Mon.Jun 19, 2017

article thumbnail

Simplicity is a strategy that works.

Forrester IT

This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management. There were folks in attendance from a variety of organizations, all of which were very interested in just how exposed they might be to data theft. The resounding call from nearly every executive that I talked to during this event was that they were aware of how exposed they likely were, and that they were

Strategy 324
article thumbnail

The Macedonian surveillance scandal that brought down a government

Computer Weekly

Macedonia has been accused of using surveillance technology for covert spying - the subsequent political protests were instrumental in the ruling party losing power after 10 years

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Two Ways That Customer Service Organizations Use To Build Emotional Connections

Forrester IT

Today customers use self-service for straightforward interactions, leaving complex issues like account closure or claims disputes for a phone conversation. These questions often take longer to resolve and are opportunities to build positive customer relationships. Customer service organizations must look out for customers' best interests and support their emotional state.

Airlines 303
article thumbnail

McKinsey AI research finds slender user adoption outside tech

Computer Weekly

McKinsey Global Institute research finds artificial intelligence adoption to be exiguous and experimental outside the technology sector, but registers rapidly growing investment

Research 206
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Telefónica Digitizes Its Operations In Service Of The Customer

Forrester IT

With Fred Giron. Like many organizations, Telefónica is going through a digital transformation. Our new case study "Telefónica Digitizes Its Operations In Service Of The Customer" investigates the approach that Telefónica has taken to prepare for digital transformation, including the impact of its transformation strategy on its customer experience, its operational setup, and its organizational transformation.

article thumbnail

Using Object-based Storage to Replace File-Based NAS Architectures

Data Center Knowledge

Object-Based Storage is an architecture that manages data as objects as opposed to traditional block- or file-based approaches, and is a viable option for storing unstructured data at petabyte scale. Read More.

More Trending

article thumbnail

British & Irish Lions engage with fans via cloud platform

Computer Weekly

Fans of the British & Irish Lions rugby team are being offered more ways to digitally engage with the team while it is on tour in New Zealand

Cloud 203
article thumbnail

Two Technologies That Customer Service Organizations Use To Build Emotional Connections

Forrester IT

Today customers use self-service for straightforward interactions, leaving complex issues like account closure or claims disputes for a phone conversation. These questions often take longer to resolve and are opportunities to build positive customer relationships. Customer service organizations must look out for customers' best interests and support their emotional state.

Airlines 150
article thumbnail

MEPs propose ban on encryption backdoors

Computer Weekly

A European parliamentary committee has proposed a ban on backdoors that allow governments to access encrypted communications

article thumbnail

3 Ways Cloud-Based VoIP/UC Changes the Reseller Business Model

IT Toolbox

The voice over IP (VoIP)/unified communications (UC) market has dozens of types of resellers. Traditional interconnects and on-premises private branch exchange resellers have been around for years and continue to exist, but their profit model is changing.

VOIP 168
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TierPoint Now Has a Huge Rival in Secondary Markets

Data Center Knowledge

ViaWest deal makes Peak 10 one of America’s two largest secondary-market colo players Read More.

Company 221
article thumbnail

3 Ways to Integrate Predictive CRM

IT Toolbox

Customer relationship management (CRM) data have become the proverbial attic, loaded with stuff we’ve forgotten about or can’t make useful. In the early days, we were relieved with CRM’s effortless ability to become our virtual Rolodex as it captured customer contact information digitally.

article thumbnail

How to make your employees care about cybersecurity: 10 tips

Tech Republic Security

People are the largest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and protect your business.

How To 167
article thumbnail

Six Keys for Managing ERP Metadata

IT Toolbox

ERP is where data from various parts of a business comes together. Managing this data and extracting maximum value from it requires good use of metadata, the data that describes data.

Data 158
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Managed crowdsourcing model: Another ‘made in China’ idea

Computer Weekly

Chinese suppliers are using managed crowdsourcing to help them provide high-volume services to their customers

177
177
article thumbnail

5 Most Important Tech Advancements in Business of the 2000's

IT Toolbox

Technology changes so rapidly it seems some innovations come and go before there's been a good opportunity to evaluate them. First we went from mainframes to desktops. Then from desktops to web. Then from web to mobile apps. In the process we've lost a lot of good technology, to be sure, but some quality advances have withstood the test of time.

Mobile 154
article thumbnail

Schneider Electric Beefs Up Its Family-Leave Policy

Data Center Knowledge

Wants to help employees create healthy balance between work and personal lives Read More.

Policies 193
article thumbnail

Single-Instance vs Multi-Instance ERP

IT Toolbox

With everything businesses must concern themselves with—accounting, personnel, products, marketing, sales—is it any wonder that many end up running applications they don’t need?

Resources 138
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Abu Dhabi uses surveillance tech to protect Grand Prix

Computer Weekly

Police use surveillance technology and monitoring software to ensure public safety when Formula One visits the UAE each year

Software 147
article thumbnail

Learning from Millennials about Collaboration - Make it Personal

IT Toolbox

Collaboration takes many forms, and while this series is mostly about internal scenarios, there are also external modes to consider, especially those that are customer-facing.

Trends 138
article thumbnail

Computing GCSE entries rise by 9% year on year

Computer Weekly

The increase in students who have entered themselves for the 2017 GCSE computing exam seems small compared with previous years

139
139
article thumbnail

Buick Regal GS Is Better Than Mazda 6

IT Toolbox

The Mazda 6 is one of the best midsize sedans on the market, and if you are looking for a sedan with a dash of sportiness in it, this car is definitely for you. However, is the new 2018 Mazda 6 overrated? It is not extremely powerful and if you want a front-drive four-door vehicle with more hp, go and buy a Buick Regal GS.

HP 113
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Nevada Governor Vetoes Renewable Bill in Setback for Advocates

Data Center Knowledge

Legislation required that 40 percent of the state’s electricity come from clean energy sources by 2030. Read More.

Energy 142
article thumbnail

Top 5: Things to know about ransomware

Tech Republic Security

The fight against ransomware is getting tougher. Here are five basics everyone should know about it.

157
157
article thumbnail

What the Average Worker Doesn’t Know About Security Will Scare You

Data Center Knowledge

Employees are being trained on cybersecurity best practices, but it may not be enough. Read More.

Security 154
article thumbnail

Photos: The world's 25 fastest supercomputers

Tech Republic Data Center

The latest TOP500 list of the most powerful number crunchers sees the US lose its place in the top three.

151
151
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why cloud will help drive the endpoint security market to $27.8B by 2025

Tech Republic Security

Increasing adoption of cloud, SaaS, and IoT business models are driving growth in the global endpoint market, according to a new report from Persistence Market Research.

Cloud 115
article thumbnail

Bahrain’s central bank creates fintech testing environment

Computer Weekly

Regulatory sandbox will enable fintech companies to test out their products and services

Banking 132
article thumbnail

Video: GCS 2017 panel: The human factor of cyber-risk

Tech Republic Security

End users are the most vulnerable part of any network. What will it take to drastically reduce the supermajority of attacks caused by a user's bad digital hygiene and practices? What can we hope for, at best? What's realistic?

Video 105
article thumbnail

Hovis boosts job applications after HR tech roll-out

Computer Weekly

Baker and flour miller expects a quick payback from HR technology project

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.