Thu.Jul 20, 2017

article thumbnail

10 Things Every CIO Must Know about Their Data Centers

Data Center Knowledge

While data centers aren’t necessarily something CIOs think about on a daily basis, there are some essential things every executive in this role must know about their organization’s data center operations. Read More.

article thumbnail

Lords to probe ethics of artificial intelligence

Computer Weekly

The House of Lords Select Committee on artificial intelligence has issued a call for evidence as it looks into the ethical, social and economic impact of the technology

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Makes Some IP Phones Better Than Others?

IT Toolbox

All IP phones aren’t created equal. Vendors and resellers that sell IP phones may overuse this cliché, but it’s still a true statement. As time passes and cloud-based voice over IP (VoIP)/unified communications (UC) services continue to grow, IP phones have become easier to use, more application friendly, and more cost-effective.

article thumbnail

Devil’s Ivy a call to action on IoT security

Computer Weekly

The discovery of a security flaw in an open source third-party code library that could allow attackers to access and hijack devices underlines the need for a greater focus IoT security, say experts

Security 188
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cyberattack on Medical Software Shows Industry Vulnerability

Data Center Knowledge

Hospitals are among most frequently targeted, KPMG says; Nuance’s transcription service still affected weeks later Read More.

Industry 203
article thumbnail

Data takes to the road - the technology behind the Tour de France

Computer Weekly

The world's greatest cycle race is transforming its relationship with fans thanks to internet of things, data analytics and machine learning technologies

Data 204

More Trending

article thumbnail

Blockchain no longer held to ransom as business adoption increases

Computer Weekly

The blockchain digital ledger technology that came to prominence with bitcoin is beginning to find uses in and beyond finance, including for urban cycling scheme Buzzbike

179
179
article thumbnail

Let's Talk: Oracle Sales Cloud API Interfaces

IT Toolbox

When business analysts and application managers get together to discuss Oracle Sales Cloud Integration with Oracle JD Edwards ERP, the potential for business process improvements are many and great.

Oracle 154
article thumbnail

Retail data breaches still high as GDPR deadline looms

Computer Weekly

As the EU’s General Data Protection Regulation compliance deadline approaches, retail data breaches remain unacceptably high, a data threat report reveals

Retail 180
article thumbnail

Could an AI do your job?

IT Toolbox

Elon Musk seems to have a lot of things going his way these days. It's hard not to get his point of view if you're reading the news in many of the technology sectors. But when he opens his mouth, he's got some pretty shocking things to say about technology. AI is the biggest threat to workers today, and to our civilization.

133
133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security Serious Week summit goes virtual

Computer Weekly

The third annual Security Serious Week in October 2017 will feature an entirely virtual conference, accessible to anyone who is online

article thumbnail

Automatically Prioritize CRM Activities with Machine Learning and Incoming Email

IT Toolbox

The promise of machine learning is to automate tasks that humans now perform. In the context of business, this promise is just the next step forward in increasing automation throughout the enterprise. Making such automation the norm will require a change in how people think.

article thumbnail

Citadel malware developer jailed

Computer Weekly

A Russian man believed to be one of the developers of the Citadel malware used to steal millions by infecting around 11 million computers around the world

Malware 154
article thumbnail

Where OEM dealers go wrong with CRM emails

IT Toolbox

Poor quality email communication is a major brand problem for dealers and OEMs (original equipment manufacturers) in the emerging digital-centric customer communications lifecycle. There simply is no escaping the current reality: These days, customer experience (CX) is driving loyalty and lead conversions.

124
124
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

How to use threat intelligence in your business

Computer Weekly

Threat intelligence can be very handy, but just how useful and appropriate it will be depends largely on the security maturity of an organisation

How To 150
article thumbnail

DataBank Building Atlanta Data Center for Georgia Tech Supercomputers

Data Center Knowledge

Facility will be quickly expanding DataBank’s first site in Atlanta Read More.

article thumbnail

Government confirms tech experts advising on digital economy

Computer Weekly

Experts from across UK technology sector will help government implement digital economy policies

article thumbnail

Microsoft Profit Tops Estimates as Cloud Growth Marches On

Data Center Knowledge

Azure sales almost double; Office 365 app revenue rises 43% Read More.

Microsoft 187
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

TSB to introduce iris scan authentication in September 2017

Computer Weekly

TSB customers will soon be able to access their mobile bank accounts through iris scanning, which is regarded as the most secure biometric authentication available

article thumbnail

Of OpEx, Hidden Costs, and the New Stuff

IT Toolbox

My fellow networkers, I implore you not to get hoodwinked in the days to come. You are no doubt hearing about all kinds of fancy new network initiatives from your favorite vendors… it’s what THEY do periodically, and what WE expect them to do. We’ve always had hype-cycles that kinda go something like this.

Network 114
article thumbnail

NHS Digital told it 'needs to do better' after critical review

Computer Weekly

Internal review highlighted areas where NHS Digital must improve to support plans for digital healthcare services

article thumbnail

Infor ERP brings artificial intelligence to the fore

IT Toolbox

Vowing to “rethink ERP,” executives at enterprise resource planning vendor Infor – the third largest in the business - have introduced a new artificial intelligence platform to automate repetitive tasks and recommend new actions.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

IBM confirms opening of two further UK datacentres

Computer Weekly

Big Blue is making good on its pledge to triple the size of its UK cloud datacentre capacity by opening two sites in London

IBM 137
article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backup 130
article thumbnail

A Handy Guide to the World of Cryptocurrencies

IT Toolbox

Cryptocurrencies have grown in popularity over past decade, and while the general concept of them might be relatively straightforward, there are still many who struggle to get a solid grasp on what they are and what they can do.

100
100
article thumbnail

Devil's Ivy vulnerability could take down millions of servers and IoT devices

Tech Republic Security

A recent blog from Senrio detailed a new flaw called Devil's Ivy, found in an open source code library, that could be used to hijack security cameras and for other nefarious purposes.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Infusing VoIP support with the enhanced human touch

IT Toolbox

One of the most critical areas where VoIP providers can add value is via relationships with IT consultancies. As the lines between the various technology disciplines are becoming increasingly blurred, it is not unusual now to find consultancies advising firms across a range of technology and communications business lines. Take, for example, Aavalar Consulting.

VOIP 100
article thumbnail

Google Brings Tech That Made YouTube Faster to Its Cloud Services

Data Center Knowledge

BBR is a better traffic controller for the internet's increasingly busy streets. Read More.

Google 138
article thumbnail

Blessing in Disguise: The Helpful Features of Event Management Software

IT Toolbox

The digital revolution simplified every aspect of life, but more importantly, it reduced the operational costs of pricey traditional methods.

Software 100
article thumbnail

How to use ssh-agent to make working with secure shell more efficient

Tech Republic Security

If you constantly log in and out of your servers with ssh, Jack Wallen shows you how to make this task a bit more efficient, with the help of ssh-agent.

How To 111
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.