Thu.Mar 02, 2017

article thumbnail

MWC 2017: Barcelona trial uses IoT and big data to manage tourists

Computer Weekly

Barcelona, the host city for Mobile World Congress, has been demonstrating its use of the internet of things and big data to help manage visitors to Antoni Gaudi’s Sagrada Familia

Big Data 176
article thumbnail

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More.

Internet 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 Important CRM Trends for 2017

IT Toolbox

In an age of accelerating change, agile customer relationship management (CRM) systems are increasingly important. Both startups and successful, established enterprises must anticipate and prepare for the exciting possibility of rapid growth.

Trends 155
article thumbnail

Microsoft Said to Cut Purchases of HPE Servers for Cloud Service

Data Center Knowledge

New cloud server design forces HPE to compete with commodity hardware suppliers, lower server prices. Read More.

Cloud 166
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Six Tips for Mixing Legacy Data with IoT

IT Toolbox

The data coming off those shiny new internet-of-things devices is unquestionably useful for business. But the utility of IoT data is greatly augmented when it is combined with legacy data sources. Consider the case of low-cost mobile weather sensors mounted on taxis.

Data 143
article thumbnail

China calls for mutually-beneficial global co-operation in cyber space

Computer Weekly

China is calling for greater international collaboration in cyber space, saying it is committed to working with other countries to combat cyber crime and cyber terrorism

136
136

More Trending

article thumbnail

macOS malware on the rise as Apple silently patches a mysterious new threat called Proton

Tech Republic Security

No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.

Malware 129
article thumbnail

5 VoIP Trends That Will Render Business Landlines Obsolete

IT Toolbox

Voice over Internet Protocol, or VoIP, is increasing in popularity as businesses realize the convenience and potential cost savings over traditional landline services. The increased demand is creating trends that will force rapid improvement in available technologies, making VoIP the new standard in voice communications. The following are five such trends that will render business landlines obsolete.

VOIP 142
article thumbnail

Yahoo confirms 32M accounts breached in 2015-2016 forged cookies attack

Tech Republic Security

In a recent annual report filed with the SEC, Yahoo confirmed that forged cookies were used to hack 32 million accounts. Here's what it means and why your company should be aware of such attacks.

Report 128
article thumbnail

Bigger, Faster, Stronger: VoIP Outlook in 2017

IT Toolbox

The increased need for security, speed and better communication is fueling the evolution of voice over Internet protocol services. Here's what to expect for VoIP in 2017 and beyond: 1. Heightened Security Measures. Cyber-attacks and data breaches have all become too common.

VOIP 136
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cloudflare reviews code after Cloudbleed bug leaks data

Computer Weekly

Cloudflare has published a detailed analysis of the Cloudbleed data leaks and promised ongoing code reviews to assure customers and partners

Data 135
article thumbnail

Seeing Clearly with Data Center Simulation

Data Center Knowledge

Computer operators that were using CFD as a tool to get a snapshot of what was happening in their facility came to the conclusion that they could get almost the same information in real time through modern monitoring technology without the expense. Read More.

article thumbnail

MWC 2017: Huawei R&D focuses on vehicles, drones, virtual reality

Computer Weekly

Huawei used its presence at the annual Mobile World Congress fair in Barcelona to showcase a number of its mobile innovation programmes

article thumbnail

Don't be fooled by Recruiter Spamming

IT Toolbox

Online networking sites can be a useful tool, but you need to beware of Recruiiter spam. It's a new kind of spam that I've started getting lately. At first I was a little pulled in by it. But I'm wise it now. You should be too. It all starts with a recruiter who is doing a ton of searches on different career or networking websites.

Network 109
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

BT to create 1,700 apprenticeships and graduate jobs

Computer Weekly

BT has announced it will create 1,700 apprentice and graduate positions across its group businesses this year

Groups 137
article thumbnail

February's IT Monthly News Digest

IT Toolbox

Samsung Rolls Out Two Tablets at Mobile World Congress. Samsung Electronics unveiled two new tablets at the Mobile World Congress in Barcelona, marking the first products to roll out since having to remove the flagship Galaxy Note 7 smartphone after some of the devices caught fire. The two devices are the Galaxy Book, which comes in a 10.

Mobile 109
article thumbnail

Report: Drones will impact business, but this one thing is holding them back

Tech Republic Security

A new report from the ISACA said that security and privacy are the top concerns for business leaders looking to implement drone technology in their organization.

Report 113
article thumbnail

ERP and BI Software: What's the Difference?

IT Toolbox

Businesses often confuse enterprise resource planning (ERP) software with business intelligence (BI) software, but these programs serve very different functions. Companies that learn the difference between these two applications will find the right tech solution to their business problems. Here are some of the benefits of both of these tools for small and medium-sized companies.

Software 109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Amazon S3: The smart person's guide

Tech Republic Cloud

Amazon S3 is a low-cost cloud-based object storage service. This comprehensive guide about about Amazon S3 covers pricing details, competitors, and why companies such as Netflix and Tumblr use it.

Storage 104
article thumbnail

Engaging Customers Across the Multiverse

IT Toolbox

In October Oracle introduced a series of new data management platform innovations within the Oracle Marketing Cloud. These enhancements were designed to support sales strategies by delivering consistent and relevant experiences to customers across devices, channels, and media environments.

Oracle 109
article thumbnail

3 public cloud myths highlighted by the Amazon S3 outage

Tech Republic Cloud

On the hills of the AWS S3 outage, public cloud misconceptions abound. Here are three myths that need to be dispelled.

Cloud 126
article thumbnail

The transformation to the virtual cloud enterprise, steps

IT Toolbox

To adapt to the increasingly faster market demands, new enterprise business models appeared. Essentially enterprises outsource today resources, value chain activities and IT to a cloud of external providers so enterprises can ramp up and down their capabilities as needed.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MoD ditches spreadsheets for SaaS-based collaboration tool

Computer Weekly

The Ministry of Defence is taking advantage of G-Cloud for collaboration software to manage its global activities

Tools 123
article thumbnail

How Channels Can Own Collaboration

IT Toolbox

For the last post in this series , I’m going to add a third stakeholder group that you may not have considered in terms of taking an ownership role with collaboration.

Groups 109
article thumbnail

Dutch manufacturer standardises internal IT services through Unisys

Computer Weekly

Metal-based product maker Constellium wants to cut the costs associated with its disparate IT support operation through a contract with Unysis

111
111
article thumbnail

Why DAST and SAST are necessary if software is solid from the get-go

IT Toolbox

I’ve been asked a few times recently what the value is in performing DAST (dynamic application security testing) and/or SAST (static application security testing) if an application was developed with security in mind from the ground up.

Software 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Black Report: Attacking your system, from the hacker perspective

Tech Republic Security

To prevent and respond to hacks, says security firm Nuix, you need to think like a hacker. The company's new report shares expert tactics on preventing and responding to cyberattacks.

Report 99
article thumbnail

Explaining discrepancies in different security assessment reports

IT Toolbox

In my work performing independent information security assessments , I love seeing when my clients’ network environments become more secure over time. Steady and predictable progress is key to building a solid information security program and minimizing the risk of incidents and breaches.

Security 100
article thumbnail

High-tech bacon making using industrial IoT at SugarCreek

Tech Republic Security

Find out how one Indiana food manufacturer is using data-driven decision making in an industrial setting to make one of America's most beloved cured meat products.

article thumbnail

What Can Knowing Code Do For You?

IT Toolbox

Learning to code can benefit you strictly by learning exactly what you'd like from a system or employee

System 116
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.