Wed.Jul 26, 2017

article thumbnail

GDS wants IT suppliers to use its GaaP products – but won’t offer service guarantees

Computer Weekly

The Government Digital Service encourages tech firms to adopt the platform services it has developed – but can’t offer any service or support guarantees

article thumbnail

The Relationship between AR Tech and Insurance

CTOvision

Augmented Reality (AR) is a technology that involves the use of digital content such as music, text, video and pictures to enhance a real world environment. It is important to point out that this technology does not entirely replace the real world like the virtual reality technology. In this case, a mobile device is normally […].

Insurance 171
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK firms see employees as top risk to GDPR compliance

Computer Weekly

Most UK companies consider their staff as the biggest threat to compliance with the EU’s General Data Protection Regulation, a survey has revealed

Survey 205
article thumbnail

Packet Says Your Data Center Shouldn’t Have an Opinion

Data Center Knowledge

Bare-metal cloud expansion targets companies with latency-sensitive workloads, such as IoT, self-driving cars, AR/VR Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security Think Tank: Security is a shared responsibility

Computer Weekly

What are the best types of security controls organisations should organisations be using to ensure a safe working environment for employees so that they do not have the unfair pressure of being the first line of cyber defence?

Security 175
article thumbnail

How Technology Is Changing Manufacturing and Its Workforce

IT Toolbox

Let?s dig in a bit deeper and take a look at how technology is changing the manufacturing industry, and what can we expect in the future.

Industry 167

More Trending

article thumbnail

Technology Transforming the Health Industry

IT Toolbox

The health industry is constantly changing and improving. With all of the innovation happening in the field today, many people are excited for the future.

Industry 153
article thumbnail

Radiation detection devices open to cyber attack, researcher finds

Computer Weekly

A security researcher has discovered numerous security flaws in multiple devices that are used to detect radiation in critical facilities

Research 162
article thumbnail

How is Technology Changing Credit Cards?

IT Toolbox

Online fraud is the #1 concern for banks and financial institutions. The rapid rise of sophisticated criminal schemes has IT departments of banks working overtime to protect against cybercrime.

Banking 140
article thumbnail

Events business uses fixed-wireless to serve demanding clients

Computer Weekly

Etherlive, a provider of networking and IT services to organisers of major outdoor events, is using Luminet’s Fibre-Air fixed-wireless access product to better address its clients’ needs

Wireless 132
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Uber’s New CEO Short List Is Said to Include HPE’s Meg Whitman

Data Center Knowledge

Employees say company has short list of fewer than six CEO candidates Read More.

Company 189
article thumbnail

Nordic digitisation brings unwanted consequence of heightened cyber security risks

Computer Weekly

The Nordic region is becoming highly connected – which has not gone unnoticed by cyber criminals

Security 177
article thumbnail

Hackers Breach 400,000 UniCredit Bank Accounts for Data

Data Center Knowledge

Cyberattacks on corporations and banks are accelerating. Read More.

Banking 189
article thumbnail

Adobe to kill off Flash Player by end of 2020

Computer Weekly

Adobe has announced it is to stop updating and distributing Flash Player in just over three years’ time

Adobe 155
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Jaded Look at Phishing Defense

IT Toolbox

Last week my company received a phishing email. This is a completely unremarkable statement. It is probably a universally true statement that could be applied to any company on the globe. Identify theft and social engineering are rampant in our world today. Understanding this is table stakes to being a human being.

article thumbnail

Are CIOs Ready To Enter The World Of 3D Printed Metal Objects?

The Accidental Successful CIO

As companies start to print 3D metal objects, the CIO is going to be involved Image Credit: gillyan9. Just in case you missed it, the world around us is changing. Although CIOs like to surround themselves with things like servers, software, clouds, and secure networks, we need to keep in mind that our company employs us for a reason. They understand the importance of information technology and they want us to help them to harness it so that they can do what they do better.

3D 113
article thumbnail

Relational databases relatively poor at running digital transformation projects

Computer Weekly

Digital projects aren’t living up to expectations, with many only delivering incremental improvements to the status quo, survey reveals

Survey 125
article thumbnail

Alphabet Q2 2017: Enterprise Efforts Pay Off for Google Cloud

Data Center Knowledge

Google’s ongoing focus on attracting enterprise customers to its cloud is starting to have a material impact on its earnings Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Dell BIOS Reporting Tool

Mick's IT Blog

Recently, we ran into a problem when we discovered some of the newer laptops were not automatically disabling the WiFi when connected to ethernet. What made the task even more difficult was that all of our Dell Latitude 7480 systems were already deployed. Being in the legal industry, it is more difficult to ask for time to troubleshoot problems when attorneys bill by the hour.

Dell 104
article thumbnail

Ransomware victims shelled out $25 million over the last two years, according to Google report

Tech Republic Security

New research from Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering tracked bitcoin sales, discovering how much money hackers extorted through malicious attacks.

Google 108
article thumbnail

How a Florida school district tames the wild west of education security at scale and on budget

IT Toolbox

Learn how to ensure that schools are technically advanced and secure at low cost and at high scale

Budget 113
article thumbnail

Video: Think macOS is impervious to malware? Think again!

Tech Republic Security

Infecting machines through a phishing campaign, new macOS malware called OS X / Dok uses stolen developer credentials to bypass Gatekeeper and hooks into macOS preventing removal.

Malware 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Cloud Platform reaches new heights in Alphabet results

Computer Weekly

GCP is establishing itself as a viable revenue stream for the search engine giant

Google 121
article thumbnail

Report: The top 5 cybersecurity threats of 2017

Tech Republic Security

A report from Accenture has examined key threats that have emerged in the first half of 2017. Here's how businesses can stay safe.

Report 109
article thumbnail

Data encoding through the ages

IT Toolbox

Data encoding has been with us almost from the moment that writing was invented

Data 113
article thumbnail

Microsoft Announces Azure Containers Instances (ACI) for Linux

Data Center Knowledge

Windows container support will arrive in the coming weeks. Read More.

Linux 119
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IDG Contributor Network: Can SD-WANs meet standards requirements?

Network World

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battle. It’s inconceivable to many that an SD-WAN could replace MPLS. This is particularly true for security teams.

WAN 81
article thumbnail

CIO Jury: Nearly 60% of companies don't encrypt corporate emails

Tech Republic Security

Encryption can prevent cyberattacks, but seven out of 12 tech leaders said their companies do not use this process for emails.

Company 90
article thumbnail

Unforgiving Algorithms. And Comic Strips. I like Comics.

IT Toolbox

Algorithms vs Norman Rockwell world.

113
113
article thumbnail

Video: Why ransomware attacks like WannaCry are so costly

Tech Republic Security

A new poll of IT professionals reveals that 86% of companies remain unprepared for ransomware attacks, and even more have no idea how to recover from cyber-attacks.

Video 75
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.