Wed.May 03, 2017

article thumbnail

Zero Trust for MeatWare: It Applies to Us Humans Too

Forrester IT

Zero Trust principles have thus far been mainly aimed at the network and the technology that makes our interconnected systems "live." That's how the concept was originally meant to be applied, but the reality around the threat vectors and need for better security capabilities means that Zero Trust has to adapt just like everything else does. The concept for Zero Trust is super, and it's being adopted at quite a few major organizations, but there's still a problem.

Security 302
article thumbnail

Fake tech support spiders on the world wide web

Computer Weekly

Fake tech support should be incorporated into security awareness training as it can be a highly effective way to trick employees into granting access to enterprise computer systems

Training 226
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Verizon to Sell Cloud and Managed Hosting Business to IBM

Data Center Knowledge

Plans to focus on managed services around partner offerings Read More.

IBM 211
article thumbnail

Enterprises predict cloud budget growth will outpace overall IT spend in 2017

Computer Weekly

451 Research's latest Voice of the Enterprise report suggests enterprise IT buyers are feeling very optimistic about how much money they will get to spend on cloud and hosting technologies in 2017

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Here's What You Need to Know About VPN Security and Privacy

IT Toolbox

Security and privacy are the two vital concerns that are growing all across the globe these days. They’re important in today’s digital world because we carry electronic devices all the time with us and stay connected with people on social networks.

Security 134
article thumbnail

Cognitive security is key to cyber arms race, says KuppingerCole

Computer Weekly

Cognitive computing technology is an area of artificial intelligence that is expected to help provide businesses with the security tools they need to deal with new and emerging cyber threats

More Trending

article thumbnail

Google hails end of multi-year enterprise cloud migrations

Computer Weekly

Google cloud chief, Diane Greene, claims multi-year datacentre migrations are no longer the norm, as some firms are making the move off-premise in weeks or months

Google 167
article thumbnail

Five Steps to Better Data Center Vendor Vetting

Data Center Knowledge

Best choices aren't always evident until equipment has been installed. Here are some tips for avoiding nasty surprises. Read More.

article thumbnail

SAP focuses on training young Arab graduates in Middle East

Computer Weekly

SAP has a raft of initiatives planned in the Middle East which includes a strategy to equip young people and entrepreneurs with the IT skills required as the region transforms.

SAP 145
article thumbnail

Six Signs You Need Cloud ERP

IT Toolbox

ERP is complex software that sits at the center of a business. It also is a mature product. This makes the rise of cloud-based ERP something more than your typical software sector moving to the cloud. ERP in the cloud is not as simple as project management software and email, and the stakes are higher for businesses.

Cloud 114
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How government can use digital procurement to spend its way out of Brexit troubles

Computer Weekly

Better use of the government's purchasing power could help to boost sectors, such as technology, likely to be affected by Brexit

article thumbnail

Will VR Be The Death of Personal Space and Security?

IT Toolbox

Last year, over $2 million was invested in the virtual and augmented reality industry, due to the sheer supply needed to meet the demand of these devices.

Security 114
article thumbnail

Mayor of London seeks chief digital officer

Computer Weekly

Capital’s first-ever chief digital officer will oversee the digital transformation of public services across London

177
177
article thumbnail

Dubai Cybersecurity Hub on Hiring Binge, Only Locals Need Apply

Data Center Knowledge

Dubai on high alert since "Shamoon 2" attack on Saudi Arabia Read More.

Security 150
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

3D XPoint et al to force architecture and software changes

Computer Weekly

New solid state technologies such as 3D XPoint will be a second tier of memory, bringing change to hardware architectures and software to be rewritten, says SNIA solid state group chair

3D 133
article thumbnail

May the Fourth be with you on World Password Day

Network World

Get ready to be bombarded with “May the Fourth be with you” puns regarding your passwords and identity, as this year May 4 is not only Star Wars Day but also World Password Day. Leading up to World Password Day, I received dozens of emails about how bad our password hygiene still is, studies about poor password management, reminders to change passwords, pitches about password managers and biometric options to replace passwords, reminders to use multi-factor authentication (MFA) as well as the st

article thumbnail

Apple to return an extra $50bn to investors

Computer Weekly

Announcement comes as Apple’s shares take a dip on worse-than-expected quarterly results that saw a fall in iPhone sales

Apple 143
article thumbnail

How to Make Cloud Integration Easy

Data Center Knowledge

Most of the storage capacity used by applications is being wasted on data that is not being accessed. Read More.

How To 117
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Barclays Bank opens startup hub in London

Computer Weekly

Bank aims to support fintech firms in their early stages

Banking 163
article thumbnail

Rackspace CEO Taylor Rhodes Leaving Company

Data Center Knowledge

Says he’s taken managed cloud firm as far as his skills allow Read More.

Company 132
article thumbnail

How to Determine Your PC's Cooling Needs

IT Toolbox

This post looks at PC cooling in detail.

How To 157
article thumbnail

Red Hat: The cloud needs an OS, and OpenShift is just the thing

Tech Republic Cloud

In a world of cloud complexity, Red Hat's Linux experience could pay dividends.

Cloud 146
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Docker Appoints New CEO

Data Center Knowledge

Company chairman and co-founder Steve Singh takes over for Ben Golub Read More.

Company 117
article thumbnail

9 reasons why the death of the security appliance is inevitable

Network World

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.

article thumbnail

Ascent Launches Its First Toronto Data Center

Data Center Knowledge

Toronto is quickly growing as a data center market Read More.

article thumbnail

Cloud spend to outpace overall IT investment, report finds

Tech Republic Cloud

The pace at which companies are investing in cloud and hosting services is growing at string rate. While the trend is happening in most companies, it's pronounced in larger enterprises.

Cloud 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Better batteries

IT Toolbox

Lithium-ion batteries are in use everywhere today, but they have a couple of problems

100
100
article thumbnail

How to configure Office 365 in macOS Sierra

Tech Republic Cloud

Microsoft Office 365's footprint is ever increasing, and for good reason--the hosted email and office productivity software works well. Learn how to configure Office 365 in macOS Sierra.

How To 93
article thumbnail

IDG Contributor Network: Healthcare data breaches skyrocket, but is there good news coming?

Network World

In 2016, 328 individual healthcare breaches occurred, surpassing the previous record of 268 in 2015, according to Bitglass’ recent Healthcare Breach Report. As a direct result of the breaches, records of approximately 16.6 million Americans were exposed due to hacks, lost or stolen devices, unauthorized disclosure and more. The good news, however, is that the overall number of compromised records has declined for the second year in a row, and early indications suggest that those numbers will con

article thumbnail

Red Hat's OpenShift.io seeks to provide a complete open source development platform

Tech Republic Cloud

Red Hat announced the release of OpenShift.io, a new cloud-based development ecosystem. Learn more about the features and benefits it provides.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.