Fri.Jul 07, 2017

article thumbnail

Whither Indian IT?

Forrester IT

The Indian media has been busy sounding the death knell for the US$150 billion IT and BPO services industry. Doom generates page views and can make for compelling reading, but do the facts justify the rising sense of despondency? Not quiet, we believe. The retrenchments and the modest guidance are real. But they are neither indicative of a civilization-ending AI, nor a whole-scale repudiation of the founding pillars of the offshore services industry.

Policies 373
article thumbnail

Lloyds Bank joins Swift blockchain proof-of-concept project

Computer Weekly

Twenty-eight banks collaborate in blockchain project that will enable the real-time management of accounts used to make cross-border payments

Banking 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Don't Need Jedi's

Forrester IT

Like every other movie buff, geek, or nerd on the planet I am a Star Wars fan. I think it's a stellar series (minus the whole Jar Jar Binks thing, anything with that guy in it could be used as an alternative to waterboarding) that has spun a tale for the ages across the better part of a few decades. After this last week bouncing around on planes across the US I had time to watch the original movie on a flight, it had been quite a while.

WAN 275
article thumbnail

Let’s have some more straight talking on AI and robotics

Computer Weekly

How do you ensure artificial intelligence grows with your business and does not turn into an assortment of technologies that may be fantastic but don’t integrate or scale well?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CopyCat malware infects 14M devices, shows 'unprecedented success rate'

Tech Republic Security

Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.

Malware 152
article thumbnail

Vodafone Qatar pushes IoT adoption in Middle East

Computer Weekly

Vodafone Qatar is harnessing a network of partners to support organisations in the Middle East with their internet of things strategies

Internet 165

More Trending

article thumbnail

Govia Thameslink rail operator picks Worldline for mobile ticketing

Computer Weekly

Rail operator Govia Thameslink sets out to replace its desktop ticket issuing service with a Worldline mobile solution

Mobile 175
article thumbnail

As APM Evolves, So Too Must IT Issue Resolution

Data Center Knowledge

Application performance management is morphing into what Gartner calls digital experience management – or DEM, where the user experience is the ultimate metric. Read More.

article thumbnail

Microsoft to cut thousands of jobs in cloud-related company rejig

Computer Weekly

Microsoft confirms job cuts and says affected staff have been notified that their jobs are either under threat or set to be made redundant

Microsoft 141
article thumbnail

Don't be fooled, speed comes at a cost

IT Toolbox

In your pursuit of speed, be it in a project, or a process, don't ever lose sight of the reality that all speed comes at a price. However fast you are going now, if you want to go faster, you'll pay for it one way or another. Is it worth it? That's up to you.

113
113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Massive cyberattack on US critical infrastructure will hit within 2 years, say 60% of security pros

Tech Republic Security

New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.

article thumbnail

Ekahau ESS 9-point-Oh! Has Arrived

IT Toolbox

One of the most popular tools in WLAN design just got better, as Ekahau releases their new 9.0 version of Ekahau Site Survey (ESS). I’m a long-time user, and also have the good fortune to occasionally rub elbows with the company’s technical leaders.

Survey 113
article thumbnail

Second phase of Dubai Health Authority’s electronic records implementation to start in August 2017

Computer Weekly

Unified electronic medical record (EMR) system to be rolled to more medical facilities across Dubai

System 150
article thumbnail

Microsoft Confirms Layoffs Across Sales Organization to Improve Stance in Cloud War

Data Center Knowledge

The company said it is implementing the changes not to cut costs, but to improve how it handles sales. Read More.

Microsoft 133
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Video: Finding practical ways to communicate cybersecurity best practices

Tech Republic Security

Greg Michaelidis, Cybersecurity Fellow at the New America Foundation and former Obama Senior Advisor for Public Affairs, explains why America's cybersecurity posture is dangerous and how companies can protect users from cyberattacks.

Video 98
article thumbnail

Friday Funny: Racking and Stacking

Data Center Knowledge

Here’s the cartoon for this month’s Data Center Knowledge caption contest. Read More.

article thumbnail

Every student must know these hacks and tricks for college living

Galido

Moving to a campus is your first big step towards the adult life. The best what you can do is to pave the way to your study years. Prepare yourself to do everything on your own and be ready for any unexpected situation when you may need to paddle your own canoe. Someone thinks he or she is ready to overcome any troubles. However, it would be better to learn some pieces of advice on this topic.

Study 60
article thumbnail

Rittal Joins LinkedIn’s Data Center Standard Foundation

Data Center Knowledge

One of the world’s largest rack suppliers now on board with the new rack standard Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CIOs as Chief Innovation Officer: Take a Step wise Approach to Manage Innovation

Future of CIO

Innovation shouldn’t be a serendipity, it is a management process and the differentiated business capability. In essence, innovation is the use of something that is new and unique, and you are able to create its business value. Isn't that what innovation is all about: do it better, differentiate yourself from your completion, run, grow and transform the business.

article thumbnail

Dell Automatic BIOS, Application, and Driver Updates in Build

Mick's IT Blog

Recently, the Install Dell Command Update and Flash BIOS in WinPE solution I published stopped working when we purchased the Dell E7280. The Dell Command | Update was installing a driver in the WinPE environment that would stick in a continuous installation. Before, it was an all or nothing thing on using the DCU-CLI.exe within WinPE. It could not accept any parameters.

Dell 37
article thumbnail

A Brief History of Bitcoin – And where it’s going next

Dataconomy

The money in your pockets has three basic traits – it’s tangible, centrally regulated and easy to counterfeit. Bitcoin is the exact reversal of it. Bitcoin is a cryptocurrency that operates independently without banking institutions and the government meddling into its affairs. There’s nothing physical about it – it’s all. The post A Brief History of Bitcoin – And where it’s going next appeared first on Dataconomy.

Banking 62