Fri.Jun 02, 2017

article thumbnail

Uber's Unicorn Ponzi Scheme

Forrester IT

Sure, I use Uber. Sometimes its the only option, and sometimes the price justifies riding with a guy who knows less about his city than I do, and whose car cleanliness raises concerns about fungal infections. And sometimes its a huge win as it was recently for me after a nightmare business trip late at night, when I needed to get out to the distant northern burbs at 1am.

Hotels 307
article thumbnail

In the World of Digitized Business, the Data Center Reigns Supreme

Data Center Knowledge

Skill-based certification and training enables IT practitioners to optimally plan, implement, and run IT data center network infrastructure in support of agile and innovative business initiatives. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Financial malware more than twice as prevalent as ransomware

Computer Weekly

While ransomware continues to make the headlines, particularly in the wake of WannaCry, research has revealed that financial threats are 2.

Financial 228
article thumbnail

Global Connected Aircraft Summit: Airlines, operators, integrators, and technology providers

CTOvision

Bob Gourley. The Global Connected Aircraft Summit (7-9 June 2017) provides airlines, operators, integrators, and technology vendors with a venue for advancing the state of the entire aviation community. This fourth annual event connects business, technology, and industry perspectives and goes beyond just in-flight entertainment, to include operations, communications and technologies that impacts the aircraft and the traveling public.

Airlines 157
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Center Optimization: How to Do More Without More Money

Data Center Knowledge

Operating efficiently and effectively in the land of "more" without more money means optimization at all levels: hardware, software, and even policies and procedures. Read More.

article thumbnail

Doug Cutting, ‘father’ of Hadoop, talks about big data tech evolution

Computer Weekly

In a Q&A interview, the “father” of Hadoop, Doug Cutting, talks about the cyber-security applications of the stack, as well as Hadoop’s evolution

Big Data 191

More Trending

article thumbnail

Security Think Tank: Equip employees to guard against malicious malware

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

Malware 172
article thumbnail

Top ERP Security Challenges in 2017

IT Toolbox

There’s more opportunity in hacking business. Whether for mayhem or financial gain, cybercriminals are switching from attacking unsuspecting individuals to more organized cyber crime that targets businesses large and small. ERP, in particular, is a prime target.

Security 145
article thumbnail

GDPR about change management, says startup DPO

Computer Weekly

There are threats and risks associated with the GDPR, but one data protection officer believes organisations should focus on the business opportunities instead

article thumbnail

Better Blogs for More Sales

IT Toolbox

A blog should be a central component of an online marketing effort. It provides a focus for your marketing and a chance to talk directly to your customers and potential customers. Unlike Facebook and Twitter, you completely control your blog. There are no formal limits on length or content of posts. However a successful blog doesn’t just happen.

138
138
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Kmart cyber attack highlights PoS vulnerabilities

Computer Weekly

The cyber attack on Kmart should be a major wake up call for retailers to review the security of their point-of-sale systems, say security experts

Retail 162
article thumbnail

Private cloud 3x cheaper than public cloud; you're kidding, right?

Tech Republic Cloud

A new study from ServerPronto University makes silly claims about the cost of the public cloud, but figuring out just why they're so silly is worth exploring.

Cloud 163
article thumbnail

Still time for DevOps latecomers to gain ground on early adopters, claims Dora CEO

Computer Weekly

DevOps research and assessment CEO Nicole Forsgren claims there is still time for enterprises late to the DevOps game to play catch-up

Devops 148
article thumbnail

Better Customer Service

IT Toolbox

Customer service is at the heart of any successful modern business, yet there is a major disconnect between customer service as perceived by businesses and their customers. Famously, something like 80 percent of businesses think they are providing “superior” customer service, but only 8 percent of their customers agree.

113
113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Telefónica increases use of renewable energy to fight climate change

Computer Weekly

Telecoms operator behind UK’s O2 mobile network doubles down on existing commitments to renewable energy sources in the fight against climate change

Energy 139
article thumbnail

Web filtering gotchas you cannot ignore

IT Toolbox

In IT, when we have a security problem, or shall I say “opportunity”, what often happens? We buy a product to fix the issue. We either know that a specific technology is needed or we have vendors sell us on their systems. Either way, the assumption is: security problem + new technology= risk resolved.

Security 113
article thumbnail

Hyperscale cloud giants sought as tenants for Scotland's 'largest' datacentre build

Computer Weekly

Developers of the newly opened site are hoping to follow Ireland's lead by positioning Scotland as a place where the hyperscale cloud giants can set up shop

Cloud 132
article thumbnail

May's IT Monthly News Digest

IT Toolbox

Android Creator Launching High-End Smartphone, Essential, and Home Assistant Device. The co-creator of the Android mobile phone operating system has unveiled a new company called Essential Products, which will sell a high-end smartphone and home assistant device.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

WannaCry: The smart person's guide

Tech Republic Security

WannaCry, also known as WannaCrypt, has spread around the world through a crafty attack vector and an ability to jump from machine to machine. Here's what you need to know about this evolving threat.

132
132
article thumbnail

When the Push from External Parties Becomes the Rationale for the Cloud-Based UC

IT Toolbox

This is the final post in my series examining specific drivers that can lead businesses to deploy cloud-based UC. When decision-makers reach the point of making a concerted effort to enable collaboration across the organization, UC will almost invariably be part of the conversation.

Cloud 113
article thumbnail

Friday Funny: Modular Data Center

Data Center Knowledge

The Data Center Knowledge caption contest. Submit your caption to win a personalized Kip and Gary print. Read More.

article thumbnail

Why Your Application Might Require A Message Queue

IT Toolbox

A message queue does exactly what it sounds like it does. It stores the ?messages? received from one system and relays them to other systems lazily.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Top 10 Data Center Stories of the Month: May 2017

Data Center Knowledge

Here are the 10 most popular articles that appeared on Data Center Knowledge in May Read More.

article thumbnail

How to conduct a production outage post-mortem

Tech Republic Security

Production outages can be stressful, but they can also result in valuable lessons. Here's are some tips on conducting a post-mortem to prevent repeat occurrences.

How To 126
article thumbnail

Outages trigger VoIP upgrade by LA police

IT Toolbox

Telecommunications malfunctions at Los Angeles police stations have forced the department to rely on a workaround using a 311 line or a pre-recorded message, a situation which the City Council has declared “unacceptable.

VOIP 100
article thumbnail

Extreme Networks bulks up with Avaya networking purchase

Computer Weekly

Extreme Networks is looking to challenge networking sector giants with its third major purchase in recent months

Network 109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Rapid ERP implementation greases construction company's future

IT Toolbox

It’s tough to get an entirely new ERP system up and running quickly. It’s even tougher when the enterprise in question is just getting restarted as a private company after spending more than a decade inside a publicly-traded corporate parent.

article thumbnail

COBOL programmers know old != bad

Tech Republic Big Data

Most articles about COBOL imply that the language is obsolete, companies using it are foolish, and it's hard for young people to learn. But these may be gross misconceptions.

Company 90
article thumbnail

Getting closer: Dell Technologies, Salesforce ink international CRM deal

IT Toolbox

Dell Technologies and Salesforce are to expand their strategic technology agreement that will see Dell extending Salesforce’s marketing, services and CRM capabilities to thousands of Dell employees globally. Salesforce will provide Dell with what it calls “a flexible platform to bring together sales, service, marketing and more, enabling a more unified customer experience.

Dell 100
article thumbnail

10 tips for running a successful analytics project outside of IT

Tech Republic Big Data

Big data and analytics projects don't necessarily need to be run by IT. Here are some tips on coordinating with IT while maintaining independence.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.