Thu.Apr 06, 2017

article thumbnail

Anti-trust complaints target Microsoft in the European Union

Computer Weekly

Microsoft comes under pressure as software suppliers raise market abuse complaints with the European Commission over bundling of Defender security software with Windows

Microsoft 250
article thumbnail

IP Phones are Hot - What's Up with That?

IT Toolbox

The market for phone systems has always been large, and any change will be closely followed given its connection to the broader communications ecosystem. Depending on who you talk to, desk phones are either obsolete or still have utility, and businesses need to know which scenario to support when making decisions.

System 221
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IR35 reforms: Stakeholders warn of risk to public sector IT projects as contractors walk

Computer Weekly

With the IR35 reforms coming into force today, 6 April, contracting stakeholders warn of the widespread threat the changes pose to the delivery of public sector IT projects

224
224
article thumbnail

Beer, Bots and Broadcasts: Companies Start Using AI in the Cloud

Data Center Knowledge

A growing number of enterprises are using new combinations of AI tools and cloud services from Microsoft, Amazon, and Google Read More.

Cloud 189
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Improving the Customer Experience

IT Toolbox

While price and product selection are still important, increasingly the customer experience is the key differentiator in this internet age. Customers have a broad range of choices in nearly everything and alternatives are just a mouse click away.

Internet 140
article thumbnail

Guarding the Guards Themselves—The Truth Behind Security Devices

Data Center Knowledge

By Dennis Cox, Chief Product Officer, Ixia We trust numerous security devices to protect our networks, and they have an exceedingly difficult job. The number of applications that now make up a network has hit ridiculously high numbers. Who knows what the latest cloud-based applications will bring?

Security 131

More Trending

article thumbnail

This Hacker Can Talk His Way inside a Data Center

Data Center Knowledge

The human factor in cybersecurity is every hacker’s favorite exploit Read More.

article thumbnail

Why You Don't Want To Use Spreadsheets for Quotes

IT Toolbox

Spreadsheets are one of the most common tools for preparing quotes. Unfortunately just because they are common doesn't mean they are ideal. Spreadsheets are powerful and flexible but they have inherent limits that make them problematic for jobs like preparing sales quotes.

Tools 124
article thumbnail

Equinix Exec: We Spent $17B on Data Centers, but Cloud Giants Spend Much More

Data Center Knowledge

Tens of billions in cloud infrastructure spending illustrate how real the shift to the cloud is. Read More.

article thumbnail

Interview: F-Secure’s Mikko Hyppönen on the Nordics, Russia and the internet of insecure things

Computer Weekly

Computer Weekly sat down with Finnish cyber security expert Mikko Hyppönen to talk about security in the Nordics, Russia and the trouble with connected devices

Internet 128
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Best Practices in Implementing CRM

IT Toolbox

Implementing a CRM system isn't hard, but it does take work and careful planning. Know Your Needs. The most important first step in instituting CRM is to know what you need and what you hope to accomplish. Think about this carefully and have a well-defined set of requirements before you go shopping.

System 113
article thumbnail

Telenor launches IoT pilot in Norway

Computer Weekly

Telenor is opening up its IoT infrastructure in Norway to encourage students and entrepreneurs to develop IoT products and services

article thumbnail

3 Ways Futuristic IoT Tech Is Already Revolutionizing ERP

IT Toolbox

While the internet of things (IoT) may include futuristic sensors and connected devices, the future is already happening. In fact, Gartner analysts predict that IoT adoption will reach 43 percent this year. Even consumers are getting on board, increasingly opting for concepts like smart fridges or voice-activated "assistants" that can tell them the weather forecast.

Internet 113
article thumbnail

CIO interview: Richard Sharp, CTO, Shazam

Computer Weekly

We speak to the new chief technology officer at music discovery service Shazam about how to foster an innovation culture

CTO 137
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Perils of Personalization

IT Toolbox

Personalization is the key to successful CRM email campaigns. The features of a well-designed CRM system make it an ideal vehicle for contacting customers in a highly personalized manner.

System 113
article thumbnail

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Upwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

Policies 148
article thumbnail

Tackling Your Business with a Social Media Manager

IT Toolbox

Sooner or later as your company's online presence grows you're going to need a social media manager to handle the social media part of your business. The job of the social media manager (SMM) is to coordinate your entire social media effort in support of your business.

Media 100
article thumbnail

These Women Know Their Stuff

Data Center Knowledge

When girls enter junior high and high school, that's when they should be exposed to the possibility of working in the data center industry. Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ERP tops hospital IT wishes but budgets block adoption

IT Toolbox

Comprehensive ERP systems lead wish lists for healthcare executives because they still don’t have the digital insights they need to pursue value-based care, according to a new study from market research company Black Book.

Budget 100
article thumbnail

Research fires warning at banks over branch closures

Computer Weekly

Traditional retail banks cannot rely on customer loyalty if service levels drop as a result of branch closures and staff cuts

Banking 116
article thumbnail

Architecture principles, are they any good?

IT Toolbox

Principles are in essence Rules for decision making. At times though, they just recommend best practices. Principles are the result of experience and abstraction. They help us make judgements, i.e. take decisions without the never ending debates. Hence, they save us time and the agony usually associated with the decision making process.

article thumbnail

Japan's formal embrace of Bitcoin points to growing role of cryptocurrency in commerce

Tech Republic Security

Japan recently passed a law recognizing the cryptocurrency Bitcoin as an official form of payment. The move opens up new opportunities for the Bitcoin ecosystem.

113
113
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Architecture principles, are they any good? (i)

IT Toolbox

continuing from. Architecture principles, are they any good? Architecture principles enable us manage the enterprise complexity by separating concerns, usually by structuring the enterprise in groups of entities which could be developed and changed independently.

article thumbnail

IBM, PNC partner to get more military veterans into tech jobs

Tech Republic Security

IBM recently joined forces with PNC to expand a free nationwide training program aimed at getting US veterans into cybersecurity and data-based jobs.

IBM 115
article thumbnail

Architecture principles reduce the architecture debt (i)

IT Toolbox

continuing from. Architecture principles, are they any good? Principles should be brief, clear, consistent. Should employ the same or a similar syntax.

article thumbnail

Businesses can't blindly trust the Microsoft cloud--or any other cloud for that matter

Tech Republic Security

Using cloud computing services requires a certain amount of trust, but that doesn't mean enterprises should give that trust blindly.

Cloud 118
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Bringing Cloud And Big Data To Inventory Management

IT Toolbox

Managing inventory sold online along with those sold offline could make inventory management a tad more complex than what it used to be

Big Data 100
article thumbnail

Bitcoin Mining Profitability

Galido

While it might seem late to get into mining Bitcoin, the price for Bitcoin did rocket to $1000 in 2014, only to come tumbling down to $200 today in August of 2015. Have we hit the bottom of that drop, and might we reach those highs again? Or is it a good time to start mining other digital currencies with the hopes of also reaching 2014 Bitcoin levels?

Banking 90
article thumbnail

Family Health West Eliminates Growing Pains with PaperVision Enterprise

IT Toolbox

Converted all medical records to electronic records, enhanced compliance with federal regulations, and reduced storage costs

article thumbnail

Sweden’s Bisnode consolidates outsourced IT

Computer Weekly

Swedish firm Bisnode brings multiple IT services contracts under one roof

113
113
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.