Mon.Jul 24, 2017

article thumbnail

Why Startups Should Not Ignore Big Data

CTOvision

Startup businesses are a risky proposition. This means that if things aren’t done in the most effective way possible, businesses will never make it past the first year. The business plan can often determine whether or not a business gets passed the startup phase of the company. When creating a business plan, owners sometimes skip […].

Big Data 280
article thumbnail

Three Agile Management Practices for Driving Digital Transformation

Social, Agile and Transformation

When I joined Businessweek ten years ago to lead their digital technology team, I was very surprised that they wanted to develop their own proprietary web applications. Could a magazine owned by a publisher mature a software development practice and deliver new customer experiences? The answer was yes - and as it turns out - many other companies are investing in their software development.

Agile 192
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Kinetica: GPU-accelerated analytics database

CTOvision

With this post we are initializing our coverage of Kinetica. Kinetica offers a GPU-accelerated, in-memory analytics database that delivers truly real-time response to queries on large, complex and streaming data sets: 100x faster performance at 1/10 of the hardware of traditional databases. Kinetica was initially developed for the US Army Intelligence and Security Command to […].

Hardware 172
article thumbnail

IR35 reforms: IT contractor fleshes out details of potential HMRC legal challenge

Computer Weekly

Following the early-stage success of efforts to crowd-fund a legal challenge against the IR35 reforms, one of the IT contractors behind the campaign outlines details of what could happen next

167
167
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Passwords are not lame and they're not dead. Here's why.

IT Toolbox

Everywhere you turn, it seems that someone is proclaiming that passwords are lame, passwords are dead, and so on – you know the jingle. The argument is that passwords don’t work. They’re hard to remember. They’re easily-cracked. Users complain when they have to be complex. I know you’ve heard these things and have even thought them yourself from time to time.

160
160
article thumbnail

Data management: What does the future hold?

Computer Weekly

We explore how firms are replacing transactional database management systems with new database architectures

More Trending

article thumbnail

10 books on cybersecurity that all IT leaders should read

Tech Republic Security

Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

article thumbnail

Usability and integration: keys to successful CRM platforms

IT Toolbox

Legacy CRM suites often involve slow, cumbersome interfaces that frustrate users and get in the way of wide adoption. According to a new Forrester/CustomerThink survey, 46% of respondents encountered user adoption struggles when implementing their CRM initiative.

Survey 157
article thumbnail

UK Startup Raises $30M to Build AI Chips for Data Centers

Data Center Knowledge

The increasing use of artificial intelligence is opening the possibility of a shakeup in the data-center industry. Read More.

article thumbnail

Tech disruption forces CEOs to rethink leadership

Computer Weekly

Headline figures from KPMG’s Outlook 2017 survey of 1500 CEOs shows that 40% expect technology innovation to cause major disruption

Survey 160
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Five Phases for Better ERP Deployment

IT Toolbox

The average ERP deployment takes 21 months and costs the company around 6.5 percent of its annual revenue, according to data from Panorama Consulting. More than half the time, the project exceeds its budget.

Budget 133
article thumbnail

European Commission calls for free flow of data after Brexit

Computer Weekly

EC digital leader says EU must avoid “data nationalisation” after the UK leaves – but also warns EU states

Data 167
article thumbnail

Vendor management and looking beyond SMB firewalls, anti-virus, and data backups

IT Toolbox

I just had lunch with a long-time business colleague who specializes in IT consulting and network systems integration for small and medium-sized businesses. From servers to PBXs and everything in between, his company sells, installs, and manages entire network environments for its customers.

article thumbnail

GoDaddy Drops Curtain on Its Cloud Business… Again

Data Center Knowledge

I know what you're thinking. "GoDaddy is in the public cloud business?" Read More.

Cloud 188
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UDP: Ports and Demultiplexing

IT Toolbox

Because servers communicate with many clients, they cannot permanently assign a destination IP address or UDP protocol port number. Instead, the interface for many-one communication must allow the server to specify information about the destination each time it sends a datagram.

124
124
article thumbnail

Facilitating Digital Transformation in One Step

Data Center Knowledge

According to a new study of 200 industrial executives conducted by IFS, mobility represents just as large an opportunity for industrial organizations as it does for Uber. Read More.

Study 124
article thumbnail

What are Amazon Web Services’ Nordic plans?

Computer Weekly

Amazon Web Services' head in the Nordic tells Computer Weekly about the region's increasing demand and use of the cloud

article thumbnail

AT&T to Build Edge Data Center Network for Self-Driving Cars, VR/AR

Data Center Knowledge

Plans to deploy edge computing capacity in central offices, at cell sites Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Daimler and Bosch show off autonomous valet parking

Computer Weekly

A test of an app-based autonomous valet service is to take place at the Mercedes-Benz Museum in Stuttgart over the next few months

146
146
article thumbnail

US counties lurching to 911 crisis

IT Toolbox

One of the major stumbling blocks that lie ahead for the expansion of the VoIP industry is how to replicate the reliability of fixed phone networks regarding 911 calls. Concerns have been raised at every level, from local sheriffs to members of Congress.

VOIP 113
article thumbnail

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers

Tech Republic Security

A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.

Security 163
article thumbnail

MSRD

IT Toolbox

Microsoft has just released its Security Risk Detection software, MSRD, for detecting code bugs and security vulnerabilities

Microsoft 133
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tesco expands reach for same-day grocery delivery

Computer Weekly

Supermarket retailer Tesco announces it will be extending its offering of same-day delivery for groceries to across the UK

Retail 128
article thumbnail

Customer Care: Why it's the New Narrative

IT Toolbox

I’ve been writing about conversational interfaces most recently , and while an important topic on its own, it also sets the stage for my next few posts.

113
113
article thumbnail

UAE hotel upgrades wireless network and internet connectivity

Computer Weekly

Beach resort completes major project to revamp its wireless infrastructure with TP-Link technologies

Wireless 136
article thumbnail

Focus on the right things to get security results

IT Toolbox

Results. That's what management wants to see, what we strive for in our own security work, and what largely defines us as IT professionals. But what kind of results are you getting? Are you truly managing your information risks? Or, are you merely reacting every time a situation comes up?

Security 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Oracle Wants Its Cloud to Grow Inside Your Data Centers

Data Center Knowledge

All key players’ approaches to hybrid cloud have started to take shape Read More.

article thumbnail

ERP unites large IT firm and education outfit

IT Toolbox

The nation’s largest regional education agency will pay the world’s fifth largest IT and business process services firm nearly $70 million over the next five years to modernize its financial and human resources support systems. The Los Angeles County Office of Education has chosen CGI Group Inc.

Education 100
article thumbnail

New Microsoft cloud service uses AI to find bugs in your code

Tech Republic Security

Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.

article thumbnail

How The Open Group Healthcare Forum and Health Enterprise Reference Architecture cures process and IT ills

IT Toolbox

Learn how The Open Group Healthcare Forum (HCF) is advancing best practices and methods for better leveraging IT in healthcare ecosystems

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.