Thu.Oct 10, 2019

article thumbnail

So What Was Cybercon 2019 Like?

Forrester IT

AISA’s annual Cybercon conference was a sight to behold with an amazing line up of panelists, keynote speakers AND some female attendees (at last!). Set against the (unusually) sunny and crisp backdrop of south wharf in Melbourne, the conference was an immersive 2 days of contentious debates and discussions on just how pervasive, imperative and […].

article thumbnail

McAfee, IBM join forces for global open source cybersecurity initiative

Tech Republic Security

IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Strategy & Insights 2019: Solving The Human Skills Problem

Forrester IT

We’ve seen the promise of what enhanced data, analytics, and AI capabilities can do for businesses, but firms are struggling to truly maximize their impact. Data and analytics leaders want to shift into high gear, but many factors are holding them back. One of the key issues that everyone is facing is finding and developing […].

Data 280
article thumbnail

Can microsegmentation help IoT security?

Network World

The Internet of Things ( IoT ) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and better customer services. The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives.

Security 136
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Blockchain Helps Enterprises’ Digital Ecosystems In Asia Pacific

Forrester IT

(co-authored with Han Bao, senior research associate) Blockchain solutions are maturing, yet speculation on its value is rife. Most business and technology decision makers are still unclear about what actual business value this technology can deliver to their organizations. This is what I have been researching and writing about — to determine how enterprises can […].

article thumbnail

VMware builds security unit around Carbon Black tech

Network World

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources. When VMware announced the acquisition in August , its CEO Pat Gelsinger said he expected Carbon Black technology to be integrated across VMware’s product families such as NSX networking software and vSphere, VMware's flagship virtualization platform.

Vmware 130

More Trending

article thumbnail

How to install Docker CE on CentOS 8

Tech Republic Cloud

If you require Docker CE on CentOS, the steps for installation have changed for the eighth iteration of the platform.

How To 118
article thumbnail

How to Develop an IT Vulnerability Assessment

Galido

Information Technology Blog - - How to Develop an IT Vulnerability Assessment - Information Technology Blog. In terms of information security, vulnerability is a weakness that is found in an asset or a control and that can be exploited by one or more threats, which becomes a security risk. One way to protect the information is through the identification, assessment, prioritization and correction of the weaknesses identified in the assets.

article thumbnail

How to install Docker CE on CentOS 8

Tech Republic Cloud

If you require Docker CE on CentOS, the steps for installation have changed for the eighth iteration of the platform.

How To 90
article thumbnail

Tech Nation Report: Robust Online Collaboration in DevOps

Information Week

Cross-national perspectives on scaling up companies, hiring talent, and collaboration marked the release of a report on British tech.

Report 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Creating business value and making a business case for using crowds and crowdsourcing

Trends in the Living Networks

Below is Chapter 3 from my book Getting Results From Crowds 2nd Edition , provided as a resource for those looking at using crowdsourcing in their organization or tasked with building an internal business case. The business value of using crowds. Through history, companies have been limited in what they can achieve through the scope of their internal resources and how well they can draw on external resources.

article thumbnail

How to enable Apache MPM Prefork to improve performance

Tech Republic Data Center

Get the most out of your Apache server with mpm_prefork.

How To 85
article thumbnail

What CISOs Need To Do To Maximize Cybersecurity Awareness Month

Forrester IT

Not too long ago, Cybersecurity Awareness Month was a niche concept for only the biggest security teams. Security leaders at large financial services organizations would dress up in superhero costumes and hand out flyers to their employees, reminding users of basic security concepts such as strong passwords. This was a time-intensive, and one-off, activity that […].

article thumbnail

The Weekly Insight of the “Future of CIO” 10/11/2019

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 3 million page views with 6100+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc. The “ Digital Master ” book series includes 28 books to share insight from the multidimensional digital lens and perceive the multi-faceted impact the digital era upon us is making to the businesses and society.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

NEXT Magazine Issue 6 Quick Guide

Nutanix

NEXT Magazine is your source for practical advice, bold ideas, and occasionally controversial opinions from some of the IT industry's leading change agents.

article thumbnail

How to Make Strategic IT Workforce Planning

Future of CIO

Workforce management is an important process which underpins the organization’s collective human capability and differentiated business competency. With the fast-paced changes, hyper-diversity, exponential growth of information, and fierce competitions, the workforce planning and management has to become highly analytical and systematic. Though it does not mean that you treat people as "objects," it does mean that whatever workforce management programs you run needs to be aligned with the busine

How To 45
article thumbnail

FlexDeploy Integration with Credential Stores and Secrets Management Tools

Flexagon

FlexDeploy is DevOps platform that enables build, deploy and release automation, and provides authenticated integration with Source Code Repository, Issue Tracking & Change Control Systems, Cloud Providers, Applications, Middleware, Databases and more. For example, a token is necessary to work with Jira, or password is necessary to deploy objects to various databases.

Tools 12
article thumbnail

The Best “Viability” Quotes of “Digital Master” Oct. 2019

Future of CIO

" Digital Maste r ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Agile 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Common Online Conferencing Problems

Spearline Testing

Teleconferencing, video- and web-conferencing have changed the way businesses communicate and collaborate. The technology has driven efficiencies, reduced considerable costs and more recently these services have become notable as eco-friendly alternatives to traditional travel that has supported face-to-face business interaction. Conferencing interaction is different than face-to-face.

article thumbnail

NEXT Magazine Issue 6 Quick Guide

Nutanix

NEXT Magazine is your source for practical advice, bold ideas, and occasionally controversial opinions from some of the IT industry's leading change agents.

article thumbnail

7 Highly Effective Guidelines to Create an e-Report for Associations

Kitaboo

In this tech-inspired age, every enterprise is keen on leveraging the benefits of technology, however minimal. Because technology has often proved to be a cost-efficient and productive solution in the long run. Non-profit organizations too, are looking for ways to increase their reach and receive more funds to support their cause. And technology has helped them achieve this aim quite efficiently.

article thumbnail

7 Highly Effective Guidelines to Create an e-Report for Associations

Kitaboo

In this tech-inspired age, every enterprise is keen on leveraging the benefits of technology, however minimal. Because technology has often proved to be a cost-efficient and productive solution in the long run. Non-profit organizations too, are looking for ways to increase their reach and receive more funds to support their cause. And technology has helped them achieve this aim quite efficiently.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.