Wed.Mar 22, 2017

article thumbnail

Google Drives Into The Business Content Services Segment of ECM

Forrester IT

Several Forrester colleagues and I attended the Google Next conference earlier this month, an event showcasing the Google Cloud Platform portfolio. One message, however, was distinctly NOT cloudy: Google is aiming at the enterprise market. And that includes your enterprise content. Google Drive has been a popular offering in the cloud enterprise file sync and share market, and we evaluated it as a Leader in our 2016 Forrester Wave (subscription required).

Google 382
article thumbnail

The Toll of Ransomware is Growing

CTOvision

Rick Delgado. Opening an unknown email, clicking a new link, or accessing a malicious document: it doesn’t take much to fall victim to a cyber attack. There are a variety of attacks that can greatly hurt your company and lead to a loss of finances and sensitive information, but ransomware attacks are increasing in frequency and severity for a number of companies. .

Backup 181
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Make Omnichannel A Cornerstone Of Your Digital Transformation – The Telco Angle

Forrester IT

Source: Forrester, "Make Omnichannel A Cornerstone Of Your Telecom Digital Transformation" Poor customer experiences remain the Achilles' heel of telcos' digital transformation efforts. We live in the age of the customer, and today's telco customer has expectations that far exceed the traditional standard of telco customer service. A random search on Trustpilot for customer satisfaction with telcos in various countries shows widespread dissatisfaction.

article thumbnail

IR35 reforms will harm public sector innovation and competitiveness, say contractors

Computer Weekly

Research from recruitment consultancy Harvey Nash highlights contractor concerns about how the forthcoming IR35 reforms will affect competitiveness and talent recruitment in the public sector

Research 203
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Does How You Look Really Matter?

The Accidental Successful CIO

Studies show that what you wear to work may impact how effective you are Image Credit: Matthew Kenwrick. When you go into the office, how do you dress? Do you put on a suit, find just the right tie, and make sure that your shoes are polished? Or do you slide on that pair of jeans that you’ve been wearing for a couple of years now, grab the shirt that’s hanging over the back of the chair in the bedroom, find your car keys and you are off?

Study 140
article thumbnail

PSD2 – time to open and secure APIs and rethink business models

Computer Weekly

With the EU’s Payment Service Directive (PSD2) going into effect in January 2018, banks have no time to waste in preparing for the changes it will bring

Banking 207

More Trending

article thumbnail

Ubuntu Server: The smart person's guide

Tech Republic Cloud

Ubuntu Server is more popular than ever, thanks to containers and the cloud. This resource guide about Ubuntu Server covers why the platform matters, how to use it, and more.

Resources 156
article thumbnail

Most UK businesses in the dark about crucial DNS infrastructure

Computer Weekly

Most UK businesses have little visibility or control over their DNS servers and services even though they are a key component of businesses’ infrastructure and security profile

Security 126
article thumbnail

How Workers Use Collaboration for Digital Transformation

IT Toolbox

To close out this series , we need to consider the largest group of stakeholders, employees. While not the economic buyers, they’re the ones doing the collaborating, along with being impacted the most by digital transformation.

Groups 122
article thumbnail

Security Think Tank: Education and automation will up security and cut user friction

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

Security 167
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Stop using password manager browser extensions

Network World

It's been over a year since I presented on LostPass at ShmooCon, and in that time, many more bugs have been found in password managers. The most severe of which are in browser-based password managers extensions such as LastPass. Tavis Ormandy yesterday demonstrated a remote code execution on the latest LastPass version. This isn't the first extremely severe bug he's found in LastPass, either; there've been so many extremely severe bugs in LastPass it would be tedious to list them out.

140
140
article thumbnail

Google Invests in Avere, a Data Center Storage Supercharger

Data Center Knowledge

Startup’s technology “hides latency” to and from enterprise storage clusters Read More.

Storage 171
article thumbnail

AirCheckers of the World- Unite!

