Tue.Nov 07, 2017

article thumbnail

3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

CTOvision

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […].

Trends 309
article thumbnail

Cyber security skills a priority for UK government

Computer Weekly

The UK government is pursuing various short and long-term initiatives aimed at promoting the cyber security profession and growing skills in the sector, including supporting a professional body

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Into the Breach: Meeting the Cybersecurity Challenge

IT Toolbox

Maintaining network security is the greatest challenge facing the IT industry today. The threat landscape is complex and ever-changing, which leads many organizations to devote a large portion of their technology budget to hardening their defenses against cyber threats.

Meeting 138
article thumbnail

UK spies face landmark challenge over mass surveillance in human rights court

Computer Weekly

Ten human rights organisations challenge lawfulness of UK surveillance legislation and mass internet surveillance by UK intelligence agencies in Strasbourg court

Internet 208
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lost and Found: Use PowerShell to Restore Exchange Server Database Mailboxes

IT Toolbox

This guide helps you to explore the process to recover lost Exchange Server mailboxes using PowerShell Command

113
113
article thumbnail

Most UK small businesses in the dark over GDPR

Computer Weekly

There is still much work to be done before UK SMEs are fully prepared for the EU’s General Data Protection Regulation (GDPR), business barometer shows

More Trending

article thumbnail

OpenStack flags edge computing as ‘surprise’ emerging use case for open source cloud tech

Computer Weekly

OpenStack Foundation executive director, Jonathan Bryce, admits to being caught on the back-foot by the growing number of enterprises using its software to build edge computing environments

article thumbnail

Gartner's event driven business strategy, the "secret sauce" for success in the digital era (i)

IT Toolbox

continuing from. Gartner's event driven business strategy, the "secret sauce.".

Strategy 113
article thumbnail

Adecco expands roll-out of Infosys-powered temp staffing platform

Computer Weekly

The recruitment company has built a cloud-first, mobile-first platform aimed at helping smaller businesses to recruit temporary staff

Infosys 177
article thumbnail

Exchange 2010 Disaster Recovery Step by Step Free Guide

IT Toolbox

read the guide to explore helpful tips for Exchange 2010 Disaster Recovery.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIOs need to champion digital change as IT leadership roles evolve

Computer Weekly

Gartner CIO survey shows digital business is changing mindsets and culture at organisations that are successful in transformation

Survey 164
article thumbnail

10 Best Christmas tech gifts 2017

IT Toolbox

This post looks at 10 great tech gifts for the 2017 holidays

113
113
article thumbnail

What ‘born in the cloud’ means for developers

Computer Weekly

When it comes to building cloud-native apps, developers must code with an inherent appreciation for where processing, storage and analytics happens

article thumbnail

Db2 V12 on z/OS: New Features Support Big Data - Part 2

IT Toolbox

Part 2: Big Tables, Huge Tables

Big Data 124
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Public cloud revenue grows 28% for first half of 2017, research finds

Computer Weekly

Revenue from public cloud services grew by 28% for the first half of this year, compared with the same period in 2016, says IDC

Cloud 158
article thumbnail

Deep Dive into Container Images in Kolla

Scott Lowe

This is a liveblog of my last session at the Sydney OpenStack Summit. The session title is “OpenStack images that fit your imagination: deep dive into container images in Kolla.” The presenters are Vikram Hosakote and Rich Wellum, from Cisco and Lenovo, respectively. Hosakote starts with an overview of Kolla. Kolla is a project to deploy OpenStack services into Docker containers.

article thumbnail

Dubai Electricity and Water Authority continues smart transformation and tests blockchain

Computer Weekly

Utility organisation is harnessing the latest technologies, including artificial intelligence and blockchain

article thumbnail

How to Deploy 800 Servers in 8 Hours

Scott Lowe

This is a liveblog of the session titled “How to deploy 800 nodes in 8 hours automatically”, presented by Tao Chen with T2Cloud (Tencent). Chen takes a few minutes, as is customary, to provide an overview of his employer, T2cloud, before getting into the core of the session’s content. Chen explains that the drive to deploy such a large number of servers was driven in large part by a surge in travel due to the Spring Festival travel rush, an annual event that creates high traffi

