Thu.Aug 10, 2017

article thumbnail

Gov.uk Verify fails to meet key business case targets

Computer Weekly

Government’s controversial online identity system has missed important milestones that formed the basis of its original 2015 business case

Meeting 202
article thumbnail

DCK Investor Edge: Here’s How Data Center REITs Did in the First Half of 2017

Data Center Knowledge

Hyper-scale leasing has cooled, but data center REITs continue outperforming the sector, driven by a new normal of strong enterprise and cloud leasing, and a wave of M&A activity. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Picnic takes a bite out of Dutch supermarket sector

Computer Weekly

The Netherlands has the highest supermarket density in the world, yet a technology company has been able to gain market share from the established order

Company 164
article thumbnail

Follow Through with CRM

IT Toolbox

One of the most important parts of the sales process is following up on contacts. It is essential to securing sales, building the bottom line and keeping customers happy. CRM systems are a big help in follow-ups, if they are properly used. A CRM system not only helps you track contacts, it also gives you the details of your last contact in actionable form.

System 137
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New TalkTalk fine takes total for poor data protection to £500,000

Computer Weekly

Information Commissioner’s Office fines TalkTalk for putting up to 21,000 customers’ details at risk of exposure prior to September 2014

Data 164
article thumbnail

Selling Management on Omnichannel - it's a Driver for Customer Care

IT Toolbox

Strategy may not be IT’s calling card, but if you’ve connected enough dots to see how omnichannel will help the business update the contact center for the digital age, you know how important this becomes if management doesn’t yet share your vision.

Strategy 113

More Trending

article thumbnail

10 bad habits cybersecurity professionals must break

Tech Republic Security

Cybersecurity workers face many challenges on the job. Here are 10 bad habits they must avoid in order to be most effective.

157
157
article thumbnail

Kaspersky Lab to drop EU complaint against Microsoft

Computer Weekly

Security firm Kaspersky Lab is to drop a complaint that Microsoft is abusing its market dominance to promote its security software in light of changes to the latest Windows 10

Microsoft 125
article thumbnail

Docker Is Raising Funding at $1.3B Valuation

Data Center Knowledge

Latest round of $75 million to help form sales, marketing team Read More.

175
175
article thumbnail

ICO hits out at misinformation about GDPR

Computer Weekly

The Information Commissioner’s Office has warned against misinformation about the EU’s new data protection rules and how they will be applied

Data 135
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Best Security Practices When Building Applications

IT Toolbox

An insecure business environment presents a potential data breach that can be exploited by hackers to bring your business down without warning.

article thumbnail

China tests hack-proof quantum satellite communications

Computer Weekly

China has tested a prototype communication system that uses the principles of quantum mechanics to make it impossible for hackers to access

System 135
article thumbnail

AWS No Longer a Holdout, Joins Kubernetes Group

Data Center Knowledge

Pays the cash to be top-level Cloud Native Computing Foundation sponsor with a board seat. Read More.

Groups 146
article thumbnail

Sadiq Khan’s Not-Spot Team to tackle digital connectivity in London

Computer Weekly

Mayor of London Sadiq Khan has announced a package of measures designed to boost digital connectivity around London

143
143
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Ideal Technical Employment in the Southwest

IT Toolbox

To respond to technological developments, Southwest companies are constantly looking for ever more qualified professionals capable of adapting to constant changes in information technology

article thumbnail

How creative and innovative can technology made in China be?

Computer Weekly

China's IT industry is becoming more Silicon Valley-like and, as a result, more attractive to the CIOs of western enterprises

article thumbnail

Selling Management on Omnichannel - it's a Driver for Collaboration

IT Toolbox

To close out this series , I’m going to address a third driver that IT could use to get management to see the strategic value of omnichannel. I’ve already explained the inherent challenges of getting this outcome, so some creative approaches may be needed.

100
100
article thumbnail

Consumers unaware of bank account switching service despite £750m spent on IT system

Computer Weekly

TSB Bank believes the Competition and Markets Authority needs to do more to promote account switching system to consumers

Banking 127
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Marketing Automation Moves Forward

IT Toolbox

Marketing automation is becoming more central to CRM efforts. With marketing automation, businesses are becoming more personalized in their approach, more mobile friendly and the technology is more effectively used. Of these trends, personalization is perhaps the most important. This is part of a broader trend toward personalization that is taking over marketing in general.

Trends 100
article thumbnail

Vue Entertainment deploys automated monitoring of cinema IT

Computer Weekly

Cinema group Vue Entertainment rolls out Kaseya's VSA tool to manage remote IT at its venues and provide proactive maintenance

Groups 123
article thumbnail

Deep Work is not encouraged in the enterprise today (ii)

IT Toolbox

continuing from. When 'collaboration' slows down your work. Deep versus Shallow work.

article thumbnail

Researchers can now hack a PC with malware stored on synthetic DNA

Tech Republic Security

University of Washington researchers successfully stored malware in synthetic DNA strands, and used it to gain control of the computer analyzing it.

Malware 128
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Allied Irish Bank blends industrial and artisanal analytics to gain edge

Computer Weekly

Bank has bulked up its data analytics capability, partly with SAS, to gain a more intimate understanding of its customers

Banking 120
article thumbnail

3 things you need to know about cybersecurity in an IoT and mobile world

Tech Republic Security

Cybersecurity complexities continue to rise as we transition into a world dominated by mobile devices and the Internet of the Things. At a high level, make sure you understand these three factors.

Mobile 113
article thumbnail

Ultrafast ISPs failing customers on broadband speed, claims Which?

Computer Weekly

Statistics produced by consumer rights advocacy group Which?

Groups 121
article thumbnail

How to use local and remote SSH port forwarding

Tech Republic Security

Secure shell can overcome a number of networking deficiencies. Jack Wallen illustrates how you can use SSH port forwarding to create encrypted tunnels for remote and local forwarding.

How To 99
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mingis on Tech: Android vs iOS – Which is more secure?

Network World

Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.

article thumbnail

Protect your identity by deleting your internet presence

Tech Republic Security

It's tough-nearly impossible, in fact-to completely delete yourself from the internet. TechRepublic's Dan Patterson and Brandon Vigliarolo discussed things you can still do to protect yourself.

article thumbnail

Internet Security: Stay Ahead of Malicious Threats

Galido

Internet security has become a hot topic of debate today, and this really comes as little surprise given the large amounts of devastating malware attacks users are experiencing all around the globe. Don’t allow a hacker to infiltrate your business’s personal information. Protecting your business or startup can be like protecting your king from enemy attacks in the game of chess.

article thumbnail

Video: A massive amount of government data has leaked to the Dark Web

Tech Republic Security

Government passwords, email addresses, documents, and other data are easily accessible on the Dark Web. TechRepublic's Brandon Vigliarolo explains a new report that tracks which agencies are most vulnerable.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.