Tue.Mar 21, 2017

article thumbnail

What Big Data and Public Speaking Have in Common

CTOvision

Brigg Patten. Public speaking is about turning even boring subjects into an inspiring experience. However, some speakers can make audiences cheer, while others put them to sleep. Genuine passion for the subject and good articulation can help, but successful public speaking engagements take something more. Analytics can actually tell us which elements can transform mere words into a unique experience.

Big Data 275
article thumbnail

How IT Uses Collaboration for Digital Transformation

IT Toolbox

As this series progresses, I’ll address the impact of digital transformation on three stakeholder groups, along with how each can use collaboration solutions like UC to manage these changes.

Groups 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK bans electronic devices from Middle Eastern flights

Computer Weekly

The UK government has announced that laptops and tablets will be banned from airliner cabins on UK-bound flights from a number of Middle Eastern countries

Airlines 149
article thumbnail

5 Ways to Combat VoIP Eavesdropping

IT Toolbox

Phone eavesdropping is back in the headlines, making it a good time to review options for guarding your voice over IP (VoIP) phone system. There’s a rich history to VoIP eavesdropping, including such attacks as Vomit, SIPtap, and Peskyspy.

VOIP 175
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three fails to stop second data leak

Computer Weekly

Mobile operator Three should have done a thorough review and upgrade of security after its previous security breach to avoid another incident just months later, say security commentators

Data 134
article thumbnail

How the Cloud is Changing ERP On-Premise

IT Toolbox

You would be forgiven for thinking on-premise ERP is a dead man walking. When it comes to software or services, the cloud is both the present and the future for most industries. ERP is no exception.

Cloud 150

More Trending

article thumbnail

4 Ways the IoT Can Feed Customer Data into Retail CRM Databases

IT Toolbox

Internet of Things (IoT) data in their raw form are messy. They need a lot of work to parse and pick the useful information out of the constant stream. Even with the data elements separated, organized, and stored in understandable ways, there’s too much of it to analyze manually. Throw in the continuous stream of new data, and it is overwhelming to businesspeople.

Retail 145
article thumbnail

How CIOs can apply IT supplier management skills to digitisation

Computer Weekly

The digital supply chain can be managed in much the same way as the software supply chain, where CIOs have gained expertise in working with multiple providers to effectively run a complex ecosystem

Software 127
article thumbnail

Do You Still Need a Business Phone for E commerce?

IT Toolbox

One of the hardest decisions you’ll make—one that could determine the success of your business—is how you communicate with your customers. You may be struggling to decide whether to go with a business phone for your e-commerce business or continue to use your personal phone for business use. You’re not alone: Several small, independent merchants struggle with this decision.

140
140
article thumbnail

Lords call on ISPs, government to do more to safeguard children online

Computer Weekly

A House of Lords Select Committee report on online safety has called for internet service providers and the government to do more to protect the interests of children using the internet

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

3 Ways Customer Relationship Automation Improves Sales

IT Toolbox

When most people think of automation, they think of robots in factories riveting together cars or other machinery. Admittedly, automation used to be the differentiating force in manufacturing. Today, however, automation has wormed its way into nearly every facet of organizations, including customer relationship management (CRM).

138
138
article thumbnail

Hundreds of Cisco Switch Models Vulnerable to CIA Hack Leaked by Wikileaks

Data Center Knowledge

There are no fixed releases yet; Cisco recommends disabling Telnet protocol. Read More.

Network 181
article thumbnail

6 Ways CRM Improves Vendor Relationships

IT Toolbox

Customer relationship management (CRM) software is, by definition, an electronic solution for the management of client databases. The tools and features available in your CRM solution makes it a highly effective system for managing suppliers and vendors. With proper management, CRM enables you not only to maintain but also to improve vendor relationships.

Tools 133
article thumbnail

IBM and Red Hat Partner on OpenStack Cloud for Enterprises

Data Center Knowledge

Agreement meant to give more confidence to IBM private cloud users of Red Hat OpenStack Platform and Red Hat Ceph Storage Read More.

IBM 146
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Russian Citadel malware developer cuts deal with US authorities

Computer Weekly

US Justice Department set to sentence a second Russian hacker for helping to develop Citadel malware that netted $500m, but says investigations are continuing

Malware 121
article thumbnail

How ERP Strengthens Inbound Marketing Strategies

IT Toolbox

Your next customer has already tuned you out. Advertisements, commercials, and even ads on YouTube are skipped, fast-forwarded, and ignored. So, what’s left? The answer is simple and at the same time complex: Let your customer find you. The idea isn’t revolutionary: Your customer is already looking for you every time he or she goes online to find a solution to a problem.

Strategy 113
article thumbnail

Mashraq uses beacon technology to make financial life easier

Computer Weekly

In its latest fintech launch, the UAE’s Mashraq bank is deploying beacon technology to ensure its customers get the loyalty rewards they are entitled to

Financial 120
article thumbnail

IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor

Network World

A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker–chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University of South Carolina in a paper.

Network 127
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Financial services CRM's program to modernize Siebel systems

IT Toolbox

A provider of enterprise customer management solutions to the financial services and insurance industries is helping firms in those sectors to modernize their legacy Siebel CRM systems.

Financial 100
article thumbnail

Hyperconverged infrastructure: The smart person's guide

Tech Republic Data Center

This comprehensive guide covers hyperconverged infrastructure, a new strategy for allocating computing and storage resources in data centers.

article thumbnail

Colorado turns to ERP to modernize government functions

IT Toolbox

Although ERP stands for enterprise resource planning, government agencies need modern ERP systems just as much as business enterprises do. To that end, the state of Colorado has awarded the contract for a new payroll system to CGI Group, the 40-year-old IT and business process services provider based in Montreal. The contract, worth $66.

article thumbnail

Homeland Security ban will limit large electronics on some US-bound international flights

Tech Republic Security

Terrorism threats cited as the reason behind a ban that affects carry-on devices larger than a smartphone, other than those for a medical need. Here's everything business travelers need to know.

Travel 112
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Six Ways to Improve Private Cloud Security

IT Toolbox

While Oracle CEO Mark Hurd predicts that 80 percent of corporate data centers will disappear by 2025 , there still are plenty of private cloud deployments among businesses large and small. Securing these private cloud deployments is a pressing issue.

Cloud 100
article thumbnail

Co-operative Group overhauls retail store networks

Computer Weekly

The Co-operative Group has brought in BT to revitalise and upgrade legacy networking infrastructure at its food retail business

Retail 111
article thumbnail

Foreign Currency, ACDOCA and S/4HANA

IT Toolbox

If your business uses manual journal entries and needs to account for foreign currency then there are a couple of aspects associated with foreign currency that you need to be aware of.

Journal 100
article thumbnail

Security Think Tank: Practical steps to increasing security without reducing usability

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

Security 127
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

China and hacking

IT Toolbox

There are said to be only two types of companies in the US: those that have been hacked by China, and those that don't know they've been hacked yet

Company 100
article thumbnail

Here's Google's open secret to cloud competition

Tech Republic Cloud

Google is getting real (and real smart) about open source as a strategic weapon in the cloud, which could give it an edge against Amazon Web Services.

Google 115
article thumbnail

Amazon Looks to Build Ninth Oregon Data Center

Data Center Knowledge

Company has plans to build 120-acre data center park in Umatilla County Read More.

article thumbnail

Transform into an 'experience business' or die: 4 tips from Adobe

Tech Republic Cloud

If you don't use data and design to fix the way customers interact with your brand, then you will get disrupted. Adobe is changing its cloud platform to help enterprises pull it off.

Adobe 103
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.