Tue.May 16, 2017

article thumbnail

C-Level Business Executives Are Playing A Bigger Role In Tech Spending, But CIOs Still Remain Dominant

Forrester IT

Tech buying in business and governments is clearly shifting from the sole or primary control of the CIO and the tech management organization and into the hands of business leaders. But how much is this happening? Anecdotal comments and surveys - including Forrester's own Business Technographics surveys - suggest that most tech purchases are now controlled by business executives.

Survey 362
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Marty Meehan. Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra scale dominates the market, supports 1000s virtual NICs and dual 10 GbE ports, and provides

Software 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Five Factors That Make Deep Learning Different - Go Deep Baby!

Forrester IT

At the highest conceptual level, deep learning is no different from supervised machine learning. Data scientists start with a labeled data set to train a model using an algorithm and, hopefully, end up with a model that is accurate enough at predicting the labels of new data that is run through the model. For example, developers can use Caffe, a popular deep-learning library, to train a model using thousands or millions of labeled images.

Training 331
article thumbnail

NVIDIA CEO: AI Workloads Will “Flood” Data Centers

Data Center Knowledge

Data center managers in every industry have to answer some key questions to prepare for AI Read More.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Five DevOps Lessons from a CIO Getting in the Weeds on AWS

Social, Agile and Transformation

I always advise CIOs and technologists to get into the weeds to figure out what's going on. So last week I spent some time getting a number of AWS services up and running. Nothing too crazy, but successful. My first project was to set up a new domain, Driving-Digital.com on AWS Route 53 to enable landing pages and vanity URLs for my upcoming book, Driving-Digital: The Leader's Guide to.

Devops 161
article thumbnail

UK government sees collaboration as key to cyber security success

Computer Weekly

The UK government believes collaboration between the public and private sectors is critical to success in cyber security

More Trending

article thumbnail

Five steps for business after WannaCry cyber attack

Computer Weekly

WannaCry reveals some important facts about our dependence on the internet and IT

Internet 203
article thumbnail

Five Advanced Excel Tips And Tricks For Windows Users

IT Toolbox

If you use Microsoft Excel as your default worksheet application, we are sure that you already know some useful tips to work faster. But there are more tips and tricks that you may not know yet.

Windows 113
article thumbnail

Lack of skills preventing digital transformation, says 65% of decision makers

Computer Weekly

Research has found skills gaps in data science, AI and infrastructure management are standing in the way of digital transformation

Research 159
article thumbnail

Despite security risks, 75% of CEOs use applications that aren't approved by IT

Tech Republic Security

Despite understanding the risks, a majority of CEOs and business decision makers do not adhere to enterprise security practices, according to a new survey from Code42.

Security 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Financial services CISOs prioritise GDPR – but their service providers might not have

Computer Weekly

Survey shows 52% of CISOs working in the finance sector have made compliance with the EU’s General Data Protection Regulation an investment priority

Financial 147
article thumbnail

How To Market New Technology

IT Toolbox

Marketing new technology, such as home security, requires that a company must be well connected with big names. These people can be potential clients, current customers, and bloggers who have significant online following.

How To 100
article thumbnail

Open source for hybrid cloud success: Is it an open and shut case?

Computer Weekly

Quocirca’s Clive Longbottom ponders whether enterprises need to adopt an open source-first strategy for hybrid cloud success

article thumbnail

Top 5: Ways to stay safe online

Tech Republic Security

Chances are, you've heard these tips before. But as recent news stories indicate, reminders about online security are never a bad thing.

Security 134
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Toxic data: What it is and how to find it and deal with it

Computer Weekly

In this podcast, Mathieu Gorge, CEO of Vigitrust, looks at the management of legacy data and how to find and deal with toxic data that could expose your organisation to compliance breaches

How To 125
article thumbnail

IGMP: Translating Between IP and Hardware Multicast Addresses

IT Toolbox

When a host leaves a host group, it calls procedure hgarpdel to remove the ARP cache entry and inform the hardware.

Hardware 124
article thumbnail

HPE increases ‘The Machine’ memory pool 20-fold

Computer Weekly

The Machine is HPE’s proof-of-concept next-generation hardware architecture that aims to overcome the limits of today’s IT by using large memory arrays

article thumbnail

Small Business Owner? Add These Accessories to Your Smartphone.

IT Toolbox

This post looks at some smartphone accessories for business.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Most younger shoppers want to buy goods directly through social media

Computer Weekly

Shoppers aged 20 and under are increasingly interested in buying goods directly through social media, as well through subscription-based retail services and voice-activated devices

Media 120
article thumbnail

Top 10 Tips to Stay Safe Online

Galido

Internet security has become a hot topic of debate today, and his really comes as little surprise given the large amounts of devastating malware attacks users are experiencing all around the globe. Don’t allow a hacker to infiltrate your business’s personal information. Use these tips for best results and keep the hackers at bay and you and your customer’s info safe.

Malware 103
article thumbnail

Customer experience transformation at Macquarie bank brings legacy system retirement as a bonus

Computer Weekly

Australia’s Macquarie bank builds a data layer on top of legacy IT systems to transform customer experience

Banking 149
article thumbnail

A Little TLC Goes a Long Way Toward Staff Retention

Data Center Knowledge

Good help is often hard to find and even harder to keep. Read More.

How To 135
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Users should stay grounded while ERP suppliers take to the cloud

Computer Weekly

User organisations are advised to keep their heads while suppliers show signs of cloud intoxication

Cloud 149
article thumbnail

WannaCry

IT Toolbox

For those of you who have just returned from a vacation on Mars, WannaCry is one of the most successful viruses ever

100
100
article thumbnail

Colt extends high bandwidth network into Finland

Computer Weekly

Network and datacentre provider will expand its high bandwidth IQ Network to Helsinki to offer pan-Eurasian and local connectivity

Network 125
article thumbnail

VMware brings its virtual desktops to Microsoft Azure with Horizon Cloud integration

Tech Republic Cloud

VMware recently announced a new solution that brings its virtual desktops and applications to Microsoft Azure.

Vmware 116
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Qatar’s Milaha Maritime and Logistics upgrades firewall to ensure global network performance

Computer Weekly

Middle East marine and logistics company has improved its firewall to support global expansion

Firewall 145
article thumbnail

WannaCry makes me want to cry!

Network World

As I read about the WannaCry ransomware attack, my brain is racing with thoughts about the causes and effects of this global incident. Here are my two cents: 1. Ransomware continues to be a growth business, and a bit of work can provide a serious return. The FBI estimated that ransomware payments topped $1 billion in 2016, and I wouldn’t be surprised if we saw 100 percent year-over-year growth. 2.

article thumbnail

Ransomware: Protect yourself with good backup and cloud policies

Computer Weekly

More ransomware attacks are likely.

Backup 180
article thumbnail

How one ransomware campaign was actually a front for a terrorist kill list

Tech Republic Security

Morrison Foerster's John Carlin, a former Department of Justice employee, spoke with TechRepublic about the concept of blended threats, and what businesses can learn from them.

87
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.