Fri.May 05, 2017

article thumbnail

Gov.uk Verify and identity assurance - it's time for a rethink

Computer Weekly

The government's Verify identity platform is not meeting user needs - it's time to step back and review how best to make online identity for public services work

Meeting 249
article thumbnail

Setting Standards with CRM

IT Toolbox

Standards are important for every area of business – including CRM. Firm, reasonable standards of performance help keep the business under control and processes running smoothly. Every phase of your business requires standards and part of your job is to set them and make sure your employees follow them.

175
175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ex-government privacy advisor calls for 'fundamental review' of Gov.uk Verify identity scheme

Computer Weekly

Former Cabinet Office privacy group co-chair says the Verify identity assurance programme needs 'honest and fundamental reset'

article thumbnail

How Machine Learning Can Improve IT Operations

Data Center Knowledge

Enterprises barely use significantly larger data sets to improve availability and performance process effectiveness with root cause analysis and incident prediction. Read More.

Analysis 163
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Debenhams data breach underlines need for supply chain security

Computer Weekly

Data breach at retailer again highlights the importance of data protection and ensuring cyber security standards across an organisation’s entire supply chain, say security commentators

Security 172
article thumbnail

What is a NOC, and How It Improves Data Center Availability

Data Center Knowledge

Should you invest in a NOC? If so, do you build one in-house, or outsource? Here are some important points to consider. Read More.

More Trending

article thumbnail

The Value of Architecture, Reference Architecture and Architecture Framework

IT Toolbox

There are many common sense reasons, such as predictability, repeatability, consistency, standardization etc., for the use of models, templates, standards, paterns, frameworks, reference or/and generic architectures. A class in OO (Object Oriented) is a template, for instance.

article thumbnail

Gigaclear bags £111m investment to roll out FTTP broadband

Computer Weekly

Rapidly expanding FTTP broadband altnet has received a new round of funding to accelerate the build rate of its network around the UK and help fund its BDUK commitments

Network 146
article thumbnail

Three Home Truths about Your Customers

IT Toolbox

It's no surprise that customers and businesses have different views of how they serve their customers. What is a surprise is how much those views differ. According to a Forrester survey, for instance, 80 percent of businesses surveyed believe they deliver a superior customer experience. Customers surveyed agreed only 8 percent of the time.

Survey 133
article thumbnail

Oracle outlines German cloud datacentre expansion plans

Computer Weekly

Database software giant claims investment in German datacentres is being fuelled by growing demand for its cloud services in Europe

Oracle 158
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Azure Stack Hybrid Cloud TP3 Overview Preview (Part II) Install Review

IT Toolbox

This is part two of a two-part series looking at Microsoft Azure Stack with a focus on my experiences installing Microsoft Azure Stack Technical Preview 3 (TP3) including into a nested VMware vSphere ESXi environment. Read part one here that provides a general overview of Azure Stack.

Microsoft 113
article thumbnail

Crossrail uses cloud software to address challenge of on- and off-boarding contractors

Computer Weekly

Railway construction company moves to cloud-based IT service management software from ServiceNow as it scales down IT users ahead of project completion

Software 140
article thumbnail

New Android malware found every 10 seconds, report says

Tech Republic Security

A report from security company G DATA said that 8,400 new Android malware samples are discovered every day, stemming from the fragmentation issues with the OS.

Malware 132
article thumbnail

Lib Dems decry surveillance plans exposed in leaked documents

Computer Weekly

After the election, the UK government plans to introduce extreme mass surveillance capabilities, according to documents leaked to the Open Rights Group

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

End of a fremium era?

IT Toolbox

I feel pretty confident that as you are sitting here reading this, you are a user of the fremium model. Think about your digital tools. How many of them are free? How many send you emails or messages about upgrading? Probably a few (or more). I've written here on this blog about my use of fremium services.

