricks that are guaranteed to change the way you use the service.

150
150
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Security Think Tank: Three strategies against data integrity attacks

Computer Weekly

What type of organisations are likely to be targeted by data integrity breaches, and how best can they detect and mitigate against such attacks?

Strategy 140
article thumbnail

Why is IoT Popular? Because of Open Source, Big Data, Security and SDN

Data Center Knowledge

If you think the IoT is a new thing, think again. Read More.

article thumbnail

Brexit is a potential boost for Swedish fintech

Computer Weekly

Stockholm could be set to benefit from the UK’s exit from the European Union by attracting more fintech investment

157
157
article thumbnail

Customer incentives specialist brings data to CRM platforms

IT Toolbox

Many companies still lack a fast, efficient method of feeding accurate program data from marketing, communications and incentive efforts into their CRM system. Incentive Solutions has now incorporated a CRM integration feature into its incentive technology platform.

Data 113
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Sweden’s Kiviks Musteri turns to cloud to keep up with growth

Computer Weekly

Swedish fruit products manufacturer Kiviks Musteri plans to put further systems in the cloud as a cloud-based ERP migration nears completion

Cloud 135
article thumbnail

SAP Rolls Out AI and Guidance Tools for ERP

IT Toolbox

Enterprise software giant SAP has announced it is adding artificial intelligence to its enterprise resource planning system S/4HANA, sharply stepping up the pace on the cloud delivery of the product.

SAP 113
article thumbnail

Too many high-risk vulnerabilities leave CISOs scrabbling to patch

Computer Weekly

Too many critical flaws are given high priority, leading to a patch overload that CISOs cannot keep up with, according to F-Secure

Security 140
article thumbnail

5 Tricks for a Successful ERP Cloud Migration

IT Toolbox

The future of your organization depends on a successful enterprise resource planning (ERP) cloud migration. If you have already planned and redefined your business processes around migrating your ERP solution to the cloud, you cannot afford to have that migration fail. These five tips show you how to choose the correct cloud ERP vendor and implement a cloud-based ERP solution for your business.

Cloud 113
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cisco sales fall as traditional product sales slump

Computer Weekly

Cisco's traditional product sales such as switches are falling, but revenues in emerging products in areas such as security are on the up

Security 130
article thumbnail

The Difference Between ERP Customization and ERP Configuration

IT Toolbox

When you integrate an enterprise resource planning (ERP) system into your company’s operations, you become familiar with the terms customization and configuration. The terms seem similar, so what’s the difference? ERP systems are designed to be flexible, helping meet the need of the companies or businesses that use them.

Meeting 113
article thumbnail

How to install and use Let's Encrypt on a Ubuntu Server for SSL security

Tech Republic Security

If you're looking for an easy way to install SSL certificates on your Ubuntu Server, follow this incredibly simple process to use Let's Encrypt.

How To 146
article thumbnail

Automation Needs Good Data to Work Well

IT Toolbox

Automation is a trend that has reached many different industries. More and more companies are developing the technology to allow for the use of automation. Customers want things fast and efficient. Automation has made these goals easier to reach.

Data 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to make Apache more secure by hiding directory folders

Tech Republic Security

If you serve up your websites with Apache, you might want to prevent the server from listing subdirectories. Here are two simple tricks for securing your Apache server.

Security 128
article thumbnail

Top 10 ERP Systems: Defining Your Vendor Short List

IT Toolbox

The hardest part of doing any task is getting started. We also know that the first step to finding the right enterprise technologies for your organization begins with defining a long list of potential vendors.

System 100
article thumbnail

The 7 security threats to technology that scare experts the most

Network World

What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco. + MORE FROM RSA: Hot products at RSA 2017 + Some of these threats target consumers directly, but even the ones that target co

article thumbnail

My Regular Expression Looks Like This

IT Toolbox

Compact, cryptic. consternation causing.

100
100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.