Fri.Apr 07, 2017

article thumbnail

Google Next 2017 Review: Google Cloud Is A Serious Contender In the Public Cloud Space

Forrester IT

With Dan Bieler and Glenn O'Donnell. In the past few years, Google has made concerted efforts to target the enterprise cloud computing space. At Next 2017, more than 11,000 customers, partners, developers, and analysts joined Google in San Francisco to learn more about Google Cloud's latest enterprise updates. We compiled this post following a review of the event with all the Forrester analysts who attended.

Google 322
article thumbnail

Cyber security fears are a barrier to fintech innovation

Computer Weekly

Survey shows most large financial services firms believe better visibility of cyber security controls within fintechs would improve prospects of partnering with them

Security 179
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Google Next 2017 Review: Google Cloud Is A Serious Contender In the Public Cloud Space

Forrester IT

With Nigel Fenwick and Glenn O'Donnell. In the past few years, Google has made concerted efforts to target the enterprise cloud computing space. At Next 2017, more than 11,000 customers, partners, developers, and analysts joined Google in San Francisco to learn more about Google Cloud's latest enterprise updates. We compiled this post following a review of the event with all the Forrester analysts who attended.

Google 270
article thumbnail

Home Office U-turn over IR35 contractor classifications prompts IT project delay fears

Computer Weekly

IT project delays predicted at Home Office, following reports of last-minute departmental U-turn over contractors' IR35 status classifications

Report 176
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IP Phone Choices Have Never Been Better

IT Toolbox

My last post started off this new series by raising the issue as to whether desk phones have a future in the workplace. This will largely depend on the demographic makeup of your employees, and possibly the general level of them being tech-savvy.

150
150
article thumbnail

How an MSSP scaled up its security analysts' capacity

Computer Weekly

Irish-managed security services provider Smattech has increased its speed and capacity to analyse cyber attacks using IBM’s fledging cognitive computing technology

Security 159

More Trending

article thumbnail

How Amazon Prevents Data Center Outages Like Delta’s $150M Meltdown

Data Center Knowledge

Should data center switchgear vendors rethink firmware design priorities? Read More.

article thumbnail

Setting Goals for Social Media

IT Toolbox

Social media has become an increasingly important part of marketing efforts. But to be effective a social media campaign must be planned and coordinated. That starts with figuring out just exactly what you want to accomplish with your social media presence. Social media is so diverse that it's easy to lose your way in the social media forest.

Media 140
article thumbnail

MEPs call for European Commission to reassess Privacy Shield

Computer Weekly

European parliamentarians have called for an immediate review of the Privacy Shield EU-US data transfer framework due to concerns about privacy protections being undermined in the US

Data 116
article thumbnail

The Ongoing Battle of Spam Filters

IT Toolbox

Unfortunately spam is a fact of life on the modern web. So, equally unfortunately for marketers, are spam filters. Having your carefully crafted email message get caught by your customer's spam filter not only wastes that message, it may also mean that every message you send the customer from your email address from then on is automatically dumped to spam.

113
113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Most UK companies not prepared for service provider failures

Computer Weekly

UK businesses are ill-prepared for the impact on their business resulting from the failure of an IT of business process supplier

Company 140
article thumbnail

Managing Vendors with CRM

IT Toolbox

Although CRM systems are designed to help manage customer relationships, a good CRM system can help with your vendors as well. Good vendor relationships are vital to any business. Your CRM system can help you build and maintain these relationships as well as taking care of your customers.

System 100
article thumbnail

City of London Wi-Fi project contract awarded

Computer Weekly

The City of London Corporation’s plans to cover the Square Mile with a free, public access Wi-Fi project are moving ahead at speed

137
137
article thumbnail

Did a Westcon-Comstor SAP project trigger a decision to sell?

IT Toolbox

Datatec Ltd. announced last week that it is in talks to sell a major portion of its struggling $4.9 billion distributor Westcon-Comstor for more than $800 million in the wake of a troubled SAP implementation.

SAP 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Game used data to transform store experience and drive personalisation

Computer Weekly

Group insight director at video games retailer explains how customer interaction data has been used to create a personalised experience in-store

Data 123
article thumbnail

Product Life Cycle Management in S/4 HANA

IT Toolbox

SAP claims to have reconsidered the variant confuration that ECC customers would have been familiar with and reworked this for S/4HANA 1708 in a revolutionary way.

