Fri.Mar 24, 2017

article thumbnail

Chances to Speak at O’Reilly Media’s Upcoming Conferences

CTOvision

Bob Gourley. O'Reilly Media is looking for speakers to share lessons learned at several of their upcoming conferences. Presentations could be a success story, cautionary tale, hard-won lesson, or perhaps even a worthy failure. Here are some of the upcoming events to consider speaking at: O'Reilly Artificial Intelligence Conference in San Francisco. The O’Reilly AI Conference is coming to San Francisco September 17-20, 2017 to explore the most essential and intriguing topics in intelligence engin

article thumbnail

UK impersonation fraud up 39% in last quarter of 2016

Computer Weekly

Just ahead of the end of the UK tax year, a survey underlines the importance of guarding against business email compromise aimed at stealing data and money

Survey 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Canada Firm Uses Salt, Tesla and Flywheels in Clean Energy Race

Data Center Knowledge

Battery tech is advancing quickly, thanks to Tesla, while other energy storage methods are being refined. Read More.

Energy 188
article thumbnail

FBI director reiterates call for action on encryption

Computer Weekly

The world is wasting time in resolving the conflict between privacy and public safety, and should consider an international framework on encrypted data access, says FBI director James Comey

Data 144
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

Apple 159
article thumbnail

Inside the well-planned metro network: how CityFibre does it

Computer Weekly

Computer Weekly met metro network builder CityFibre to find out why, and how, the organisation believes it can mount a credible challenge to Openreach’s dominance of wholesale fibre

Network 130

More Trending

article thumbnail

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.

article thumbnail

Security Think Tank: Minimise data to cut costs and comply with GDPR

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

Security 168
article thumbnail

The 21 best IT and tech memes on the Internet

Tech Republic Security

From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer

Internet 166
article thumbnail

Case study: How the Department for Education deployed flexible IT

Computer Weekly

The Department of Education has upgraded its ageing datacentre to the Azure cloud and Office 365, and rolled out Microsoft Surface devices

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Tencent Cranks up Cloud AI Power with Nvidia’s Mightiest GPUs Yet

Data Center Knowledge

Pascal GPUs to power Chinese cloud giant’s AI push in its data centers Read More.

Cloud 163
article thumbnail

Serco uses HR technology to cut recruitment bill

Computer Weekly

International outsourced services supplier Serco is investing in HR recruitment technology to help it hire 15,000 to 20,000 people a year

129
129
article thumbnail

7 Areas Where VR & AR Will Affect Businesses

IT Toolbox

Virtual Reality (VR) and Augmented Reality (AR) are there for much more than just gaming. Even if you do not feel the presence of AR or VR in your workplace yet, it is coming. Some industries may seem to have nothing to do with AR, but that won't last long. AR is making inroads all over.

Training 100
article thumbnail

Serco uses HR technology to cut recruitment bill by millions

Computer Weekly

International outsourced services supplier is investing in HR recruitment technology to help it hire 15,000 to 20,000 people a year

132
132
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Do One Click Installers Work

IT Toolbox

One click installers are programs that come with most website control panels today. While most CPanel dashboards have a QuickInstall tool (powered by another company called MOJO) that offers one click install applications, others like vDeck, Plesk and Webmin too have their own versions of one click install applications.

article thumbnail

AI and robots will 'create political instability' until humans find new occupations

Computer Weekly

The belief that advances in technology will create more jobs than they replace may no longer hold true

146
146
article thumbnail

Consultant urges never pay ransomware demands

Network World

When ransomware criminals lock up files and demand payment to decrypt them, don’t pay, was the advice a consultant gave to a group at SecureWorld. When there’s no risk of losing crucial data, that’s easy to say, and to make is possible requires planning, says Michael Corby, executive consultant for CGI. “Plan to have data available in a form that won’t be affected by ransomware – encrypted and stored separately from the production network,” he says.

Backup 114
article thumbnail

Rittal Rolls Out Edge Data Center, Partnership with HPE

Data Center Knowledge

Targets growing market for pre-configured edge data center solutions for IoT Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Blockchain can help secure medical devices, improve patient privacy

Network World

BOSTON -- Blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare. The downsides would include mistrust of the technology because of blockchain’s potential performance problems, and its association with ransomware and use as payment for illegal items on the Dark Web, Partners’ Deputy CISO Esmond Kane told the SecureWorld audience this week in Boston.

Security 113
article thumbnail

Back-to-Basics Weekend Reading: Deep learning in neural networks

All Things Distributed

In the past few years, we have seen an explosion in the use of Deep Learning as its software platforms mature and the supporting hardware, especially GPUs with larger memories, become widely available. Even though this is a recent development, Deep Learning has deep historical roots, tracing back all the way to the sixties, or maybe even earlier. By reading up on its history, we get a better understanding of the current state of the art of Deep Learning algorithms and the Neural Networks that yo

Network 109
article thumbnail

UK labour costs are cheap but automation will erode jobs market

Computer Weekly

PwC has estimated that millions of people may be affected by robots and artificial intelligence replacing their jobs

article thumbnail

CEOs have a problem with the truth: How data scientists can help

Tech Republic Big Data

Nobody wants to be the bearer of bad news, which is why CEOs sometimes don't get the straight story about strategic data. The solution includes data scientists and three non-traditional data systems.

Data 105
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

IDG Contributor Network: 7 best practices for securing your cloud service

Network World

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security. Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control. + Also on Network World: The tricky, personal politics of cloud security +.

Network 96
article thumbnail

Video: How an 11 year-old helped give cybersecurity a voice with AI

Tech Republic Security

Mike Spisak of IBM Security explains how a hacking experiment with his son Evan turned into IBM's Project Havyn. TechRepublic's Jason Hiner hosted the event at IBM InterConnect.

IBM 89
article thumbnail

5 Surprising Facts About Cyber Attacks That Should Scare You

IT Toolbox

Facts About Cyber Attacks That Should Scare You

124
124
article thumbnail

Google Play faces cat and mouse game with sneaky Android malware

Network World

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect. Security researchers do find new Android malware lurking on Google’s official app store. That’s because hackers are coming up with sneaky ways to infiltrate the platform, despite the vetting processes that protect it.

Malware 77
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Video: How quantum computing will better simulate the real world

Tech Republic Cloud

Dennis Lauwers from IBM Belgium explained how IBM is saving 10 years of dev time by using the cloud to bring quantum computing to the masses. Hosted by TechRepublic's Jason Hiner at IBM InterConnect.

IBM 61
article thumbnail

Review: Canary Flex security camera lives up to its name

Network World

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canary camera was also somewhat large – a cylindrical tower that took up some significant space on your desk, cabinet or shelf.

article thumbnail

Video: How to solve the data center power conundrum

Tech Republic Cloud

Karthick Rajamani explained how IBM is optimizing power for two competing goals-high availability and high utilization-in the data center. Hosted by TechRepublic's Jason Hiner at IBM InterConnect.

article thumbnail

CIA, WikiLeaks and Doctor Who?

Network World

CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.

Apple 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.