Thu.May 11, 2017

article thumbnail

NIST Is Jealous That PCI (Still) Matters More Than It Does

Forrester IT

The summary of the new Executive Order is a bit of a letdown: Government agencies must complete a risk management report within 90 days. The risk report should align with NIST. Outside of those with a risk fetish, this new EO probably isn't that exciting from the perspective of any near-term cybersecurity transformation. That said, there are some aspects worth mentioning: Cybersecurity is now a multi-agency public policy issue driven by the Executive Branch.

Education 298
article thumbnail

Allianz researchers working with car makers on cyber security

Computer Weekly

Allianz Germany is working with the local car manufacturing industry to highlight the vulnerabilities in the electronics systems of vehicles that can be exploited by criminals

Research 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Energy Is Embracing Zero Trust, All Industries Should Too

Forrester IT

I recently heard a segment on WBUR (a public radio station in Boston) on the emergence of microgrids and I was amazed at how much the concept of microgrids closely aligned with the concept of microperimeters within our Zero Trust model of information security. Zero Trust is a conceptual and architectural model for how security teams should redesign networks into secure microperimeters, increase data security through obfuscation techniques, limit the risks associated with excessive user privilege

Energy 273
article thumbnail

DCK Investor Edge: Why Money is Pouring Into Data Centers

Data Center Knowledge

Data centers outperform the rest of the real estate sector, attracting institutional and private equity investors. Bonus: REIT Investing 101. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft shifts to intelligence in cloud and on the edge

Computer Weekly

Microsoft’s annual developer event in Seattle opened with a focus on AI, IoT edge computing and a new globally distributed database

Microsoft 191
article thumbnail

The 8-Step Guide to Defining Your Logo Design Strategy

IT Toolbox

Since logo are key to a company's success, the design process is best left to professionals, but that doesn?t mean you should show up on your designer's doorstep empty-handed.

Strategy 160

More Trending

article thumbnail

Enterprise Architecture has to go down to the level of detail stakeholders need (i)

IT Toolbox

Martin Owen, Vice President of Product Management at ERwin, posts on LinkedIn that. " Enterprise Architecture is arguably one of those jobs that isn't ever finished. But I'd argue that over analysis is just as damaging to a business as the opposite.

article thumbnail

Paymentless retail could be the future, says Barclaycard VP of strategy and innovation

Computer Weekly

The ideal in-store customer experience would be for payments to be an invisible part of the shopping process, says Barclaycard’s vice-president of strategy and innovation

Strategy 130
article thumbnail

Moving to Enterprise-Grade Cloud: Closing the IT Skills Gap

Data Center Knowledge

Before beginning a transition, it is important to identify and understand your organization’s skills gap. This requires comparing your current system to the system you will migrate to, identifying areas where there is a skills shortage. Read More.

article thumbnail

London will lose its European tech leadership status because of Brexit

Computer Weekly

London is at risk of being usurped as the tech capital of Europe because of the UK's impending withdrawal from the benefits of EU membership

146
146
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Industrial robots are more vulnerable to cyberattacks than you think

Tech Republic Security

A new report from Trend Micro indicates that industrial robots are targets for hackers and cybercriminals. Find out the researchers' proposed solution to a more secure robotic ecosystem.

Industry 115
article thumbnail

Openreach asks comms providers how to improve broadband access

Computer Weekly

Openreach is to consult with its communication services provider customers on exploring the case for fibre-to-the-premises broadband and universal coverage

How To 136
article thumbnail

Introducing: DCK Investor Edge, a Weekly Data Center Investing Column

Data Center Knowledge

The data center sector is booming, and investment is pouring in. We separate the signal from the noise. Read More.

article thumbnail

Addison Lee uses common customer transport tech to offer luxury couriering

Computer Weekly

Addison Lee is well known for being a business-focused private hire firm in and around London, but as competition has increased the firm has refocused its use of tech to provide courier services to customers and retailers

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HP users beware: Laptops revealed to have built-in keylogger

Tech Republic Security

Several models of the HP EliteBook, ProBook, and other machines may be recording every keystroke you make. Here's how to fix the problem.

HP 124
article thumbnail

BT to cut 4,000 jobs in digital transformation plan

Computer Weekly

BT is to cut 4,000 jobs as it tries to realign Global Services business for a digital world and recover from a massive corruption scandal

139
139
article thumbnail

Will all enterprise IT eventually move to the public cloud? Probably not

Tech Republic Cloud

While public cloud is playing a major role in changing IT infrastructure, 451 Research's Simon Robinson said that there is still room for on-premise innovations that can drive business value.

Cloud 108
article thumbnail

New York Philharmonic puts Toscanini archive online for worldwide audience

Computer Weekly

The New York Philharmonic is digitally archiving millions of documents and making them available online

158
158
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Zero One: 11 Highest Paying Tech Jobs in US for 2017

Data Center Knowledge

Eleven of the 25 best paid jobs in the US are in tech. Here's what they are. Read More.

121
121
article thumbnail

Cisco adds AI to Spark collaboration platform with MindMeld buy

Computer Weekly

Cisco plans to use MindMeld’s AI platform to enhance its Spark platform and other enterprise collaboration solutions

article thumbnail

DocuSign Taps Microsoft Azure for Canadian Cloud

Data Center Knowledge

Says Azure partnership will give it data centers in Toronto and Quebec City Read More.

article thumbnail

The best security? Have Zero Trust, says expert

Tech Republic Security

If you want real security, you have to learn not to trust anyone, says ex-PagerDuty expert.

Security 123
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How the Cloud Revolutionized Smartphone Transitions

IT Toolbox

Following are some of the ways the cloud revolutionized smartphone transitions.

Cloud 100
article thumbnail

Android Security Bulletin May 2017: What you need to know

Tech Republic Security

The May 2017 Android Security Bulletin shatters its previous record of critical vulnerabilities. Get the highlights.

Security 110
article thumbnail

Sidecar Raises Series C to Fuel Rapid Growth

The Investing Edge

About 18 months ago, we led the Series B investment round in Sidecar Interactive. We were excited to back Andre and his vision for applying advanced analytics and machine learning to transform the ecommerce ad market. Since our investment, Sidecar’s business has exploded as they tripled recurring revenue in 2016 while acquiring leading brands such as Under Armour and Crate & Barrel.

article thumbnail

Made.com trialling real-time chat for customer advice

Computer Weekly

Online retailer Made.

Retail 136
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Certain HP laptops are found recording users' keystrokes

Network World

Over two dozen HP laptop models have been secretly recording users’ keystrokes, possibly by mistake, according to a Swiss security firm. The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post. The audio driver was designed to identify when a special key on the PC was used.

HP 68
article thumbnail

Akamai Buys Wind Power for Its Texas Data Centers

Data Center Knowledge

Makes 20-year wind farm investment Read More.

article thumbnail

Understanding hyperconverged infrastructure and why it matters for your business

Tech Republic Cloud

Simon Robinson, a research analyst with 451 Research, explains how HCI blends certain units of infrastructure together, making for easier management and scalability.

article thumbnail

Speed Phreak #2: FIFO COGS. How I Did It.

IT Toolbox

Simple ideas, small beginnings lead to.

100
100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.