Fri.Apr 21, 2017

article thumbnail

Information security key to digital era business models

Computer Weekly

Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way

article thumbnail

What’s Next in Storage: Managing Data by Objectives

Data Center Knowledge

We have systems that are fast, systems that can scale, and systems that provide low-cost capacity, but what we do not have is a way to ensure all of those different attributes are used effectively to serve evolving application demands while reducing costs in the face of rapidly increasing data.

Storage 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lack of risk taking could threaten British tech, says Level39’s head

Computer Weekly

Failing to take risks in the current climate of rapid change could act as a barrier for growth for British tech and businesses, according to head of Level39

154
154
article thumbnail

JPMorgan Said to Plan Tripling Size of New York Technology Hub

Data Center Knowledge

Banks competing fiercely for techies in era of automation, fueled by cheap computing power and fears of losing to startups Read More.

Banking 153
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Government puts up £23m a year for AI to boost UK economy

Computer Weekly

Business secretary Greg Clark announces Industrial Strategy Challenge Fund, committing more than £1bn over four years

article thumbnail

4 critical points to consider when receiving cybersecurity and privacy advice

Tech Republic Security

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.

Internet 142

More Trending

article thumbnail

Microsoft launches IoT Central to Simplify Internet of Things Management

Data Center Knowledge

Says companies need services that help manage IoT devices and analyze data they generate Read More.

Internet 159
article thumbnail

UK likely to face national cyber emergency, says NCSC

Computer Weekly

The UK is likely to face a level-1 cyber attack at some point in the future, according to the National Cyber Security Centre (NCSC)

Security 144
article thumbnail

How to Effectively Use Security Cameras for Your Home

IT Toolbox

Within the home environment, a security camera system comes with a plethora of benefits that ensures that our loved ones especially kids and the vulnerable are safe within the home environment.

Security 100
article thumbnail

Meet the IBM Watson-powered robot that could make your next smartphone

Tech Republic Cloud

IBM's cloud-connected robot arm shows off the flexibility of the factory robots of tomorrow.

IBM 156
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Dell EMC Sells SaaS Backup Firm Spanning to Private Equity

Data Center Knowledge

Now stand-alone company offers backup for SaaS applications like G Suite, Office 365, Salesforce Read More.

Backup 119
article thumbnail

Apple makes it easier for businesses to get iWork suite and other popular apps for free

Tech Republic Cloud

Although Pages, Numbers, Keynote, iMovie, and GarageBand were already free for those who purchased qualifying products, Apple recently clarified the licensing and made it easier to obtain these apps.

Apple 113
article thumbnail

Robot crime raises thorny legal issues that need addressing now

Tech Republic Security

A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.

142
142
article thumbnail

There's now a tool to test for NSA spyware

Network World

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell. Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It's designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.

Spyware 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Windows 10: Fast-charging PCs using Galaxy S8 Snapdragon chip out this year

Tech Republic Data Center

Chip maker Qualcomm has confirmed that "mobile" Windows 10 PCs built around its Snapdragon 835 system-on-a-chip are due by December.

Windows 112
article thumbnail

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day. Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day.

Malware 103
article thumbnail

Friday Funny: Kip and Gary Go to a Data Center Conference

Data Center Knowledge

Here's this month's Data Center Knowledge cartoon caption contest Read More.

article thumbnail

Cybersecurity skills shortage threatens the mid-market

Network World

Each year, respondents ESG's annual global survey of IT and cybersecurity professionals are asked to identify the area where their organizations have a problematic shortage of skills. For the sixth year in a row, cybersecurity skills topped the list—this year, 45% of the 641 respondents said their organization has a problematic shortage of cybersecurity skills.

Survey 96
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Security Think Tank: How to get the best out of red team exercises

Computer Weekly

How can organisations use red teaming to identify security gaps?

Exercises 121
article thumbnail

IDG Contributor Network: Is your company spending on the right security technologies?

Network World

Investing in security technologies is a given for most companies today, and with stories of breaches and hacks making headlines every week, the importance of these tools has risen to prominence. While there’s no shortage of security technologies to choose from, the big question that remains is: How does a company choose the right security investments?

article thumbnail

The Alzheimer's Association Simplifies Donation Processing with ImageSilo

IT Toolbox

Eliminated paper storage both onsite and in a records warehouse and streamlined check handling

Storage 100
article thumbnail

IDG Contributor Network: Why banks should stay well clear of blockchain

Network World

If the financial services industry is banking on blockchain as the basis for new service innovation, it will be sorely disappointed. Blockchain's design principles are completely at odds with those of the industry, and the technology is fraught with flaws that could be catastrophic for financial institutions. I’ll come on to why in a moment. Clearly, there is a lot of hype and momentum around blockchain.

Banking 87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google had more than 90k government requests for data in 2016, calls for new data framework

Tech Republic Big Data

According to Google's latest transparency report, countries and courts around the world continue to ask for more and more data. As such, Google is calling for a new methods to process these requests.

Google 87
article thumbnail

DARPA opens massive “Colosseum” to develop radical wireless applications

Network World

DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies. Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “

article thumbnail

Oracle 12c: Removing Multi-line Comments the Analytic Function Way

IT Toolbox

I just couldn't ignore this. Not an "earworm" but an "SQL worm".

Oracle 100
article thumbnail

Phishing attacks using internationalized domains are hard to block

Network World

The latest version of Google Chrome, released earlier this week, restricts how domain names that use non-Latin characters are displayed in the browser. This change is in response to a recently disclosed technique that could allow attackers to create highly credible phishing websites. The ability to register domain names made up of characters like those found in the Arabic, Chinese, Cyrillic, Hebrew and other non-Latin alphabets dates back over a decade.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Intro to Machine Learning: 10 Essential Algorithms For Machine Learning Engineers

Dataconomy

It is no doubt that the sub-field of machine learning / artificial intelligence has increasingly gained more popularity in the past couple of years. As Big Data is the hottest trend in the tech industry at the moment, machine learning is incredibly powerful to make predictions or calculated suggestions based. The post Intro to Machine Learning: 10 Essential Algorithms For Machine Learning Engineers appeared first on Dataconomy.

article thumbnail

The cloud security war - 2

IT Toolbox

Just how secure is encryption, anyway?

Security 100
article thumbnail

Banks and fintechs, instead of banks versus fintechs

Dataconomy

In 2016, global market uncertainty seemed to make investors somewhat more cautious, thanks to the results of the votes in the UK and the USA. However, fintech’s stellar run did not come to a halt. According to the February report by KPMG, venture capital investment in the space rose 7%, The post Banks and fintechs, instead of banks versus fintechs appeared first on Dataconomy.

Banking 78
article thumbnail

What's in the fine print of your disaster recovery vendor agreement?

Network World

Sign on the bottom line Image by Thinkstock Disaster-recovery solutions require several complex, moving parts coordinated between your production site and the recovery site. Service-level agreements are ultimately the most accurate way to determine where responsibility is held for disaster-recovery process and execution. It’s important to have SLA documentation around these critical aspects of recovery so that customers have commitments from their vendor.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.