Wed.Mar 29, 2017

article thumbnail

Digital Risk of Data Increases When Employees Leave

CTOvision

Crystal Lister. Employee turnover can potentially have serious effects on an organization’s productivity, morale, profit, financial resources, and increase an organization's digital risk posture. The data that employees work with and have access to becomes more vulnerable and susceptible to leaks as employees prepare for departure. Current research shows that employees are increasingly taking sensitive or proprietary information with them when they depart an organization, whether intentionally o

Data 174
article thumbnail

Dads aren't the problem: we need mums onside to get girls into Stem

Computer Weekly

Fathers are rarely a barrier for girls trying to pursue careers in science, technology, engineering and maths, but we need to get mothers on board, according to an expert panel

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

6 Ways to Improve VoIP Call Quality

IT Toolbox

A VoIP system facilitates telephone calls over the Internet, which delivers increased functionality for business communications. But the quality of audio achieved is subject to several variables, and just one wrong choice of hardware or software can result in a disappointing connection. Here are six steps you can take to maximize the VoIP call quality within your business. 1.

VOIP 163
article thumbnail

Extreme to Buy Brocade’s Data Center Network Business

Data Center Knowledge

Its third acquisition deal announced in six months further fleshes out enterprise networking portfolio. Read More.

Network 183
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Non-malware attacks pose bigger threat than malicious software

Computer Weekly

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

Malware 145
article thumbnail

Hybrid IT is Today’s Reality, Not the Future

Data Center Knowledge

IT professionals should not assume that providing more cloud resources, larger instances, and faster databases will be the right answer to all performance questions—that’s often how sticker shock and technical issues arise. Read More.

Resources 147

More Trending

article thumbnail

Social Media Secrets That All CIOs Need To Know

The Accidental Successful CIO

Getting the most out of social media can require help from the CIO Image Credit: Sean MacEntee. I’m thinking that by now we can all agree that social media is important. However, how to go about using it correctly is a bit of a mystery. Every company wants to make the most of the free service that each of the different social media channels offers, but the challenge is that they are not 100% exactly how to go about doing this.

Media 126
article thumbnail

Girls across UK take part in cyber skills event to promote tech careers

Computer Weekly

Young women from across the UK took part in cyber security event CyberFirst Girls, designed to promote girls with cyber skills and encourage them to pursue careers in technology

Security 133
article thumbnail

European Data Center Startup Etix Bets on R&D, Edge Markets

Data Center Knowledge

The company is quickly building out a global network of lights-out data centers. Read More.

article thumbnail

How will the network manager’s role change in the SDN world?

Computer Weekly

We explore how traditional network managers are changing the habits of a lifetime as SDN remakes the enterprise network

Network 158
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

Company 127
article thumbnail

Belfast Waterfront centre equipped with state of the art network

Computer Weekly

Belfast City Council has refitted its Waterfront conference and entertainment venue with new smart building connectivity to enhance the staff and visitor experience

Network 128
article thumbnail

Ford Plans $200M Data Center in Anticipation of Connected Car Data Explosion

Data Center Knowledge

Company expects 1,000 percent increase in data volume due to connected cars Read More.

article thumbnail

In-flight electronics ban unsustainable, says IATA

Computer Weekly

The IATA calls on the American and British governments to urgently find alternatives to restricting the carry-on of laptops and tablets on Middle Eastern flights

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Report: 95% of businesses have migrated critical applications to the cloud

Tech Republic Cloud

SolarWinds recently released its 2017 IT trends report, examining the effects of increasing cloud adoption on IT and the shift to a hybrid infrastructure.

Report 130
article thumbnail

Unused Oregon Prison May Be Converted to Data Center

Data Center Knowledge

California developer offering $10 million to rid state of $60 million facility that costs $300,000 to maintain Read More.

article thumbnail

How to print to a local network printer from a Chromebook

Tech Republic Cloud

Chromebooks offer convenience and portability, but what about printing? Here are three ways to print directly to your networked printer from a Chromebook.

Network 123
article thumbnail

Cyber defence just one of the skills next-gen IT professionals will need

Computer Weekly

Emerging technologies, the impact of Brexit and fintech companies are creating new opportunities for the next generation of IT professionals

Company 124
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

Tech Republic Security

Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.

Industry 108
article thumbnail

Almost 40% of firms seeking cloud skills find it hard to recruit

Computer Weekly

Most orgainsations agree that cloud skills are important for the future, but those involved in recruitment are finding it difficult to hire talent

Cloud 121
article thumbnail

IBM report: Leaked records hit 4B, up 566% since last year

Tech Republic Security

Cybercriminals compromised more than 4 billion records last year, including credit cards, passwords, health information, and business documents. Here's how to stay safe.

IBM 110
article thumbnail

Nordic CIO interview: Kari Finnskog, Västtrafik

Computer Weekly

Swedish transport authority has opened up its IT to ensure it provides customers with a service that suits them

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why do electronics fail?

IT Toolbox

Technology is a very interesting thing. Most of it is run by electrons, as are we actually, and, apart from mechanical movements required, there are no moving parts at all. Yet sometimes, for no apparent reason, electronics can, and do fail. Occasionally in a spectacular fashion that can do justice to any sulphur, carbon and saltpetre mixture.

Fashion 100
article thumbnail

Security Think Tank: Four guidelines on how balance security, usability and cost

Computer Weekly

How can organisations maintain usability and keep support costs low without compromising on security?

article thumbnail

March 2017 Server StorageIO Data Infrastructure Newsletter

IT Toolbox

First a reminder world backup (and recovery) day is on March 31. Following up from the February Server StorageIO update newsletter that had a focus on data protection this edition includes some additional posts, articles, tips and commentary below.

Data 100
article thumbnail

Russian Airline at home in the cloud

Computer Weekly

S7 Airlines in Russia looks set to move more of its IT to the cloud after successful infrastructure-as-a-service project

Airlines 120
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Preparing For World Backup Day 2017 How Are You Prepared

IT Toolbox

In case you have forgotten, or were not aware, this coming Friday March 31 is World Backup (and recovery day). The annual day is a to remember to make sure you are protecting your applications, data, information, configuration settings as well as data infrastructures. While the emphasis is on Backup, that also means recovery as well as testing to make sure everything is working properly.

Backup 100
article thumbnail

CNCF: Cloud Native Foundation drives portability forward

Computer Weekly

The Cloud Native Foundation conference in Berlin kicked off with a set of initiatives to take on board popular container engines from Kubernetes and Docker

Cloud 107
article thumbnail

Digital right leaves no digital left

IT Toolbox

One thing which really gets my goat (which is silly really because I don't have a goat, I have a cat) is this Digital Rights Management. As far as I am concerned it is as useless as the nipples on my chest (Now try and get that image out of your head, you're welcome). What purpose is digital rights management supposed to achieve?

100
100
article thumbnail

Are ethical questions holding back AI in France?

Computer Weekly

France has been slow to create a strategy around the use of artificial intelligence, partly due to questions around ethics

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.