Thu.Aug 03, 2017

article thumbnail

Are You Ready for a Multi-Cloud Future?

Data Center Knowledge

Sponsored by: Dell EMC and Intel There are so many conversations around cloud, moving to various types of cloud services, and how to leverage the power of hybrid. But, it’s important to note just how much cloud services – and hybrid, in particular, have been growing and where they are.

Cloud 206
article thumbnail

Cyber criminals make it difficult to follow the money

Computer Weekly

Following the money is a classic technique used by law enforcement to link criminals to crimes by tracing associated financial exchanges, but that may not be easy in the case of the WannaCry attacks

Financial 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Omnichannel Brings to Collaboration and Customer Care

IT Toolbox

My last few posts have focused on customer care, mainly to show an evolution unfolding around what drives value in the contact center, and how collaboration plays a central role.

153
153
article thumbnail

Security Think Tank: Use the work environment to educate on cyber security

Computer Weekly

What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence?

Security 173
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Important Things to Consider When Developing a New App

IT Toolbox

Developing apps can be a complex job, given the fact that there many factors you need to consider before you even start working on a brand new app.

article thumbnail

How logic games have advanced AI thinking

Computer Weekly

Pitting a chess computer against a chess champion used to be the end goal for machine intelligence.

More Trending

article thumbnail

Newcastle to put gigabit broadband in council properties

Computer Weekly

Newcastle City Council is to roll out fibre-to-the-premises broadband in 25 public housing developments

article thumbnail

Getting to Omnichannel and Getting to Customer Care

IT Toolbox

Omnichannel is a complex topic, and to break things down, my last post reviewed the differences between this and multichannel. The distinctions are important, especially in relation to two areas decision-makers must focus on – collaboration and the contact center.

133
133
article thumbnail

Ransom DDoS attacks on the rise

Computer Weekly

The use of distributed denial of service (DDoS) attacks to extort money from organisations is on the rise, warns security firm Kaspersky Lab

Security 165
article thumbnail

How Conversational Interfaces Make Collaboration Better, Part 2

IT Toolbox

What started as a singular post has become a three-part short series , mainly because one thing leads to another, and everything is connected. My research efforts have been quite varied lately, and that’s a reflection of how things are changing on multiple fronts.

Research 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IT pros look to endpoint security to counter custom malware

Computer Weekly

IT professionals are focusing on endpoint security in the face of custom malware that is bypassing traditional perimeter defences, a survey shows

Malware 158
article thumbnail

After switching to VoIP, clients want service-level reporting

IT Toolbox

Accurate testing and monitoring of VoIP service quality is coming to the fore this year as consumers and service providers demand more metrics measuring the quality of calls they are receiving. Levels of measurement and performance analysis can vary widely, and are determined by numerous factors, yet many companies still continue to go without regular third party call analysis reports.

VOIP 124
article thumbnail

Sub-postmasters allege 'bullying and intimidation' by Post Office over Horizon IT system

Computer Weekly

Campaigners have submitted initial evidence in group litigation against Post Office over controversial Horizon IT system

System 167
article thumbnail

How video technology can support CRM platforms

IT Toolbox

Video has yet to have the impact it deserves in the CRM process. While this is attributable in part to a lack of the right technical infrastructure, the success of YouTube and other platforms in the marketing and education process cannot be ignored. Already we are beginning to see video-based solutions that are making their mark in the CRM sphere.

Video 124
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Interview: Vodafone CTO juggles legacy network and cutting-edge technology

Computer Weekly

Vodafone UK chief technology officer Jorge Fernandes talks legacy networks, digitisation and how he is positioning the operator to lead in the mobile-enabled future

CTO 138
article thumbnail

Supplement maker digests benefits of ERP

IT Toolbox

Five years after opening its state-of-the-art manufacturing plant in Las Vegas, nutritional supplement maker Dr. Vita had yet to implement an integrated enterprise resource planning system. But now that it has, its founder and CEO says the company will never again miss out on ERP’s big-picture view of the entire business.

Resources 124
article thumbnail

NVMe 101: What Is It, and Why Should You Care?

Data Center Knowledge

Unlike SAS or SATA, which treat flash in a serial manner, NVMe is designed to take advantage of the awesome power of parallel processing. Read More.

Industry 128
article thumbnail

For Digital, discover, streamline and render agile the enterprise before addressing cultural issues (i)

IT Toolbox

continuing from. Culture, a barrier to Digital. McKinsey concludes: "Leaders hoping to strike the right balance have two critical priorities.

Agile 133
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Voice control in BBC iPlayer pilot demos Microsoft's AI ambitions

Computer Weekly

An internal BBC pilot in collaboration with Microsoft shows how voice control could be used on the iPlayer TV streaming app

Microsoft 131
article thumbnail

Europe’s Cyber Victims Are Racking Up Hundreds of Millions in Costs

Data Center Knowledge

Computer viruses in May and June hampered sales, production Read More.

Security 154
article thumbnail

Remove AD Disabled Systems from SCCM

Mick's IT Blog

Recently, I wanted to clean up SCCM of a bunch of systems that still reside in active directory, but are also disabled. The first thing I did was to try and query SCCM for a list of systems that were populated via AD, but have a userAccountControl attribute of 4098. The attribute is normally 4096, but it changes to 4098 when the account is disabled.

System 86
article thumbnail

What’s New in Red Hat’s Latest Enterprise Linux Release

Data Center Knowledge

While there's nothing exciting enough to impress non-techie bosses, RHEL 7.4 is loaded with new features that count where it matters. Read More.

Linux 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why one cybersecurity startup uses real malware and real attacks to test your company's defenses

Tech Republic Security

Penetration testing company Cymulate can attack your network from multiple vectors, but what really matters is how you use the results to improve your security.

Company 89
article thumbnail

10 Things Data Center Operators Can Do to Prepare for GDPR

Data Center Knowledge

Here are some specific recommendations from experts Read More.

article thumbnail

The GDPR Deadline is Fast Approaching; How Enterprises are Readying Themselves

Network World

The deadline for compliance with the European Union General Data Protection Regulation (GDPR) is May 25, 2018. Many organizations have spent countless hours already in their preparation for the deadline, while other organizations are just getting around to reading up on it. GDPR, like Y2K of a couple decades ago, has international implications that for some organizations HAS to be addressed as GDPR will impact the lifeblood of their operations, whereas for most organizations, some due diligenc

article thumbnail

10 tips to help you become a Google Chromebook power user

Tech Republic Cloud

As Chromebooks gain traction in the enterprise and in schools, here are 10 tips to help professionals get the most out of the machine.

Google 93
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Red Hat’s Permabit Deal Means Smarter Storage in More Data Centers

Data Center Knowledge

And not just in the data centers of Red Hat users Read More.

article thumbnail

Top 5: Books about cloud computing

Tech Republic Cloud

If you're looking take your cloud computing knowledge to the next level, check out these five books.

Cloud 102
article thumbnail

Want to be successful with private cloud? Start with your configuration management database

Tech Republic Data Center

Private cloud presents plenty of challenges. Here's why private cloud builders should start by examining the health of their configuration management databases (CMDB).

Cloud 73
article thumbnail

Video: iOS beats out Android as the number one target for mobile phishing attacks

Tech Republic Security

Mobile phishing is on the rise, and most of it is targeting iOS. It's also moving away from your inbox and into apps, where it's much harder to catch.

Mobile 76
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.