Tue.Feb 21, 2017

article thumbnail

The 2017 Enterprise Architecture Awards: Driving The Customer-obsessed Digital Business

Forrester IT

Just about every company Forrester works with tells us they are driving to become Digital Businesses. But not just 'digital' as a technology imperative - they are investing in digital to dramatically change how they serve their customers - with target benefits rippling over to customer retention and acquisition. We call this focus Customer-obsessed Digital Business.

article thumbnail

Yahoo takes $350m cut on deal with Verizon after security breaches

Computer Weekly

Ending months of speculation, Verizon has announced a revised deal for acquiring Yahoo’s core business that is $350m less than the original due to revelations of two major data breaches

Security 253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Shades Darker? – What The Diageo “Indirect Access” Judgement Really Means For SAP Customers

Forrester IT

At last, exactly two years later, the long-awaited sequel to my hit, if overly censored, blog post: Five Shades Of Grey (How software buyers and license managers should be compliant without being submissive). The trigger is the SAP vs Diageo verdict , which generated a lot of hysterical blogging and tweeting with dire predictions for SAP customers. IMO most commentators have overlooked the crucial parts of the judgment and therefore significantly overstated the case's negative implications for S

SAP 243
article thumbnail

Generative Adversary Networks: A very exciting development in Artificial Intelligence

CTOvision

Bob Gourley. For years there has been a growing concern that many forms of machine learning are actually easier to deceive than they should be (and there is good reason to be concerned, for background on why see the paper recommended to me by my friend Lewis Shepherd: " Deep Neural Networks are Easily Fooled "). Many of us have also raised concerns about the current security frameworks around Artificial Intelligence (there are none!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Multi-Cloud Won’t Work Without Replication; How Do We Get There?

Data Center Knowledge

As organizations move to multiple public clouds, they in turn will need a way to synchronize data seamlessly across multiple providers — cross-cloud replication makes this possible. Read More.

Cloud 184
article thumbnail

Ransomware doubled in second half of 2016, says Check Point

Computer Weekly

Check Point identifies the most prevalent ransomware and other malware that organisations should be prioritising based on data from the second half of 2016

Malware 183

More Trending

article thumbnail

Airborne cars to transform Dubai’s public transportation

Computer Weekly

Dubai’s Roads and Transport Authority is readying the launch of autonomous aerial vehicles in July this year

article thumbnail

Google Launches Bare-Metal Cloud GPUs for Machine Learning

Data Center Knowledge

All three cloud giants now offer GPU infrastructure as a service Read More.

Cloud 196
article thumbnail

The changing shape of mobile apps

Computer Weekly

We find out how organisations can gain the agility they need to keep pace with mobile app innovation

Mobile 213
article thumbnail

Android ransomware up more than 50%, locking users' devices until they pay

Tech Republic Security

A recent report stated that, over the past year, Android ransomware detections rose more than 50%, with many attacks occurring in the first half of 2016.

Report 133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Half of enterprises to start digitising networks by 2019, says Cisco

Computer Weekly

At Cisco Live Europe in Berlin, Cisco offers an insight into key networking trends and announces new products and upgrades to support and secure the digitisation of the network

Network 155
article thumbnail

Software defined data infrastructure management and insight tools (BD2017)

IT Toolbox

Recently I found in my inbox a link to a piece 6 Dashboards for Managing Every Modern Data Center that caught my attention. I was hoping to see who the six different dashboard solutions were instead of finding list of dashboard considerations for modern data centers and data infrastructures.

article thumbnail

Why businesses need a more enlightened approach to phishing attacks

Computer Weekly

City firms often fire staff for accidently clicking on phishing emails, but there is a better approach, Intel Security’s Raj Samani tells Computer Weekly

Intel 166
article thumbnail

Bitter - for DIageo that's the taste of negotiating with SAP

IT Toolbox

In the case of SAP UK Ltd v Diageo Great Britain Ltd [2017] EWHC 189 (TCC) (16 February 2017) - the courts found in favour of SAP regarding indirect use of SAP via Salesforce.