SAP 100
article thumbnail

McAfee: Trend indicates 2017 will be bumper year for new malware

Network World

A cycle of increasing new malware is well underway and could last the rest of this year if a trend established over the past two years continues. Defenders enjoyed a nine-month dip in malware innovation last year, but that’s over with, according to a cycle identified by McAfee Labs. Its latest McAfee Labs Threats Report says that starting at the beginning of 2015, the volume of new threats has fluctuated in a regular pattern, with two to three quarters of growth followed by three quarters of dec

Malware 93
article thumbnail

Gartner predicts that Enterprise Architecture will focus on Digital platforms

IT Toolbox

Gartner : "Digital is transforming organizations and EA itself, with digital business platforms emerging as a powerful approach to innovation.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Back-to-Basics Weekend Reading: Twenty years of functional MRI: The science and the stories.

All Things Distributed

I will be returning this weekend to the US from a very successful AWS Summit in Sydney, so I have ample time to read during travels. This weekend however I would like to take a break from reading historical computer science material, to catch up on another technology I find fascinating, that of functional Magnetic Resonace Imaging, aka fMRI. fMRI is a functional imagine technology, meaning that it just records the state of the brain at one particular point in time, but the changing state over a

Travel 87
article thumbnail

Cost-effective Ways to Quickly Beef up your Company Security

IT Toolbox

Security is a company?s number one concern these days. Here are a couple of affordable tips that can help quickly boost your security.

Security 100
article thumbnail

Back-to-Basics Weekend Reading: Twenty years of functional MRI: The science and the stories.

All Things Distributed

I will be returning this weekend to the US from a very successful AWS Summit in Sydney, so I have ample time to read during travels. This weekend however I would like to take a break from reading historical computer science material, to catch up on another technology I find fascinating, that of functional Magnetic Resonace Imaging, aka fMRI.

Travel 78
article thumbnail

How AI, IoT and blockchain will shake up procurement and supply chains

IT Toolbox

There's a new vision for how today's cutting-edge technologies will usher in tomorrow's most powerful business tools and processes.

Tools 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The iCloud hackers' bitcoin ransom looks like a fake

Network World

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus. The Turkish Crime Family grabbed headlines last month by claiming they had the stolen login credentials for more than 700 million icloud.com, me.com and mac.com accounts. They demanded increasing ransoms from Apple while threatening to wipe the data from devices connected to the affected accounts if it did not.

Groups 83
article thumbnail

Why dashboard design is critical to analytics success

Tech Republic Big Data

It doesn't matter how great an app is if nobody uses it. Here's how to design a dashboard with the user in mind.

How To 91
article thumbnail

CyberX assesses industrial environments for cyber risks, provides continuous monitoring

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. The U.S. Department of Homeland Security (DHS) received reports of 59 cyber incidents at energy facilities in 2016. This is an increase of nearly a third over 2015. Security specialists believe this number is quite conservative, considering that energy companies aren’t required to report cyberattacks to DHS.

article thumbnail

Government Stats Are Ready for Change (Book Review)

Dataconomy

For those of you similarly interested (obsessed?) with the changing role of government statistics relative to the explosion of highly dimensional private sector data, I recommend having a look at Innovations in Federal Statistics: Combining Data Sources While Protecting Privacy from the National Academy of Sciences. It’s an easy read and offers a solid.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DARPA semantic program seeks to glean truth from obfuscation

Network World

In this era where disinformation, alternative facts and other falsehoods are the rule of the day, the researchers at DARPA are looking to build a mechanism that can glean some truth from the obfuscation. DARPA says the program, called Active Interpretation of Disparate Alternatives (AIDA), looks to develop a “semantic engine” that generates alternative interpretations or meaning of real-world events, situations, and trends based on data obtained from an extensive range of channels.

article thumbnail

The Three Stages of IT Maturity

Future of CIO

The highly visible IT can elevate its maturity from “controlling to change to innovate,” from "surviving to striving to thriving," and from "deficiency to efficiency to proficiency." Nowadays information is abundant and technology is pervasive, Digital transformation or business initiatives today nearly always involves some form of technology implementation or information analysis.

Fashion 45
article thumbnail

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

Network World

When the source code to a suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the U.S. CIA borrowed some of the code to bolster its own hacking operations. On Friday, WikiLeaks released 27 documents that allegedly detail how the CIA customized its malware for Windows systems. The CIA borrowed a few elements from the Carberp financial malware when developing its own hacking tool known as Grasshopper, according to those documents.

Malware 60
article thumbnail

What C-level leaders need to know about cybersecurity

ComputerWorld IT Management

Despite the scale and potential harm from cyber-attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.