Tools 100
article thumbnail

Shazam: Cloud GPUs Finally Make Sense

Data Center Knowledge

Music-recognition app moves one-third of its GPU capacity to Google’s cloud Read More.

Cloud 141
article thumbnail

Three Core Parameters for Vertical Market Collaboration Solutions

IT Toolbox

This current series is very much about vertical market scenarios for collaboration, but that was probably not evident from the last post. As my initial analysis unfolded, I realized it was important to first provide some context around how the “collaboration” concept has evolved.

Analysis 100
article thumbnail

Samsung Knox: The smart person's guide

Tech Republic Security

Samsung Knox is a way to keep business and personal data separate and secure on supported Samsung Android devices. This Samsung Knox guide covers why the platform matters, how to use it, and more.

Security 105
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Case study: Cash-handling machine maker collects trans-Atlantic insights

IT Toolbox

ARCA’s machines have been helping banks and retailers in North America and Europe handle cash for nearly two decades. When it came down to managing its own systems better, the North Carolina-based company went looking for an ERP solution that would help unify its manufacturing processes across continents. That’s where Infor CloudSuite Industrial Machinery came in.

article thumbnail

Tech execs unsure about cyberinsurance, want storage flexibility, and wonder about AI

Tech Republic Security

IT leaders attending the Landmark Ventures CIO Summit commented on everything from the Internet of Things to cognitive machine intelligence to their childhood 8-bit computers.

Storage 104
article thumbnail

Microsoft advances plans for LinkedIn data in its CRM suite

IT Toolbox

Following its acquisition of LinkedIn, Microsoft has been working to integrate data from the social network into its CRM and ERP utilities within Microsoft 365. New information from the LinkedIn Sales Navigator CRM will support Microsoft Dynamics 365, delivering contextual recommendations for sales teams as well as helping them to provide more tailored content for end clients.

Microsoft 100
article thumbnail

Aligned Opens ‘Elastic’ Data Center in Phoenix

Data Center Knowledge

Clients can increase or reduce colo capacity as they go, paying only for what they use Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Azure Stack Technical Preview 3 (TP3) Overview Preview Review

IT Toolbox

For those who are not aware, Azure Stack is a private on-premise extension of the Azure public cloud environment. Azure Stack now in technical preview three (e.g. TP3), or what you might also refer to as a beta (get the bits here).

Microsoft 100
article thumbnail

BT’s IT Gear Leaseback Deal With IBM Said to Be Focus of Italian Probe

Data Center Knowledge

Deal said to include assets that may not have existed Read More.

IBM 126
article thumbnail

Dell EMC Announce Microsoft Azure Stack Hybrid Cloud Solution

IT Toolbox

What this means is that essentially you can have the Microsoft Azure experience (or a subset of it) in your own data center or data infrastructure, enabling cloud experiences and abilities at your own pace, your own way with control.

Microsoft 100
article thumbnail

Cyberspies tap free tools to make powerful malware framework

Network World

Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools. The attack, analyzed by researchers from antivirus firm Bitdefender , shows that cyberespionage groups don't necessarily need to invest a lot of money in developing unique and powerful malware programs to achieve their goals.

Malware 90
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Broadcom announces SAS SATA NVMe Adapters with RAID

IT Toolbox

In case you missed it, Broadcom formerly known as Avago who bought the LSI adapter and RAID card business announced shipping new SAS, SATA and NVMe devices.

100
100
article thumbnail

The pitfalls of cybersecurity shopping: hype and shoddy products

Network World

There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats. It isn’t a new strain of ransomware. It’s the cybersecurity industry itself. It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech.

article thumbnail

Why Extreme Programming can be an asset or a liability for data scientists

Tech Republic Big Data

Before implementing Extreme Programming, be sure you're aware of the potential benefits and drawbacks to this approach, and how that may affect your data scientists and end users.

article thumbnail

Google G Suite: 10 new features heading your way in 2017

Tech Republic Cloud

A guide to the updates Google has planned and when they will land.

Google 125
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.