SAP 100
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Pure Storage adds Cohesity Data Platform to FlashArray//M arrays

Computer Weekly

All flash array maker gets Cohesity functionality natively in its arrays, in a move that will allow snapshots to be tiered between platforms and managed by Cohesity

Storage 137
article thumbnail

Big Data, Big Cities: Emerging Tech Hubs for Data Science

IT Toolbox

Knowing what customers and audiences want and how they react to products and services is an important aspect of all business enterprises, particularly for companies operating in the business sector.

Big Data 100
article thumbnail

Australian bank implements cloud-based people management software

Computer Weekly

Digital bank chose software as a service when it wanted more from its HR systems

Banking 186
article thumbnail

Vapor IO Targets Edge Computing with Micro Data Centers for Telcos

Data Center Knowledge

Vapor Edge is designed for wireless towers and can be consumed as a service Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

SAP users react with concern to SAP High Court victory over Diageo

Computer Weekly

SAP UK and Ireland User Group has reacted to the supplier’s High Court victory over Diageo in indirect licensing dispute

SAP 150
article thumbnail

Why EU watchdogs say Windows 10 is still a major privacy concern

Tech Republic Security

Microsoft made some attempts to clarify its data collection policies in Windows 10, but some EU watchdogs said that it isn't enough.

Windows 137
article thumbnail

Brexit might benefit genomics big data analytics research

Computer Weekly

Genomics, an IT-dependent area of medical science research, could yet benefit from Brexit by lower barriers to data acquisition

Research 143
article thumbnail

Android Security Bulletin February 2017: What you need to know

Tech Republic Security

The February 2017 Android Security Bulletin features more critical flaws than any other bulletin to date, as well as a number of high-rated issues. Get the highlights.

Security 113
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Visa opens London technology centre

Computer Weekly

Visa opens a space in London where it can test out technologies alongside customers and suppliers

145
145
article thumbnail

IDG Contributor Network: Breaking through the cybersecurity bubble

Network World

For many in the cybersecurity space, the world revolves around the attack vector. Many security vendors narrowly focus on their version of the prevent, defend and respond paradigm—focusing on their purported supremacy and on making their case to get a piece of the enterprise security budget pie. At the recent RSA Conference in San Francisco , however, there were some hopeful signs that this narrow view and myopic perspective is evolving—at least for some.

Network 108
article thumbnail

2017 IT Priority Study: Trends in the EMEA converged/hyper-converged market

Computer Weekly

Find out what converged and hyper-converged initiatives IT decision makers are planning in 2017

Study 121
article thumbnail

We finally know how much a data breach can cost

Network World

Everyone knows corporate data breaches can be expensive, but does anyone really know exactly how expensive? Recent estimates for the average cost have landed all over the map, ranging from $4 million to $7 million. But when it comes to the top end of the scale, those appraisals turn out to be laughably small. + Also on Network World: Everything you know about cyberwar is wrong +.

Data 94
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

2017 IT Priority Study: Trends in the EMEA security market

Computer Weekly

Find out what security initiatives IT decision makers are planning in 2017

Security 136
article thumbnail

How to monitor the apocalypse using big data DevOps

Tech Republic Big Data

Logz.io CEO explains the advantages and potential pitfalls of DevOps and how the company used big data and AI to create the Apocalypse Index, a real-time chart forecasting the end of the world.

article thumbnail

2017 IT Priority Study: Trends in EMEA storage

Computer Weekly

Find out what storage initiatives IT decision makers are planning in 2017

Storage 128
article thumbnail

Verizon knocks off $350M from Yahoo deal after breaches

Network World

Verizon Communications will pay US$350 million less for Yahoo after two major data breaches reported by the struggling internet pioneer. Verizon will pay about $4.48 billion for Yahoo's operating business, and the two companies will share any potential legal and regulatory liabilities arising from two major data breaches announced in late 2016. The companies announced the amended terms of the deal Tuesday.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.