Mon.Apr 10, 2017

article thumbnail

Bye-bye, Big Box: Hyper-converged Infrastructure Waking Up Storage Market

Data Center Knowledge

We’re still in the early phases of HCI adoption, but we can expect the compelling management and TCO benefits to push HCI into mainstream market adoption. Read More.

Storage 163
article thumbnail

Three Things Users Will Like About Today's IP Phones

IT Toolbox

Over the past two posts , I’ve addressed how desk phones are evolving to meet the needs of today’s workers, and if you haven’t stayed current, you might think that a phone is still a phone.

Meeting 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

IAM a core building block for GDPR compliance

Computer Weekly

Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole

Security 151
article thumbnail

Digital Realty: Trump’s Climate Order Won’t Change Firm’s Clean Energy Goals

Data Center Knowledge

Sustainability chief says his mandate to source renewables for data centers hasn’t changed Read More.

Energy 159
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cloud increasingly part of the job for storage professionals

Computer Weekly

451 Group research finds storage professionals are less concerned with data growth than last year but increasingly likely to have to manage storage capacity in the cloud

Storage 142
article thumbnail

Google Shares New Details About its TPU Machine Learning Chips

Data Center Knowledge

Says TPUs run 15 to 30 times faster than contemporary CPUs and GPUs Read More.

Google 177

More Trending

article thumbnail

Email auto-responders need to go the way of the dodo

IT Toolbox

The time has come to take a stand. It is past time to declare our independence from ancient technology. No longer should we suffer in silence while others punish us with their work habits. I'm talking about Out Of Office auto-responders. I have some coworkers, dear friends all, who travel a lot.

Travel 113
article thumbnail

Customer expectation is biggest problem for retail, says panel

Computer Weekly

As retailers increasingly try to serve consumers across online, in-store and mobile, the main challenge they face is consumer expectation, according to a panel of experts

Retail 123
article thumbnail

5 tips for securing your Docker containers

Tech Republic Security

Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.

Security 128
article thumbnail

Spending forecast shows early signs of on-premise server demise

Computer Weekly

The datacentre equipment market appears to be indicating the long-term impact of cloud computing on server sales

Cloud 151
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Critical' Microsoft Office hack uses fake Word documents to install malware

Tech Republic Security

A new exploit, reported by McAfee, uses trick Microsoft office files to install malware on a user's machine and can bypass existing protection methods.

Malware 123
article thumbnail

The Graze journey: from pureplay to multi-channel

Computer Weekly

Health food retailer Graze began as an online subscription platform, but has used customer data to successfully cross the boundary into the physical retail space, says CEO Anthony Fletcher

Retail 113
article thumbnail

Billionaire Plots Path to IPO With Cheap Russian Power for Smelters, Data Centers

Data Center Knowledge

En+ Group, overseeing Oleg Deripaska’s commodity assets, is laying a path to a London share offer using its cheap hydropower. Read More.

article thumbnail

Slough and Maidenhead to light up 48km fibre broadband network

Computer Weekly

CityFibre starts work on a new Gigabit City project in Berkshire, connecting businesses in Slough and Maidenhead to an ultrafast fibre broadband network

Network 118
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The IoT of bricks: Someone is bricking insecure IoT devices

Network World

I can’t justify the vigilantism, but someone is bricking vulnerable IoT devices. I ponder the morality of it all. It’s called BrickerBot. It finds IoT devices with dubious security and simply bricks/disables them. Insecure dishwashers, teapots, refrigerators, security cameras—all become part of vast botnets. The botnets can do many things, and we’ve seen them become the armies behind the largest internet attacks in history.

Internet 107
article thumbnail

Ninety-six more hours of strike action at Fujitsu in the UK

Computer Weekly

Fujitsu staff are on strike again in protest against job and pension cuts

159
159
article thumbnail

Cisco’s first big developers conference to zero in on IoT, cloud

Network World

Cisco initially scheduled its inaugural DevNet Create developers’ conference in San Francisco for what turned out to be the same week in May as Google's wildly popular I/O event in Mountain View (that coy old Google didn't reveal its show dates until late January). So Cisco wound up bumping its new event to the following week “to make sure we don’t take audience away from Google I/O.

article thumbnail

Government outsourcing contracts to be extended due to Brexit

Computer Weekly

Government outsourcing contracts could be extended without renegotiation due to the civil service being overburdened with Brexit work

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

Network World

In an IT world where security software patches seem to be a dime a dozen, the researchers at the Defense Advanced Research Projects Agency want to take a different approach – bake cybersecurity right into the circuitry. The research outfit will this month detail a new program called System Security Integrated Through Hardware and Firmware (SSITH) that has as one of its major goals to develop new integrated circuit architectures that lack the current software-accessible points of criminal entry,

article thumbnail

Outsourcing service left Scottrade Bank customer data exposed

Computer Weekly

Mistake by outsourcing service provider left the details of 20,000 Scottrade Bank customers vulnerable to theft

Banking 118
article thumbnail

US dismantles Kelihos botnet after Russian hacker's arrest

Network World

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election. The botnet, called Kelihos, has enslaved hundreds of thousands of computers, and distributed spam and malware to users across the globe. However, the U.S. has taken action to dismantle the illegal operation, the Department of Justice said on Monday.

Malware 81
article thumbnail

Hana speeds up customer service for blinds maker

Computer Weekly

Hillarys Blinds switched its SAP CRM from Oracle to the Hana platform to optimise business processes

SAP 118
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Anthem to data breach victims: Maybe the damages are your own darned fault

Network World

Insurance giant Anthem has effectively scared off possible victims of a 2015 data breach by asking to examine their personal computers for evidence that their own shoddy security was to blame for their information falling into the hands of criminals. Some of the affected Anthem customers sued for damages they say resulted from the breach but then withdrew their suits after Anthem got a court order allowing the exams.

Data 79
article thumbnail

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Big Data

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.

article thumbnail

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Network World

New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving.

article thumbnail

Top Real Estate Apps

IT Toolbox

This post looks at a few of the top real estate apps.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Network World

New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving.

article thumbnail

How to avoid big data project failures: Your 5-step guide

Tech Republic Big Data

Discover five ways that big data project managers can improve their odds of success.

Big Data 110
article thumbnail

IDG Contributor Network: Authentic8 wants to protect users from bad websites

Network World

Many of us have experienced that moment of terror when clicking on a potentially risky link: Will it all be fine or will I start a torrent of bad outcomes from my action? But bad stuff sometimes happens and, sad as it sounds, sometimes the links we click on take us to dark places with bad outcomes. Authentic8 wants to limit those impacts by reducing the blast area of bad content.

Network 68
article thumbnail

The Data Pipeline – Analytics at the Speed of Business

Dataconomy

Business leaders are growing weary of making further investments in business intelligence (BI) and big data analytics. Beyond the challenging technical components of data-driven projects, BI and analytics services have yet to live up to the hype. Early adopters and proponents were quick to frame solutions as miraculous reservoirs of. The post The Data Pipeline – Analytics at the Speed of Business appeared first on Dataconomy.

Data 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.