Fri.Mar 17, 2017

article thumbnail

Platforms Are The Foundation For New Value Creation

Forrester IT

While a lot has been written about consumer-facing platforms like Facebook and Uber, the platform impact on business-to-business relationships has not been as extensively investigated. However, these "business platform models" are transforming the way how traditional businesses create value. Business platforms will reorganize a wide variety of markets, work arrangements, and ultimately value creation and capture.

B2B 363
article thumbnail

Cyber security is a huge opportunity for UK business, says NCSC

Computer Weekly

NCSC engagement director Alex Dewdney is leading government's new approach in working with UK industry to build a national cyber security community and capability

Security 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sysadmins: You're All Developers Now

Forrester IT

In a past life I was a system administrator, or "sysadmin" I enjoyed it, but even in those halcyon days of remoting into servers and driving to the office at 2 AM (hoping the server room wasn't on fire), I knew I had a limited shelf life. It wasn't until years later that I fully understood why: Administrators are babysitters. The era of tech babysitters is over.

article thumbnail

Moving forward and looking back

Computer Weekly

This is the fourth and last in a series of articles charting the progress of participants from HutZero, a new cyber security entrepreneur acceleration programme run by Cyber London (CyLon) and the Centre for Security Information Technologies (CSIT) at Queen’s University Belfast

Security 134
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do You Have An Opinion On How Digital Is Changing Business?

Forrester IT

Do you have an opinion on how technology is changing your business? As you likely know, each year we conduct in-depth business leader research to help identify trends across industries. This year we are once again partnering with executive search firm Odgers Berndtson , reaching out to senior business executives around the world for their perspectives on how digital is changing their business.

Survey 319
article thumbnail

How Hyperconvergence Can Revolutionize Secondary Storage

Data Center Knowledge

To recognize the value of hyperconvergence for secondary storage, companies and vendors must take a holistic view of these workloads and apply the same principles of hyperconvergence to deliver the same benefits that have been so effective with primary storage. Read More.

Storage 129

More Trending

article thumbnail

Who's hacking who?

IT Toolbox

International hacking from Russia is probably a chaotic mess with the FSB running around like headless chickens trying, not very successfully, to control things.

124
124
article thumbnail

NCSC commits to greater diversity

Computer Weekly

GCHQ’s National Cyber Security Centre is planning several initiatives to ensure more women are attracted to and remain in technology roles, particularly cyber security

Security 120
article thumbnail

Everything You Wanted to Know about Google Data Centers

Data Center Knowledge

Here’s our updated Google data center FAQ Read More.

article thumbnail

Why there is more to digital than ones and zeros

Computer Weekly

These days no business strategy seems complete unless it is qualified by the adjective “digital”

Strategy 149
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Working with Currency

IT Toolbox

Transactions denominated in a foreign currency or requiring settlement in a foreign currency are called foreign currency transactions, there are many examples related to buying and selling of goods or services priced in foreign currencies.

Examples 100
article thumbnail

Execs: Companies Too Slow to Adopt Emerging Tech

Data Center Knowledge

Study finds disconnect between IT and creative execs, the latter group often driving shadow IT. Read More.

Company 131
article thumbnail

Ask.com serves as a conduit for malware - again

Network World

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods. In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.

Malware 112
article thumbnail

Chinese Investors Sharpen Focus on Data Centers, Submarine Cables

Data Center Knowledge

Chinese money fuels Google and Facebook’s transpacific cable, high-profile global data center deal Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A cybersecurity risk assessment is a critical part of M&A due diligence  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. As of mid-February, the plan for Verizon Communications to acquire a majority of Yahoo’s web assets is still on, despite the announcement of Yahoo having suffered two massive breaches of customer data in 2013 and 2014. The sale price, however, has been discounted by $350 million, and Verizon and Altaba Inc. have agreed to share any ongoing legal responsibilities related to the breaches.

Data 84
article thumbnail

Future Data Center Park in Virginia Beach to Link to New Transatlantic Cable

Data Center Knowledge

This is NxtVn’s first venture outside of Finland and Eemshaven, Netherlands. Read More.

article thumbnail

Why Oracle and Microsoft are obsessing over smaller tech competitors

Tech Republic Data Center

Oracle and Microsoft are trying to ape smaller competitors. But only one is likely to succeed.

Oracle 115
article thumbnail

Citrix Tests Private Equity’s Appetite for Megabuyouts

Data Center Knowledge

The company fits the classic mold of a private equity buyout in the technology industry. Read More.

Industry 100
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Why machine learning benefits the rich, and everyone else is toast

Tech Republic Big Data

Big data started with cheap hardware and open source software, but the winners in machine learning are the world's richest companies.

article thumbnail

Some HTTPS inspection tools might weaken security

Network World

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns. US-CERT, a division of the Department of Homeland Security, published an advisory after a recent survey showed that HTTPS inspection products don't mirror the security attributes of the original connections between clients and servers.

article thumbnail

How Big Data Can Transform B2B Sales and Marketing

Dataconomy

Managing your relationships with customers, suppliers, and partners and constantly improving their experience is a proven way to build a sustainable and profitable business, and contrary to popular assumption, this doesn’t apply to B2C businesses only. With 89% of B2B research studies using the internet during the internet research process, The post How Big Data Can Transform B2B Sales and Marketing appeared first on Dataconomy.

B2B 75
article thumbnail

Do you have an incident response plan in place?

Network World

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. This guide from Cybereason takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan. Preparation across the entire company Good security leaders should be able to get people from across the company to help develop the IR plan.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why great chief data officers are so hard to find

ComputerWorld IT Management

Chief data officers (CDOs) are among the most highly sought-after executives among corporations for whom data analytics has become a cornerstone of digital strategies. But the rush to promote data-crunching experts to the CDO role has created a new challenge: Finding a leader who can use data to help drive a business transformation. Companies eager to establish data analytics have promoted managers to the CDO role based on their technical wizardry rather than their leadership capabilities, says

Data 45
article thumbnail

Cobol plays major role in U.S. government breaches

Network World

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology. New research found that these outdated systems, which may not be encrypted or even documented, were more susceptible to threats. By analyzing publicly available federal spending and security breach data, the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security b

article thumbnail

Running Digital IT with Triple-Speed

Future of CIO

Organizations rely more and more on information and technologies; the IT department has more and more to overcome in running at digital speed. Traditional IT organizations are often perceived as the controller which is slow to change and gets stuck in the lower level of maturity, as a reactive order taker. The type of speed issues in these IT organizations come from gaps created between IT and the rest of the company and IT leadership focus - being transactional or transformational?

Agile 40
article thumbnail

DARPA wants to cultivate the ultimate transistor of the future

Network World

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

String of fileless malware attacks possibly tied to single hacker group

Network World

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers. An investigation started by security researchers from Morphisec into a recent email phishing attack against high-profile enterprises pointed to a group that uses techniques documented by several security companies in seemingly unconnected reports over the past two months.

Malware 60
article thumbnail

Experts divided on value of Cyber National Guard

Network World

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community. According to House Rep. Will Hurd, a Republican from Texas, a national cybersecurity reserve could help strengthen national security and bring in a diversity of experience.