Tue.Jan 31, 2017

article thumbnail

Data breach costs exceed 20% of revenue

Computer Weekly

The cost of data breaches topped 20% of revenue in the past year as cyber attacks became more sophisticated and defenders struggled to keep pace, the latest Cisco security report shows

Data 209
article thumbnail

5 Reasons to Estimate Agile Development with Story Points

Social, Agile and Transformation

I have a few posts on agile estimation. Here's one on why estimating is important, another one on how to do one-week agile planning sprint, and a more detailed one on how to conduct an agile sizing meeting. Does agile poker help? Yes. If that's how the team wants to self organize and come to consensus on an estimate. I am often confronted with the question on whether to estimate in hours or.

Agile 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SAP aims to clarify S/4 Hana, cloud apps roadmaps for customers

Computer Weekly

The SAP board has launched an initiative to publish and clarify roadmaps, especially in respect of S/4 Hana and its cloud applications, and one product of which is a new technology choice tool

SAP 170
article thumbnail

Update On The Megatrend of Bigdata

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity. In this post we dive deeper into the trend of Big Data. For years now people and our sensors and our computers have been generating more information than we can analyze.

Big Data 155
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sponsored: Data Center Power Best Practices – Designing for Resiliency & Redundancy

Data Center Knowledge

The data center industry has seen significant growth over the past few years as more organizations are now working with data center providers to make their businesses more agile. This translates to greater requirements around uptime, resiliency, and cost efficiency. According to the latest AFCOM.

article thumbnail

Why Do Spammers Love The Internet Of Things?

CTOvision

Ciara Noonan. A spammer’s biggest fear is having their ability to send emails cut off. Inbox providers, inbound and outbound spam filters, ISPs, and blacklist operators constantly strive to reduce the number of spam emails that end up in users’ inboxes. That’s good for users, but bad for spammers whose business model depends on being able to blast as many people with spam as possible.

Internet 152

More Trending

article thumbnail

How AI is disrupting the role of call centres and call centre staff

Computer Weekly

Artificial intelligence could eliminate many white-collar jobs in coming decades.

article thumbnail

The Challenges of Managing a Remote IT Team

IT Toolbox

We live in a world where the workplace has all but become a completely fluid concept. People are no longer required to share the same office to be able to work together.

138
138
article thumbnail

NHS trusts vulnerable to cyber attack due to irregular app testing

Computer Weekly

Many NHS trusts are failing to scan internal apps for security-related defects or scan web perimeter apps regularly, potentially exposing patient data to cyber breaches

Security 131
article thumbnail

The state of IaaS: Growing as cloud adoption continues

Tech Republic Data Center

IaaS has been around long enough for conflicting research to emerge, but one thing remains clear: as cloud adoption continues, it's on the rise. Only a new technology could derail it.

Cloud 116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Avoid These 3 Disaster Recovery Mistakes

IT Toolbox

One in five organizations experiences an unplanned incident such as power outage, fire, flood or malicious attack in any given year, something that could impact business continuity. That's why a good disaster recovery plan is so important. It safeguards a company's IT infrastructure and minimizes financial loss as a result of a disaster.

article thumbnail

Datto Acquires Managed Networking Firm Open Mesh

Data Center Knowledge

Deal expands capabilities in Datto's newly launched networking solutions portfolio Read More.

Network 150
article thumbnail

IP: Generating ICMP Redirect Messages

IT Toolbox

Conceptually, ICMP can be divided into two parts: one that handles incoming ICMP messages and another that generates outgoing ICMP messages. While both hosts and gateways must handle incoming messages, most outgoing messages are restricted to gateways. Thus, ICMP code is usually more complex for gateways than for hosts.

116
116
article thumbnail

HMRC aims to ease transition to digital tax returns for UK businesses

Computer Weekly

HM Revenue & Customs sticks to 2018 deadline despite warnings from MPs, but three-year transition will cost firms £1bn before savings kick in

125
125
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

IP: Avoiding Errors About Errors

IT Toolbox

Procedure icsetdata creates the data portion of an ICMP message. The action taken depends on the message type, which icsetdata receives as an argument.

