Thu.Jul 27, 2017

article thumbnail

Digital Store Technologies Take the Stage For Both Customer and Associate Experience

Forrester IT

Digital retail theater is becoming reality for consumers as retailers rush to find ways of attracting and retaining store customers. What is digital retail theater? It’s the combination of original retail theater – entertainment, novelty, and engagement – with digital technologies and services to create the next level of in-store experience.

Retail 254
article thumbnail

Cyber security not a priority for most sectors, study finds

Computer Weekly

Despite data breaches costing UK firms nearly £30bn in 2016, cyber security is still not a priority for most UK industry sectors, a study has revealed

Study 236
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Global IP Traffic Will Increase Nearly Threefold Over the Next 4 Years

IT Toolbox

Rapid advances in technology over the past few years have created different kinds of ?eras? and ?ages? within short time periods. We?re quickly leaving the Information Age and pushing forward into the Augmented Age: with all this change in technology, the internet will change just as quickly.

Internet 153
article thumbnail

How Wales has evolved into a hotspot for cyber security

Computer Weekly

Wales may be a small country but, in just a few years, it has become a global hotspot for cyber security innovation

Security 250
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Oilfield Rush to High-Tech Helps Smaller Companies Thrive

Data Center Knowledge

Computers, digital signals, algorithms redefine drilling; old guard snapping up next-gen firms with patents in hand Read More.

Company 179
article thumbnail

Tribunal strikes down Ofcom rulings on business broadband

Computer Weekly

The telecoms regulator will have to go back to the drawing board as it seeks to establish regulation for the business broadband market, following a successful appeal by Openreach

148
148

More Trending

article thumbnail

Security Think Tank: People are part of security, but should not be key element

Computer Weekly

What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence?

Security 138
article thumbnail

Schneider Buys Vertiv’s Transfer Switch Business for $1.25B

Data Center Knowledge

Vertiv says the deal will allow it to focus on core critical infrastructure business Read More.

155
155
article thumbnail

EE’s dominance in mobile network quality no longer a given

Computer Weekly

EE has retained its overall lead as the top-performing mobile network in the country, but is facing increasingly stiff competition from O2, Three and Vodafone

Mobile 127
article thumbnail

GigaSpaces Spins Off Cloudify, Its Open Source Cloud Orchestration Unit

Data Center Knowledge

Says independent company will be better able to focus on core cloud and telco markets Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sky to create 300 tech jobs to bolster capabilities of streaming services

Computer Weekly

Broadcasting giant outlines plans to ramp up its software engineering capabilities in the face of growing competition

article thumbnail

Selecting the Best Database for Your Organization, Part 1

Data Center Knowledge

The utility-based consumption model of paying for cloud services has caused a major disruption in the traditional models of technology. Read More.

Cloud 107
article thumbnail

Unified communications supplier Mitel buys competitor ShoreTel

Computer Weekly

The deal will create a market leading unified communications business and adds strength to Mitel’s cloud offering

article thumbnail

Diversity to Drones: Black Hat Speakers Weigh in On Top Security Trends

Data Center Knowledge

From $10 hacks to wind farm meltdowns, Black Hat speakers shared the state of security this week in Las Vegas. Read More.

Security 119
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Facebook share price hits record high

Computer Weekly

Social networking giant reports revenue up 45% and profits up 71% in second quarter compared with Q2 2016, as share price hits $173

Social 113
article thumbnail

True random numbers are here — what that means for data centers

Network World

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random. Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.

article thumbnail

Meg Whitman steps down from HP Inc board

Computer Weekly

Whitman has served as chairperson of HP since the separation of HP Inc and Hewlett Packard Enterprise in November 2015

HP 118
article thumbnail

Event Management Software: Helpful Features That Can Make Your Life Easier

IT Toolbox

Let?s take a look at what the event management software can do for organizations and event planning communities.

Software 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Android spyware can record your voice, take photos with your camera, and steal app data

Tech Republic Security

The Lipizzan spyware family, which can record calls and screenshots, was recently discovered and blocked by Google Security researchers.

Spyware 111
article thumbnail

Growing Companies Like Gluon Taking on the Blockchain Model

Galido

A Blockchain is a public ledger database of digital currency transactions that have ever been executed in a particular digital currency network. It is the protocol that digital currencies such as Bitcoin and Ethereum are built on top of. It is constantly growing as ‘completed’ blocks are added to it with a new set of recordings. The blocks are added to the blockchain in a linear, chronological order.

Company 94
article thumbnail

DCK Investor Edge: QTS Aims New Design At Cloud Giants

Data Center Knowledge

Need to cater to hyper-scale clients spurs design innovation at data center REIT Read More.

article thumbnail

Living in glass houses

IT Toolbox

Would you willingly live in a glass house where you could be seen by anyone at any time?

113
113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Video: Good security design will protect your company from cyber-attacks

Tech Republic Security

"The growth of IoT is staggering," says Lastwall co-founder and CEO Karl Holmqvist. Designing cybersecurity best practices in your product at the beginning could protect your company from the next big attack.

Company 87
article thumbnail

How to run cleanup tasks with Docker using these 4 tips

Tech Republic Data Center

If you tend to get lazy with Docker, leaving behind stopped containers and dangling volumes, here are some tips to help you keep Docker clean.

How To 70
article thumbnail

5 reasons encryption backdoors are a bad idea

Tech Republic Security

Mandating backdoors to encrypted services so law enforcement can use them under warrants has been a hot topic recently. But a backdoor for the good guys could be backdoor for the bad guys too.

65
article thumbnail

Most Perspective Gadgets In 2017 That Will Enchant You

Galido

It seems now that everything has been invented and it is unlikely that a person can come up with anything original, but we have compiled a list of the most perspective gadgets of 2017, which will certainly surprise you. Everyone knows that gadgets in our time are reliable and reliable helpers, which can greatly facilitate and ease our lives to an unimaginable extent.

Sports 60
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Top 5: Risks of encryption backdoors

Tech Republic Security

Encryption backdoors can help law enforcement catch criminals. But they can also make illegal endeavors easier for those carrying them out.

73
article thumbnail

The “Change Agent” Board of Directors

Future of CIO

Leadership or directorship is about setting directions and inspiring changes. Change is the only constant, and the speed of change is increasing rapidly. The board directors should become interactive change agents that represent the organization, stockholders, and senior management, make a significant influence on setting digital tones and shaping the digital mindset of the organization, both walk the talk and talk the walk and set the digital tone for others to follow.

article thumbnail

How to add a second fingerprint for your OnePlus device

Tech Republic Security

You never know which finger you'll have free to use for your smartphone scanner. Jack Wallen shows you how to add additional fingerprints to the OnePlus line of smartphones.

How To 60
article thumbnail

The Digital Traits of Digital CIOs

Future of CIO

The role of modern CIO is to identify and blend the ways that information and technology can assist and shape the business by linking all digital aspects together to enforce the business value creation. Digital becomes the very fabric of high performing businesses, To stay competitive, companies must go beyond just experimenting with some digital technologies and commit to transforming themselves into a fully digital business powerhouse.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.