Fri.Apr 14, 2017

article thumbnail

Uber.Pepsi.The Ringling Brothers Circus. Our Values based analysis.

Forrester IT

Three very different brands with an unfortunate commonality: Each has recently incurred the wrath of a growing segment that Forrester calls the values-based consumer. Last week at Forrester's Consumer Marketing Forum, my colleague J im Nail and I launched a new line of research. It helps marketers manage the trend of consumers looking beyond the direct, personal benefits they receive from a brand to also value the brand's impact on society and the world.

Analysis 241
article thumbnail

Tips for Disinfecting Your Data Center

Data Center Knowledge

Cyberattacks have pretty much become a part of every day life. Security firm ForeScout’s State of Cyber Defense Maturity Report found that more than 96 percent of organizations experienced a major IT security breach in the past year. One in six organizations had five or more significant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microchip implants help employees access data; experts worry about 'slippery slope' for privacy

Tech Republic Security

A Swedish company offers employees the chance to implant microchips in their hands to simplify access to buildings and carry data. But the implants raise concerns about privacy.

Data 143
article thumbnail

Outer-Space Hacking a Top Concern for NASA’s Cybersecurity Chief

Data Center Knowledge

NASA scientists glean valuable data about powerful space explosions and the energy of black holes from their Swift and Fermi satellites. The projects were supposed to last a few years. Instead, they’ve survived for more than a decade. That’s great for researchers but a challenge for Jeanette.

Energy 140
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ubiquiti Evolving

IT Toolbox

In the world of enterprise WLAN, Ubiquiti is often not considered a contender for the same business that companies like Cisco and Aruba Networks go after. Ubiquiti is far and away not consumer-grade, yet just doesn’t tend to find its way into the same deals that the market leaders chase. There are lots of opinions on why that is, but those day’s may be on their way to changing.

article thumbnail

Salesforce Achieves Green Cloud Milestone

Data Center Knowledge

Salesforce announced Thursday that it has achieved net-zero greenhouse gas emissions and carbon neutral cloud delivery for all customers, in a blog post, citing the universal impact of climate change. The company is operating with net-zero emissions by purchasing high efficiency equipment and.

Cloud 119

More Trending

article thumbnail

Apple Said to Consider Helping Toshiba With Chip Unit Investment

Data Center Knowledge

The iPhone maker is actively looking at options for helping the troubled Japanese company by investing in its semiconductor unit, which has been put up for sale, according to people familiar with the matter. Apple is considering a range of options from partnering with Taiwan’s Hon Hai Precision.

Apple 117
article thumbnail

People - your weakest link

IT Toolbox

According to a recent report, 95 percent of enterprises have employees who are actively attempting to bypass corporate security

article thumbnail

How Database Monitoring Can Improve Engineering and Development Team Productivity

Data Center Knowledge

For DBAs, engineers, and developers, effective communication and access to information keeps everyone on the same page, from initial issue identification to after-action knowledge sharing. Read More.

article thumbnail

Diversity spend: When doing good leads to doing well

IT Toolbox

Learn why companies are seeking to improve supplier diversity, the business and societal benefits, and the new tools and technologies that are making attaining inclusive suppliers easier than ever.

Tools 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Application Build Reporting for MDT and SCCM

Mick's IT Blog

A few years ago, I had published a PowerShell module that contained a function to log all app installs during a build process. With the project of upgrading systems to Windows 10, I decided to explore that once again. This new script I have written is designed to query the programs and features registry entries to verify if an application is installed and to write that verification to a.CSV file.

article thumbnail

How to Speed up your WordPress Website

Galido

WordPress is one of the widely used web building tools in the World. The ease and flexibility that it provides are unmatched and unrivaled by any other platform. WordPress as a content management system (CMS) is used by around 60% of the websites. Due to its ever growing features and benefits, it has become one of the most dominating web building tools in the World.

How To 94
article thumbnail

Microsoft begins denying updates to some Windows 7 users

Network World

Microsoft this week began blocking Windows 7 and 8.1 PCs equipped with the very newest processors from receiving security updates, making good on a policy it announced but did not implement last year. But the company also refused to provide security fixes to Windows 7 systems that were powered by AMD's "Carrizo" CPUs, an architecture that was supposed to continue receiving patches.

Windows 71
article thumbnail

Video: How to avoid cybersecurity incidents when building a global system

Tech Republic Security

At the 2017 Midmarket CIO Forum, Jeff Young of Haynes International explains the challenges in creating a global ERP after winning the Midmarket CIO Award.

System 70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Samsung taps DOD tech veteran to head enterprise push

Network World

Samsung Electronics has appointed the former CIO of the U.S. Department of Defense to help a global push to expand its mobile enterprise business. Terry Halvorsen served as chief information officer at the Pentagon from 2015 until this year. Before that, he served as deputy commander of the Navy Cyber Forces and deputy commander of the Naval Network Warfare Command.

article thumbnail

What’s an Instagram Bot and How Does It Work?

Galido

Instagram is an innovative and unique social media network driven by visual content. Businesses use it for visual marketing because it’s extremely effective. The only problem some companies experience lies within having the time to put in the effort to make Instagram as productive as they want it to be for their business. That’s where automation, or Instagram bots come in handy.

Social 60
article thumbnail

SOAPA services opportunities abound

Network World

Security operations is changing, driven by a wave of diverse data types, analytics tools and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing and risk-driven trigger conditions.

SOA 68
article thumbnail

The 5 Best Reasons to Choose MySQL – and its 5 Biggest Challenges

Dataconomy

The latest version of MySQL is one of the world’s most popular databases. It is open source, reliable, compatible with all major hosting providers, cost-effective, and easy to manage. Many organizations are leveraging the data security and strong transactional support offered by MySQL to secure online transactions and enhance customer. The post The 5 Best Reasons to Choose MySQL – and its 5 Biggest Challenges appeared first on Dataconomy.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Leaked NSA exploits plant a bull's-eye on Windows Server

Network World

Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS. The Shadow Brokers, a mysterious hacking group, leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks. “This leak basically puts nation-state tools into the hands of anyone who wants them,” said Matthew Hickey, the director of security provider Hacker H

Windows 60
article thumbnail

New NSA leak may expose its bank spying, Windows exploits

Network World

A hacking group has released suspected U.S. government files that show the National Security Agency may have spied on banks across the Middle East. Numerous Windows hacking tools are also among the new batch of files the Shadow Brokers dumped Friday. In recent months, the mysterious group has been releasing hacking tools allegedly taken from the NSA, and security researchers say they actually work.

Banking 60
article thumbnail

How will future cars stay up-to-date? Make them open like a PC

Network World

The future seems bright for the automobile. A whole host of technologies -- including self-driving systems – is set to reinvent the auto industry, making cars more computerized than ever. But not everyone shares a rosy outlook. “I know what is going to happen in the future and I don’t like it,” said Bruce Perens , a leading open source advocate. “And I would like to guide it in a somewhat different direction.