Wed.Apr 19, 2017

article thumbnail

What to do first when hit by a cyber attack

Computer Weekly

Security consultant Gemma Moore looks at the actions organisations should take if they suspect they have suffered a cyber security incident

Security 231
article thumbnail

What Does The “Internet Of Things” Mean For CIOs?

The Accidental Successful CIO

The Internet of things is coming our way – how will this change things? Image Credit: cthoyes. If you’ve had the opportunity to pick up just about any IT trade journal lately you have undoubtedly seen an article or two talking about this new thing called the “Internet of things” What the authors are talking about is the simple fact that because we are currently Internet enabling so many different devices from refrigerators to cars to washing machines, very soon the majority of

Internet 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Equinix tops global colocation leader boards on coverage and connectivity grounds

Computer Weekly

Colocation giant Equinix emerges as the one to beat in Cloudscene’s inaugural rankings of globe’s biggest datacentre service providers

200
200
article thumbnail

How Reno Became a Data Center Hub: a Timeline

Data Center Knowledge

Nevada’s second gambling capital is growing as a cloud nerve center Read More.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Robotic automation takes off in the Nordics

Computer Weekly

Software robots are rapidly automating traditionally manual tasks at enterprises across the Nordic region

article thumbnail

IBM Sales Miss Shows Return to Growth Not Without Roadblocks

Data Center Knowledge

As Rometty sheds units to cut costs and makes forward-looking acquisitions, legacy products still a drag Read More.

IBM 163

More Trending

article thumbnail

Three Key Network Strategies for the Connected Enterprise

Data Center Knowledge

Security problems will be compounded as organizations begin to adopt more connected devices and IoT technology, while still attempting to maintain their legacy network infrastructures. Read More.

Network 121
article thumbnail

Rebuild and revamp: Housing association on benefits of ditching its legacy, on-premise tech

Computer Weekly

Bournemouth Churches Housing Association (BCHA) explains how ditching its 15-year-old legacy IT system has led to an uptick in the responsiveness and levels of customer care it offers

System 136
article thumbnail

How to create professional looking movies with Google Photos

Tech Republic Cloud

If your business needs to add video for marketing, and you don't have the creative skills necessary, Jack Wallen shows you how to make use of Google Photos for easy movie creation.

Google 134
article thumbnail

How Oracle tackles licensing discrepancies

Computer Weekly

The recent publication of court filings from a licence dispute case shows a catalogue of underhanded techniques the supplier used following an audit

Licensing 142
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

5 Ways ERP Streamlines Hotel and Resort Operations

IT Toolbox

In the hospitality industry, an enterprise resource planning (ERP) system is a vital tool for ensuring the best possible experience for guests. The many moving parts of hotels and resorts must work in sync every day to ensure that the business operates at its optimum level. The hospitality industry has a specific focus: Offer guests the best services possible.

Hotels 113
article thumbnail

IBM sales and profits down, but future focus areas see growth

Computer Weekly

IBM experiences another fall in sales, but it continues to sell more in areas that will make up its future business

IBM 159
article thumbnail

How Technology is Changing the Way Medical Companies Do Business

IT Toolbox

Advancements in technology in the past decades have brought about revolutionary innovations that have transformed the entire healthcare industry.

article thumbnail

StorageOS goes to market with persistent Docker container storage

Computer Weekly

StorageOS is now available on the Docker marketplace with software product that manages stateful storage for containers, with advanced storage features such as data protection and encryption

Storage 123
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Smart Contracts and Why They Are the Future

IT Toolbox

Smart contracts are a part of Blockchain technology?s progression from a monetary transactional protocol to an all-purpose distributed ledger.

100
100
article thumbnail

Conflicting advice blurs cyber safety

Computer Weekly

Companies are being overloaded with information about cyber threats and complain of a lack of relevant advice

Company 159
article thumbnail

Top 5 Business Intelligence Tools of 2017

IT Toolbox

This post looks at a few of the top BI tools for 2017.

article thumbnail

Quantum upgrades to StorNext 6 with replication and app QoS

Computer Weekly

Quantum StorNext scale-out file system adds to cloud capability with granular replication that can operate one-to-one, one-to-many, plus provide storage QoS per application

Storage 114
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Big Data Firm Cloudera Prices Shares Way Below Private Valuation

Data Center Knowledge

SEC filing reveals big losses in 2016, expected to continue indefinitely Read More.

Big Data 132
article thumbnail

Majority of open source has security flaws

Computer Weekly

Software audit highlights major security weaknesses across all open source software

article thumbnail

Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them

Network World

Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products many with the threat allowing a remote attacker to cause a denial of service. First up this week Cisco said a vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) software could let an unauthenticated, remote attacker cause a denial of service (DoS) attack.

article thumbnail

How Dutch university quickly connected thousands of students to new learning management system

Computer Weekly

Dutch university TU Delft is replacing its legacy learning management system after 17 years

System 145
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facial recognition technology could be used to track visa-holders leaving the US

Tech Republic Security

A new federal program called Biometric Exit would match the photos of visitors flying out of the US to their visa photo, in an effort to curb illegal immigration.

article thumbnail

Security Think Tank: A real world approach to security testing

Computer Weekly

How can organisations use red teaming to identify security gaps?

Security 143
article thumbnail

The Past, Present and Future of Canonical and Ubuntu Linux

Data Center Knowledge

Changing times at the open source power house, but is it going back to the future? Read More.

Linux 107
article thumbnail

Telefónica rolls out AI-based network management

Computer Weekly

Mobile operator tests Huawei’s SmartCare service operation centre to manage customer connections to its networks

Network 109
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to share access to your organization's domain, email, and passwords

Tech Republic Security

Don't limit your organization to just one administrator. Share access to ensure continuity of control for your most important accounts.

How To 100
article thumbnail

Trump’s clampdown on use of immigrant IT workers may have little impact

Computer Weekly

US president's latest executive order aims to reduce the number of immigrant IT workers in the country

111
111
article thumbnail

4 new features for Facebook Workplace that could make it a better business tool

Tech Republic Cloud

The social media giant's business platform, Workplace, is adding three new categories of integrations and releasing a new API. Will the change be enough to make it competitive?

Tools 75
article thumbnail

A vigilante hacker may have built a computer worm to protect the IoT

Network World

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. The worm, known as Hajime , has infected tens of thousands of easy-to-hack products such as DVRs, internet cameras, and routers. However, the program so far hasn't done anything malicious. Instead, the worm has been preventing a notorious malware known as Mirai from infecting the same devices.

Malware 74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.