How To 60
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Firms face ‘competition for talent’ in the future, says Fujitsu

Computer Weekly

Fujitsu’s Duncan Tait says the skills gap and the increased need for digital workers will cause mass competition over recruitment in the future

128
128
article thumbnail

Lessons Learnt from Running a Container-Native Cloud

Scott Lowe

This is a liveblog of the session titled “Lessons Learnt from Running a Container-Native Cloud,” led by Xu Wang. Wang is the CTO and co-founder of Hyper.sh, a company that has been working on leveraging hypervisor isolation for containers. This session claims to discuss some lessons learned from running a cloud leveraging this sort of technology.

Cloud 60
article thumbnail

Dell EMC claims launch of first designed-for-all-flash SC arrays

Computer Weekly

All-flash arrays SC5020F and SC7020F boost performance by several times over existing former Compellent products in Dell EMC range that could be configured as all-flash

Dell 113
article thumbnail

Can OpenStack Beat AWS in Price

Scott Lowe

This is a liveblog of the session titled “Can OpenStack Beat AWS in Price: The Trilogy” The presenters are Rico Lin, Bruno Lago, and Jean-Daniel Bonnetot. The “trilogy” refers to the third iteration of this presentation; each time the comparison has been done in a different geographical region (first in Europe, then in North America, and finally here in Asia-Pacific).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security Think Tank: Approaches to effective web security

Computer Weekly

What are the main web security challenges for organisations and how are they best addressed?

Security 157
article thumbnail

Carrier-Grade SDN-Based OpenStack Networking Solution

Scott Lowe

This session was titled “Carrier-Grade SDN Based OpenStack Networking Solution,” led by Daniel Park and Sangho Shin. Both Park and Shin are from SK Telecom (SKT), and (based on the description) this session is a follow-up to a session from the Boston summit where SK Telecom talked about an SDN-based networking solution they’d developed and released for use in their own 5G-based network.

Network 60
article thumbnail

Benioff vaunts Google partnership at Dreamforce 2017

Computer Weekly

At Dreamforce 2017, Marc Benioff announces public cloud partnership with Google in keynote embracing AI-driven fourth industrial revolution

Google 118
article thumbnail

4 Reasons why Advancing Big Data Helps The HealthTech Industry

Dataconomy

When we think about the future, we might imagine flying cars, superior technology and the potential to cure all diseases, extend our lifespan and improve the general health of world’s population. These hopes are more or less realistic, but this is so in lare part thanks to the advancement of. The post 4 Reasons why Advancing Big Data Helps The HealthTech Industry appeared first on Dataconomy.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Panasas upgrades scale-out NAS to ASD-100 and ASH-100 nodes

Computer Weekly

New Panasas appliances upgrade CPU and RAM to double throughput while changing hardware architecture.

article thumbnail

Three Aspects of Digital IT Assessment

Future of CIO

As businesses embark on the “Digital Era” of computing and managing, IT assessment is a great way to help identify what is right and wrong in your environment and how you can keep optimizing processes, improving management discipline, and leveraging limited resource and time to “Do more with innovation.” IT assessment should cover people, processes, products, and partners and should be performed objectively o remove any bias or tunnel vision from internal staff members, with the goal to accelera

article thumbnail

Make Your Application Serverless

Scott Lowe

This is a liveblog from the last day of the OpenStack Summit in Sydney, Australia. The title of the session is “Make Your Application Serverless,” and discusses Qinling, a project for serverless (Functions-as-a-Service, or FaaS) architectures/applications on OpenStack. The presenters for the session are Lingxian Kong and Feilong Wang from Catalyst Cloud.

article thumbnail

“Out-of-the- Box” Problem-Solvers

Future of CIO

Every mind has a certain box, some smaller, some bigger. the commonality is that "the box" tends to be what people with certain experience in the topic can identify as being "commonly known." It can also mean "solutions/answers they have heard. It is usually about how to fix problems via conventional ways. On the opposite, Out-of-the-Box” problem-solving is about continuing to break down the old box or method, and shape the new box thinking to discover alternatives and solve complex problems wit

How To 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.