IT Toolbox

If you are a WLAN-er and happen to have either the Fluke Networks AirCheck (the old but beloved yellow one) or the new and spiffy green NetScout AirCheck G2, you can be part of something really fantastic that will take just a few minutes of your time. We all see the WLAN world through our own eyes and with our own frames of reference.

Network 113
article thumbnail

IBM and Wanda are Building a New Cloud Company in China

Data Center Knowledge

US giant hopes to tap into conglomerate’s ecosystem and reach from luxury hotels to cinemas Read More.

Hotels 152
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Technology Can Grow Your Business

IT Toolbox

Leveraging technology as a means to growing and optimizing your business is one of the smartest things you can do.

145
145
article thumbnail

Three may consider legal action if spectrum imbalance persists

Computer Weekly

Three boss Dave Dyson says he may consider mounting a legal challenge if Ofcom does not change how spectrum holdings are regulated and controlled

123
123
article thumbnail

How to manage Docker containers from the command line

Tech Republic Cloud

You've installed Docker and have even run your first container. Here's how to manage those containers and images through the command line.

How To 151
article thumbnail

The End of Backup

Data Center Knowledge

As many IT professionals have discovered too late, backups are also unreliable, a situation made even worse by the fact that bad backups typically aren’t discovered until there’s a need to restore. Read More.

Backup 104
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

PostNord cutting up to 4,000 Danish jobs in response to digitisation

Computer Weekly

The logistics firm is set to cut jobs in Denmark due to falling mail volumes in the country, with a new production model set to be introduced

114
114
article thumbnail

Smartdrones

IT Toolbox

From time to time I have this urge to peer into the future and try to anticipate the nature of the technology coming down the pike towards us

112
112
article thumbnail

Docker: The smart person's guide

Tech Republic Cloud

This comprehensive guide about Docker, the leading containerization technology, covers the paradigm shift of containers vs. virtualization, as well as why Docker matters for business users.

article thumbnail

CIO interview: Martin Hofmann, Volkswagen Group

Computer Weekly

Volkswagen Group recently demonstrated how it was working with D-Wave to research uses for quantum computing.

Groups 125
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Here are the top 6 ways websites get hacked, according to Google

Tech Republic Security

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.

Google 135
article thumbnail

Tech City UK report trumpets nation’s digital economy

Computer Weekly

In its third TechNation report, Tech City UK says the nation leads the way in digital innovation across Europe

Report 120
article thumbnail

Managing Today's Data with a Leadership Mindset

IT Toolbox

By keeping informed, you will be able to make better decisions and influence the direction of business rather than simply following the crowd.

Data 100
article thumbnail

Data Center Provider vXchnge Bought Lots of Wind Power Last Year

Data Center Knowledge

vXchge and Green House Data are the only two data center providers on the list who are not global giants. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Facial recognition in public restroom required if you want toilet paper

Network World

When you gotta go, you gotta go, but there may be a line in public restrooms. Usually those lines don’t have anything to do with surveillance. Let’s hope a new biometric authentication trial in China doesn’t roll out here, or else you would have to stop in public bathrooms in front of a device that uses facial recognition and wait for your allotted amount of toilet paper to be dispensed.

article thumbnail

How one man's phishing scam cost two major US tech companies $100M

Tech Republic Security

By pretending to be a major supplier, a Lithuanian man recently took two multinational companies for a lot of money. Here's what your business needs to know.

Company 109
article thumbnail

Think your Cisco switch is secure? Think again: Hundreds are vulnerable to a simple attack

Tech Republic Data Center

The Vault 7 documents released by WikiLeaks continue to reveal security weaknesses in trusted technology. This time it's Cisco's turn to reveal its mistakes to the world.

Security 104
article thumbnail

Google cites progress in Android security, but patching issues linger

Network World

The chances of you encountering malware on your Android phone is incredibly small, according to Google. By the end of last year, less than 0.71 percent of Android devices had installed a " potentially harmful application ," such as spyware, a Trojan, or other malicious software. That figure was even lower, at 0.05 percent, for Android phones that downloaded apps exclusively from the Google Play store.

Google 97
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.