Fri.Aug 04, 2017

article thumbnail

ICO highlights challenge Slack-like tools pose to public sector FOI request compliance

Computer Weekly

The Information Commissioner’s Office outlines how the growing use of cloud-based communication channels could complicate how public sector organisations respond to Freedom of Information requests

Tools 249
article thumbnail

Equinix Positioning for “Next Wave” of Cloud Data Center Deployments

Data Center Knowledge

Next-gen apps and lessons of past deployments are driving architectural changes in cloud infrastructure, and the colo giant wants to stay in tune. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security Think Tank: Five security controls to keep employees out of cyber firing line

Computer Weekly

What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence?

Security 195
article thumbnail

O’Reilly Security Conference NY Oct 29-30 2017

CTOvision

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. It covers interesting successes (and failures), provocative ideas, practical how-tos, proven best practices, and effective new approaches that can benefit all defenders.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Security audits reveal poor state of corporate cyber defences

Computer Weekly

Critical vulnerabilities detected in 47% of corporate systems investigated in security audits by Positive Technologies

Security 220
article thumbnail

Alphabet’s Green Energy Ambitions Hit Turbulence

Data Center Knowledge

Makani kite project struggles to take flight as cost of other energy sources falls Read More.

Energy 187

More Trending

article thumbnail

Developers Plead with Boardrooms to Take IoT Security More Seriously

Data Center Knowledge

Developers fear that boardrooms aren't taking the IoT security risk seriously enough, according to new survey data. Read More.

article thumbnail

Manchester to host international freedom of information event

Computer Weekly

Manchester is to host an international conference exploring the future of transparency and access to information in the UK and worldwide

article thumbnail

How to build security into your company's IoT plan

Tech Republic Security

As the IoT market booms, it's essential your company develops long-term cybersecurity solutions. These tips will help you prepare.

Company 156
article thumbnail

Expanding Extreme eyes Cisco, HPE networking business

Computer Weekly

Having acquired Avaya’s SDN and switching business, and with its purchase of Brocade’s datacentre unit imminent, Extreme Networks is on a mission to secure customers’ hearts and minds and take business from rivals

Network 146
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

iOS users beware: You're the biggest target for mobile phishing attacks

Tech Republic Security

Phishing continues to be a problem, and attacks are moving away from the email inbox. A new report found that iOS is the biggest target, with most attacks coming from game apps.

Mobile 123
article thumbnail

Nearly 7,000 civil service jobs at risk in government-as-a-platform strategy

Computer Weekly

Business case for Government Digital Service’s GaaP programme has predicted thousands of Whitehall job losses from new digital tools

article thumbnail

Exec’s Departure Hints at Problems in Lenovo’s Data Center Business

Data Center Knowledge

Information is scarce, but what's out there paints a picture of a company treading through troubled waters. Read More.

article thumbnail

MPs demand answers from HMRC over Childcare Service website problems

Computer Weekly

Treasury committee chair Nicky Morgan writes to HM Revenue & Customs CEO after users reported difficulties using the new digital service

Report 130
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Switch Donates $3.4M in Data Center Services for Reno’s New Supercomputer

Data Center Knowledge

New Tahoe Reno 1 data center will house future Proghorn system Read More.

article thumbnail

When 'collaboration' slows down your work

IT Toolbox

Deep work is what produces the things that matter in the world. Shallow work is just a glue.

124
124
article thumbnail

Facebook drives 2.5x performance boost in machine translation using neural networks

Tech Republic Data Center

Using its scalable deep learning framework, Caffe2, and recurrent neural networks, Facebook was able to further scale translations happening on the social network.

Network 102
article thumbnail

Friday Funny: the Office Cloud

Data Center Knowledge

Here's this month's edition of our cartoon caption contest. Submit your caption in the comments. Read More.

Cloud 104
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Business Intelligence Analytics: Strategic and Tactical

IT Toolbox

Part 1: The State of Analytics

article thumbnail

5 ways to create a secure firewall

Tech Republic Security

Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy.

article thumbnail

What is Managed WordPress Hosting vs Unmanaged WordPress Hosting

Galido

So you have developed this great WordPress website or built a wonderful blog and are renewing your WordPress hosting plan? One of the decisions you have to make is between the two possible hosting plans; managed and unmanaged. You may have heard other webmasters talking about managed plans, but you don’t know if such webhosting solution is right for your WordPress site.

article thumbnail

Big Data is changing the future of NBA scouting

Dataconomy

Big data and sports analytics are changing the ways many things in sports have traditionally been done. They are allowing for new processes that have the potential to alter the way that organizations conduct their scouting. This is because data science and sports analytics are opening up new data points. The post Big Data is changing the future of NBA scouting appeared first on Dataconomy.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Monthly Digital CIO Spotlight: The Digital CIO’s Digital Practices Aug. 2017

Future of CIO

Digital CIOs have to build their credibility as a trusted business adviser via setting the right priority and make continuous delivery. Modern CIOs have many personas and face great challenges. It is not sufficient to only keep the light on. Regardless of which industry or the nature of the organization you are in, being a digital leader will need to master the art of creating unique, differentiating value from piles of commoditized technologies.

Trends 40
article thumbnail

Infographic: Companies are turning to hybrid cloud to save money

Tech Republic Cloud

In a recent Tech Pro Research survey, respondents said they chose a hybrid cloud model because they were concerned about the higher cost of on-premises solutions.

Cloud 108