Thu.Mar 30, 2017

article thumbnail

Trust Must Be The Foundation Of Your B2B Digital Ecosystem

Forrester IT

Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. Trust is one of the most vital elements of any business relationship. But the shift away from linear value chains focused on internal relationships toward more open networks of relationships in the context of digital ecosystems has made trust a critical driver of new revenue opportunities and more efficient operations.

B2B 265
article thumbnail

First cyber security startups graduate from GCHQ accelerator

Computer Weekly

The first group of companies has completed a government-led cyber accelerator programme aimed at helping UK startups take the lead in producing the next generation of cyber security systems, with another round to be announced in 2017

Security 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Management - 5 to 7 years from now

Forrester IT

Technology organizations will get smaller, faster and more specialized. [link]. There have been many "this will end IT as we know it" events. The PC, client/server, the web, and outsourcing have all changed tech organizations, but not fundamentally. This time things are different. Five to seven years from now, these organizations will resemble current ones, just as the first cell phones resemble the iPhone.

Agile 264
article thumbnail

More than a quarter of SME staff lack cyber threat training

Computer Weekly

Data from cyber insurance provider CFC Underwriting shows that 38% of its claims in 2016 could have been avoided through better staff education and training on cyber risks

Training 160
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

10 practical privacy tips for the post-privacy internet

Network World

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves. You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you.

Internet 122
article thumbnail

Security Think Tank: Business input will help keep security usable and cost effective

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

Security 171

More Trending

article thumbnail

How to start building enterprise momentum for microservices

Computer Weekly

The maturity of containers has given the IT industry a new architectural approach to engineer applications using microservices. We look at whether it is ready for the enterprise.

article thumbnail

A lifetime of technology

IT Toolbox

I have almost reached the half century mark. I have almost earned my right to be a grumpy old man but I am not ready yet. I still feel young, heck if I were to feel any younger they would be asking me for my id at the bottle shops. This means that I have seen a lifetime of technological improvements and I have to say they have been stunning.

109
109
article thumbnail

Nearly a third of malware attacks are zero-day exploits

Computer Weekly

Companies could be missing up to third of malware that is targeting them, according to a report by WatchGuard

Malware 156
article thumbnail

Cisco issues urgent reboot warning for bug in ASA and Firepower appliances

Network World

Cisco has issued an urgent request to Cisco customers running specific releases of software on their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances to reboot their devices to prevent a device from hanging and stop passing traffic. Cisco said its ASA and FTD devices are affected by a “functional software defect that will cause the device to stop passing traffic after 213 days of uptime” and that the issue is a result of a software regression bug introduced when ad

IBM 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HMRC contractors leave over inside IR35 ruling

Computer Weekly

HMRC has begun classifying its public sector contractors as "inside IR35", prompting fears of a digital "brain drain" at the organisation

139
139
article thumbnail

Verizon to Resell Equinix Data Center Services

Data Center Knowledge

Telco to bundle colo, interconnection with own enterprise services Read More.

article thumbnail

Government announces autonomous vehicle contest

Computer Weekly

Business secretary Greg Clark launches a contest to access funding from the government’s £100m connected and autonomous vehicle funding pot

article thumbnail

How to install and use eCryptfs on Ubuntu

Tech Republic Security

If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.

Linux 103
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Contextual Data Holds Valuable Answers

Data Center Knowledge

Contextual data—information about how employees are using their mobile devices—provides valuable insights into what types of apps your employees prefer and how and where they are using their devices. Read More.

Data 101
article thumbnail

Three ways decision making frustrates change agents

IT Toolbox

Sometimes leading change feels like an epic death battle with an opponent who has 10 arms. Just when you think you have made progress with one arm, another one comes out of nowhere and smacks you in the back of the head. That ten-armed monster is the current organization. Organizations are powerful forces of the status quo.

100
100
article thumbnail

Expanding business intelligence firm uses technology to bring in recruits

Computer Weekly

Chester-based GBG has saved £300,000 in recruitment points and seen its ‘Glassdoor’ ratings jump from 1.9 to 4.

article thumbnail

Technology to create technology

IT Toolbox

It may not be called Skynet, well at least not yet and most probably never will be, however, a rose by any other name is still a rose. What am I rambling on about you may ask? I recently read that Toyota is trying to use artificial intelligence to be able to create better batteries.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DCiM Solutions Buys IIS Group, Rebrands as Critical Environment Group

Data Center Knowledge

Formation of CEG doubles number of satellite offices DCiM had in key markets across the country Read More.

Groups 122
article thumbnail

One thing to rule them all.

IT Toolbox

One thing to rule them all, one thing to find them. One thing to bring them all and in the dock to bind them. Golem golem. In case you have been living under a rock or have no interest in fantasy at all, the mangled text above is part of a poem from the Lord of the Rings. Written by probably the best fantasy writer of all time, Tolkien.

100
100
article thumbnail

Microsoft to shut Skype office in Sweden

Computer Weekly

Stockholm base sees 120 jobs put at risk as tech giant seeks to reduce its geographical spread

Microsoft 126
article thumbnail

5 Benefits of Investing in Professional SEO in 2017

IT Toolbox

Search engine optimization is now a well established mode of digital marketing. It is now used by millions of companies and brands across the globe to reach out to a well targeted audience. Due to the billions of searches that are now performed on a daily basis, it has never been more important to invest in SEO.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Dell’s EMC Deal Hits Hard Reality of Rising Costs, Cloud Shift

Data Center Knowledge

Six months after merger, Dell grappling with changing hardware tastes, rising component costs, cloud competition Read More.

Dell 114
article thumbnail

LinkedIn previews ambitious new edition

IT Toolbox

LinkedIn has announced plans to add a new enterprise edition to its existing Sales Navigator service. The upgrade brings with it a number of features to support LinkedIn as a social selling platform. Among the new features is scope to send up to 50 messages through LinkedIn’s proprietary InMail messaging system.

Social 100
article thumbnail

UK insurtech startups follow fintech example

Computer Weekly

UK startups focused on technology for insurance companies saw capital investments double last year

Examples 123
article thumbnail

Why OpenStack is the wrong cloud for Red Hat to be building its future on

Tech Republic Cloud

OpenStack is driving mega-deals for Red Hat, but it isn't the best foundation for Red Hat's future. OpenShift, on the other hand, offers a promising alternative.

Cloud 98
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DCIM On a Budget: Data Center Optimization Without Breaking the Bank (Part II)

Data Center Knowledge

How to use the knowledge gained through measurement to control and optimize data center operations. Read More.

article thumbnail

European debate on encrypted apps heating up with possibility of new backdoor laws

Tech Republic Security

New laws being considered in the EU would force internet companies to provide police with access to encrypted data from consumers on internet messaging apps.

article thumbnail

Back-to-Basics Weekend Reading: An Implementation of a Log-Structured File System

All Things Distributed

This weekend I am travelling to Australia for the first AWS Summit of 2017. I find on such a long trip, to keep me from getting distracted, I need an exciting paper that is easy to read. Last week's 'Deep Learning' overview would have not met those requirements. One topic that always gets me excited is how to take computer science research and implement it in production systems.

System 82
article thumbnail

Open-source developers targeted in sophisticated malware attack

Network World

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs.

Malware 78
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.