Data 122
article thumbnail

Retail tech training – an opportunity to drive employee retention?

Computer Weekly

A job in retail is often the first employment many people will have, so could technology training increase the retention of store staff?

Retail 128
article thumbnail

Report: Spam and cloud attacks rising, 4 steps to protect your business

Tech Republic Security

Budget concerns and a lack of talent are barriers to advancing enterprise security, according to Cisco's 2017 Annual Cybersecurity Report. Here's how you can protect your business.

Report 110
article thumbnail

More than a million Netgear routers feared vulnerable to hijack

Computer Weekly

At least 10,000 and possibly more than a million Netgear routers are vulnerable to hijack by attackers, warn security researchers

Research 130
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Considering Edge Computing? Here are 5 questions you should ask.

IT Toolbox

IoT (Internet of Things) cloud-based platform solutions can be excessively slow, expensive and inefficient. Due to bandwidth restrictions, by the time data from hundreds or thousands of IoT devices reach the cloud for processing, it’s often too late to act upon it.

Internet 109
article thumbnail

Gigaclear wins Northamptonshire BDUK contract

Computer Weekly

Rural fibre broadband supplier Gigaclear has been awarded a Stage Three BDUK contract covering remote parts of Northamptonshire

126
126
article thumbnail

How Big Data Changes Database Administration

IT Toolbox

Technical support teams usually support familiar hardware and software configurations. Specialization in particular combinations of operating systems and database management software is common, and this allows some team members to gain in-depth experience that is extremely valuable in an enterprise IT setting. How has big data changed this paradigm?

article thumbnail

New leaders in insurance industry drive digital innovation

Computer Weekly

Insurance companies are investing in digital innovation, with a new breed of leaders formalising enterprise strategies

Insurance 130
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Toshiba Asset Sales After Chips Spinoff Will Cut to the Bone

Data Center Knowledge

Conglomerate has 600-plus different businesses, but raising cash via firesale won't be simple Read More.

126
126
article thumbnail

The Appropriate Way to Give Work Feedback

IT Toolbox

Employee feedback is vital to the success of your team. There are appropriate ways to give feedback, and there are ways to provide feedback that will cause the employee to react negatively. Ultimately, appropriate feedback will be received in a positive way that will produce the results you want.

100
100
article thumbnail

Dropbox boosts collaboration and management for business users with Smart Sync and Paper

Tech Republic Cloud

At a media event in San Francisco, Dropbox announced new document collaboration and file management tools in an effort to target more business users.

Media 107
article thumbnail

January's IT Management Monthly New Digest

IT Toolbox

Cisco Buys App Performance Company AppDynamics for About $3.7 Billion. In one of the largest deals in recent years, Cisco Systems announced it is buying application performance management company AppDynamics for about $3.7 billion. The move is geared at helping Cisco expand its reach beyond its networking business.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Google boosts G Suite manageability with enterprise-grade security controls

Tech Republic Security

Google recently announced that its G Suite set of applications would be getting improved analytics, security key enforcement, and additional data loss prevention tools.

Google 92
article thumbnail

7 Tips for Managing Your Business Expenses More Effectively

IT Toolbox

Business expenses can add up quickly. Before you realize it, you've exceeded your monthly budget without even knowing how the money was spent -- and with no chance of recouping your loss.

Budget 100
article thumbnail

Windows 10 helps stop spread of ransomware, Microsoft security researcher says

Tech Republic Security

A recent Microsoft security blog claims that Windows Defender ATP can help better detect ransomware infections and keep them from becoming 'epidemics.

Windows 96
article thumbnail

5 Steps to Developing a Balanced Business Budget

IT Toolbox

For a business to be successful, it must be profitable. Being profitable means that all expenses are accounted for and there are still funds remaining. While this is the ultimate goal for all business owners, it can be difficult to reach this level. Fortunately, creating a balanced business budget is a fairly simple way to monitor both expenses and revenue to determine profitability.

Budget 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.