Tue.Jul 25, 2017

article thumbnail

Getting stuck on OpenStack: Overcoming the open source cloud platform's upgrade barriers

Computer Weekly

Some members of the OpenStack community are finding it a struggle to upgrade to newer versions of the open source cloud operating system. Could customisation be to blame?

article thumbnail

Five ERP Onboarding Mistakes to Avoid

IT Toolbox

There are levels of ERP deployment hell. First there is lengthy planning with lots of stakeholders. Then there is design and build-out with much scope for project creep, budget overruns, technical gotchas and customization boondoggles. Like a game of the Atari classic, Pitfall!

Budget 187
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIF gears up to target public sector cloud

Computer Weekly

Cloud Industry Forum wants to help the UK government achieve its digital strategy, but working with government is still a big challenge for many providers

Cloud 200
article thumbnail

Reasons Why Application Lifecycle Management Is Important

IT Toolbox

ALM outlines methodologies which are to be used during software development and the tools that can help improve efficiency

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

BP broadens public cloud strategy by adopting Microsoft Azure for data analytics

Computer Weekly

Oil and gas giant reveals details of plans to move its proprietary data lake to Microsoft Azure for data processing purposes.

Microsoft 221
article thumbnail

How Artificial Intelligence Will Change The Future Of Insurance

IT Toolbox

For the longest time, companies were content to use IVR and other programming techniques to create an automated presence that could increase the efficiency of the average client phone call.

More Trending

article thumbnail

Google Says It’s Closing More Big Enterprise Cloud Deals than Ever

Data Center Knowledge

Signals that customers in highly regulated sectors trust GCP with their data Read More.

article thumbnail

Ransomware as a service is a game changer, warns Sophos

Computer Weekly

The advent of ransomware as a service heralds a new era in malware, which means security suppliers and user organisations will have to adapt

Malware 176
article thumbnail

Customer Care - Making the Contact Center More Strategic

IT Toolbox

My last two posts have focused on changing the narrative – not just about how IT thinks, but also around the conversations IT needs to have with management.

article thumbnail

Ransomware threat escalating, warns Europol

Computer Weekly

Europol warns that the threat of ransomware continues to escalate as it marks the anniversary of a cross-industry anti-ransomware initiative

Industry 172
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Top 4 Security Vulnerabilities in Web Apps

IT Toolbox

One can write software that is backed by mathematics and can be formally verified, but it still would not guarantee that the software is absolutely bug- free. The reason for this is that all software is built upon several layers of abstraction.

Security 113
article thumbnail

Big data means big risk, Swedish Transport Agency leak shows

Computer Weekly

The Swedish Transport Agency exposed sensitive information by transferring its databases to a third party cloud provider without following data protection procedures

article thumbnail

Ranking IM Communication Styles

IT Toolbox

I couldn't get through a day in my job without Instant Messaging. I use it all the time and often have half a dozen conversations going at once. For me it's been a real life saver offering quick and easy communication with a wide range of folks at work. One of the things I most like about IM is that the feedback is so real.

113
113
article thumbnail

London security centre handed £14.5m to get off the ground

Computer Weekly

The government is to fund a new cyber security innovation centre in the capital and has launched a competition to develop and design it

Security 157
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Azure: The smart person's guide

Tech Republic Data Center

This comprehensive guide about Microsoft Azure includes common use cases, technical limitations, and what to know before adopting the cloud computing platform.

Microsoft 140
article thumbnail

GSK hires ex-Walmart CIO Karenann Terrell as chief digital officer

Computer Weekly

Pharmaceutical giant GSK is building out its executive tech team with the appointment of its first chief digital officer

article thumbnail

Turn Your Android Phone into a DSLR Camera

IT Toolbox

This post looks at how you can get the most out of your android camera.

162
162
article thumbnail

North Korean web users enjoy Amazon, Facebook and YouTube, report claims

Computer Weekly

Threat intelligence specialist Recorded Future claims that the North Korean elite are as plugged in to the worldwide web as any western citizen

Report 146
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

IBM boosts security testing for IoT, connected cars with new services from X-Force Red

Tech Republic Security

IBM's new security testing services will help businesses find vulnerabilities in their automotive endeavors and Internet of Things deployments.

IBM 133
article thumbnail

National Army Museum uses Tide for future personalisation plans

Computer Weekly

Following renovations to its physical space, the National Army Museum used Talisman’s Tide platform to integrate its current systems and allow for personalisation in the future

System 123
article thumbnail

Digital Realty: How to Survive a Market Meltdown and Come Out on Top

Data Center Knowledge

The Data Center Podcast featuring Bill Stein, CEO of Digital Realty Trust Read More.

article thumbnail

Nordea deploys AI to speed up customer service

Computer Weekly

Nordea is reaping the rewards of its fintech investments through its latest project to use artificial intelligence to support customers

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Imagine Communications leverages edge computing and HPC for live multiscreen IP video

IT Toolbox

Learn how hybrid technology and new workflows for IP-delivered digital video are being re-architected

Video 100
article thumbnail

AA Ireland turns to predictive analytics in fraud crackdown

Computer Weekly

Roadside assistance company invests in analytics software to fight fraud and introduce dynamic pricing after its split with the AA

Software 137
article thumbnail

Video: How to jumpstart your cybersecurity career

Tech Republic Security

To fill the cyber-skills job gap companies are investing heavily in talent with the right experience. TechRepublic's Alison DeNisco shares the top three cybersecurity jobs in demand by enterprise companies right now.

Video 86
article thumbnail

Unilever signs partnership deal with Accenture to drive sales for ‘digitally savvy’ consumers

Computer Weekly

Unilever enters tech partnership with Accenture to help maintain consumer loyalty and drive sales

134
134
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

QA for Big Data Applications - Part 4

IT Toolbox

Part 4 - Developing Quality Measures for Sophisticated Users

Big Data 100
article thumbnail

Emergency communications for civilians may improve soon, thanks to NICER

Tech Republic Security

German researchers are developing automated technology that would shift to a standardized emergency operating mode during disasters, affording the general public voice and data communications.

article thumbnail

Simple tips to keep your devices secure when you travel

Network World

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday cage in Fahmida's jacket).

Travel 60
article thumbnail

Report: The IT response to WannaCry

Tech Republic Security

A new study polled IT professionals about their response to WannaCry. The numbers aren't surprising, and that's not necessarily a good thing.

Report 71
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.