Thu.Feb 09, 2017

article thumbnail

21.co Pioneers A New Way To Communicate: Recommend setting up your profile now

CTOvision

Bob Gourley. 21.co is known as the company making Bitcoin useful for developers. They provide capabilities like the 21 Bitcoin Computer which gives developers everything they need to build Bitcoin enabled apps. Perhaps more importantly they have provided tutorials, tips, FAQs and a place for developers to directly interact on all topics Bitcoin. The company is now providing a new capability that will be of interest not only to developers but to a wide range of technologists and soon perhaps to t

article thumbnail

How artificial intelligence is powering retail customer experience

Computer Weekly

Retailers are beginning to explore how cognitive computing and AI could make e-commerce smarter and more personalised

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Data Center Market Kicks Off 2017 With Flood of Acquisitions

Data Center Knowledge

With deals by three of the six public data center REITs, strategic acquisitions are back in vogue The first few weeks of 2017 are in the books, and strategic data center acquisitions are back in vogue with three of the six publicly traded REITs having announced new deals. Read More.

article thumbnail

Data breaches affect all parts of business, Verizon report shows

Computer Weekly

Verizon’s second annual Data Breach Digest provides common scenarios to help organisations improve preparations for, and responses to, the most popular types of cyber attack

Data 153
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chat bots need AI + ML!

IT Toolbox

Taking an AI-only off-the-shelf white label banking bot as they are offered today will hundreds require hundreds of hours to code out the asks and intents for adding enhancements on these tools.

Banking 136
article thumbnail

The politics of things: Policymakers must help shape the IoT

Computer Weekly

Saverio Romeo, principal analyst at Beecham Research, explores the role of policymakers in the rapidly expanding internet of things

Internet 174

More Trending

article thumbnail

SAP connects S/4 Hana in the cloud with ‘intelligent’ ERP

Computer Weekly

SAP has announced an intensification of S/4 Hana cloud delivery, together with an infusion of its enterprise resource planning with artificial intelligence

SAP 148
article thumbnail

Cisco Warns of Catastrophic Clock Signal Flaw

Data Center Knowledge

Issue affects Nexus 9000 data center switches, series 4000 routers, ASA security devices among other products Read More.

article thumbnail

Saab CIO Mats Hultin says be open, flexible and agile – or die

Computer Weekly

Saab CIO Mats Hultin is directing the Swedish defence company’s IT function globally to be streamlined and standardised, but open and flexible for a future that includes the internet of things

Agile 137
article thumbnail

Google will soon delete apps with no privacy policies from Play Store

Tech Republic Security

This week, Google warned developers whose apps collect sensitive user data, but do not include a privacy policy, that their apps are at risk of removal from the Play Store on March 15.

Policies 126
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Cardiff University opens Twitter ‘cyberhate’ centre

Computer Weekly

Cardiff University researchers are to monitor Brexit-related hate crime on Twitter with funding from the Economic and Social Research Council

Research 141
article thumbnail

Media Access Control (MAC) Standards for CSMA/CD

IT Toolbox

With a CSMA/CD system, collisions are assumed to be a normal operational occurrence. The most frequently used analogy is the comparison of a CSMA/CD-based LAN with a group discussion. In such a discussion, each member of the group listens for an opportunity to be heard. On some occasions, however, two or more members will attempt to speak at the same time.

LAN 116
article thumbnail

Winter Olympics 2018 critical systems will all be in the cloud

Computer Weekly

Atos is on course to hit its target of having all core Olympic IT systems in the cloud by next year's Winter Olympics in South Korea

System 142
article thumbnail

Wanted: White hat hackers to break new automotive software updater code

Tech Republic Security

Over-the-air software updates for cars is a security risk. Researchers who developed an open source software update framework for cars are asking security experts to help find flaws in its code.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cancer Research UK drives donations with proximity Wi-Fi network

Computer Weekly

Cancer Research UK used Devicescape’s virtual Wi-Fi network and marketing platform to engage support and drive donations on World Cancer Day

Research 135
article thumbnail

Four Ways to Survive the IT Operations Big Data Deluge

Data Center Knowledge

In order to gain customer experience insights, analytics-driven applications will deliver teams complete understanding over cloud and on-premise application infrastructure, application performance and the underpinning network. Read More.

Big Data 108
article thumbnail

South African children’s hospital uses video to train cardiologists

Computer Weekly

The Red Cross Children’s Hospital in Cape Town is using remote video learning to teach paediatric cardiology surgery to medical students

Video 125
article thumbnail

GaN is Eyeing Silicon’s Data Center Lunch

Data Center Knowledge

Ultra-dense material promises huge efficiency improvements in server power conversion Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Government transformation strategy aims to 'restore faith in democracy', says minister

Computer Weekly

Cabinet Office minister Ben Gummer outlines his ambitious hopes for the new government transformation strategy at its launch

article thumbnail

Microsoft Adds Patent Suit Protections For Cloud Customers

Data Center Knowledge

IP lawsuits against cloud users rose 22 percent in last five years Read More.

Cloud 146
article thumbnail

'Invisible' malware hidden in trusted software, infiltrating enterprises worldwide

Tech Republic Security

A recent Kaspersky Lab report detailed a targeted attack of 'invisible' malware that utilizes legitimate software to hide in server memory. Here's what you need to know.

Malware 104
article thumbnail

VoIP enhances customer experience for high-end travelers

IT Toolbox

Grace Bay Resorts, a boutique developer and operator of high-end luxury resorts and branded residences, has turned to CaaS provider AVOXI for a suite of integrated cloud communications - including a cloud-based phone system, virtual contact center software, a VoIP gateway and international toll free numbers.

VOIP 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to solve SELinux issues with ease using SELinux Alert Browser

Tech Republic Security

Has SELinux got you down by blocking your apps or causing general havoc? Instead of disabling it, discover how to use the SELinux Alert Browser to solve those problems.

How To 100
article thumbnail

ERP goes to school.and makes the grade

IT Toolbox

Roughly half of all K-12 schools instructing about 32 million students in 70 countries will be able to tap into ERP technology now that PowerSchool has purchased educational back-office software maker SunGard K-12. By purchasing SunGard from financial services technology leader FIS (formerly Fidelity National Information Services Inc.

Education 100
article thumbnail

Microsoft and Amazon open up AI

Computer Weekly

This year is set to be the year AI breaks through into mainstream computing, and the major IT firms are gearing up

Microsoft 119
article thumbnail

The Quickest Way to Sync Files From One Computer to Another

IT Toolbox

Transferring files between computers, particularly when you are changing workstations at work, can be a rather daunting task. Usually, you will have to spend several days trying to make sure that you are able to move all important data files successfully. Without the correct tools, this could be a very tedious task.

Tools 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Beware: Don't be scammed by bad links in Google search results

Tech Republic Security

A recent ad for retail giant Amazon in Google's search results directed users to a Windows support scam. And it might not be the first time this has happened.

Google 102
article thumbnail

Big Data - DBAs and Job Security

IT Toolbox

Early adopters of Big Data technology were sold special hybrid hardware / software solutions that included descriptions like, “black box”, “plug and play”, and my favorite, “no performance tuning required” Today, as solutions have matured and customers have become better educated in the capabilities of these vendor solutions, everyone now

Big Data 100
article thumbnail

How to enable two-factor authentication on your LinkedIn account

Tech Republic Security

LinkedIn can be just as essential as Facebook if you need to network for business. Here's how to keep your account safe with two-factor authentication.

article thumbnail

Three million personal and commercial drones to ship this year

Computer Weekly

Research from Gartner sees no let-up in drone sales despite increasing regulation

Research 130
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.