Wed.Mar 01, 2017

article thumbnail

The Cloud Is Disrupting Hadoop

Forrester IT

Forrester has seen unprecedented adoption of Hadoop in the last three years. We estimate that firms will spend $800 billion in Hadoop software and related services in 2017. Not surprisingly, Hadoop vendors have capitalized on this -- Cloudera, Hortonworks, and MapR have gone from a "Who?" to "household" brands in the same period of time. But like any good run, times change.

Cloud 291
article thumbnail

More than 60% of girls want encouragement from women in technical roles

Computer Weekly

Girls have admitted there are role models available to them from the science, technology, engineering and maths industries, but they want to hear from coders and developers

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Yes, Cloud Is Still Safe Despite The AWS Outage If You Learn From Failure.

Forrester IT

On February 28, 2017, many internet sites and business services suffered disruptions. Some early speculation that it was another hack like the October DDOS attack on Dyn. The reality was less nefarious but nonetheless far-reaching. Amazon's AWS unit soon revealed a failure in its S3 storage service in a particular region (Eastern US). Just about anyone who uses AWS has a dependency tied to S3.

Cloud 248
article thumbnail

5 Technologies That Will Help You Increase Sales

IT Toolbox

Some technological solutions designed to help and increase sales are tailored to meet the needs of small and medium businesses, while others are more suitable for big enterprises.

Meeting 154
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IT Automation: What to Automate and When?

Data Center Knowledge

We cannot replace humans in the data center and intelligent decision-making by experienced engineers will continue to be a highly valuable asset for CIOs and CTOs. The trick is to balance humans and machines, with a goal toward extreme efficiency and supporting business objectives. Read More.

article thumbnail

Three-quarters of women in tech think workplace flexibility is key to retention

Computer Weekly

Women in the UK technology industry believe flexible working and career development opportunities are the key to retaining workers

Industry 167

More Trending

article thumbnail

GDPR good for UK business and economy, experts tell Lords’ committee

Computer Weekly

Adopting GDPR is good business practice and will put the UK on a good footing post Brexit, but getting an EC data protection adequacy ruling could be challenging due to bulk data collection provisions in the Investigatory Powers Act, experts warn

Data 143
article thumbnail

What Blockchain Means (Hint: Not Just Bitcoin), and Why You Should Care

Data Center Knowledge

If you haven't been paying much attention to blockchain, it's time to start. Read More.

article thumbnail

Liberty begins legal proceedings in challenge to Snoopers’ Charter

Computer Weekly

Civil rights group Liberty has begun its legal challenge to the bulk surveillance powers in the new Investigatory Powers Act, setting in motion a judicial review

Groups 135
article thumbnail

How to troubleshoot Google Cloud Print in 5 steps

Tech Republic Cloud

When Google Cloud Print doesn't work, it sometimes takes more than a simple reboot to get things working again. Here are five simple steps to fix Cloud Print problems.

Google 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Alibaba runs academy to find future e-commerce leaders

Computer Weekly

Online marketplace firm Alibaba launches a global academy designed to find and train young people to join the e-commerce landscape

Training 147
article thumbnail

This Company Owns the High-Density Data Center Niche in Silicon Valley

Data Center Knowledge

Colovore has run out of space in the first phase of its 20kW-per rack data center; next phase will be 35kW per rack. Read More.

article thumbnail

MWC 2017: Tata helps telcos transition to digital

Computer Weekly

Tata Communications Transformation Services has launched a digital transformation plan to help telecoms and mobile operators transition from communications service providers to digital service providers

Mobile 122
article thumbnail

Five Things I’m Looking Forward to at Data Center World

Data Center Knowledge

A famous hacker, open source server design, interconnection, blockchain in the data center, and a whole lot more. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIO interview: Jim Downing, Metail

Computer Weekly

Jim Downing, CTO at digital fashion plugin Metail, believes selling fashion online is still difficult for retailers despite shifts towards omni-channel

Fashion 130
article thumbnail

IDG Contributor Network: SD-WAN facilitates security on the WAN

Network World

With RSA San Francisco—one of, if not the biggest security show of the year—behind us, it’s a good time to revisit security and SD-WANs. I know, we already lived through Yoda’s prognostications about the future of networking and security. In that blog post, we spoke about vendor approaches to securing the new Internet connections created by SD-WAN. There’s another dimension, though, to SD-WAN security that we didn’t discuss and that’s about the WAN.

WAN 98
article thumbnail

Storage 101: Object storage vs block vs file

Computer Weekly

We recap the key attributes of file and block storage access and the pros and cons of object storage, a method that offers key benefits but also drawbacks compared with SAN and NAS

Storage 115
article thumbnail

IT Experience Can Be Beneficial for a Cybersecurity Career

Network World

Given my interest in cybersecurity skills and training, I’m contacted by academic institutions, professional organizations, and training companies with news about some type of cybersecurity education curriculum. This isn’t surprising given the global shortage of cybersecurity skills. New ESG research discloses that 45% of organizations report a “problematic shortage” of cybersecurity skills in 2017 (note: I am an ESG employee).

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

AWS storage outage knocks US-hosted websites and cloud services offline

Computer Weekly

Cloud services giant suffers multi-hour outage that reportedly had a knock-on effect for 20% of the internet

Cloud 136
article thumbnail

Old Windows malware may have tampered with 132 Android apps

Network World

More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers. The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks.

Malware 87
article thumbnail

Subscription-based air travel to hit Europe

Computer Weekly

Airline Surf Jet launches its membership-based service in Europe with cloud-based subscription management software at the core of the business

Travel 113
article thumbnail

Former eBay CEO Joins ServiceNow as CEO and President

Data Center Knowledge

New chief exec joins as analysts predict potential acquisition of ServiceNow this year. Read More.

110
110
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Dubai Health Authority electronic medical records to launch this year

Computer Weekly

Dubai citizens and health organisations will soon benefit from electronic medical records

119
119
article thumbnail

Cloud database growth may be slowing as lock-in fears loom

Tech Republic Data Center

The cloud database continues to grow in popularity, but not as fast as might be expected. Fears of vendor lock-in could be to blame.

Cloud 94
article thumbnail

Over 100 Norwegian banks join forces in mobile payments

Computer Weekly

Nordic banks form an alliance on mobile payments and take over the Vipps platform

Banking 122
article thumbnail

How to save LibreOffice documents to your Nextcloud server

Tech Republic Cloud

LibreOffice makes it easy to save files directly to your Nextcloud server. Learn how to set up this connection to make LibreOffice cloud friendly.

How To 89
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Yahoo execs botched its response to 2014 breach, investigation finds

Network World

If your company has experienced a data breach, it's probably a good idea to thoroughly investigate it promptly. Unfortunately, Yahoo didn't, according to a new internal investigation. The internet pioneer, which reported a massive data breach involving 500 million user accounts in September, actually knew an intrusion had occurred back in 2014, but allegedly botched its response.

article thumbnail

ARM CEO Won’t Rule Out Major Deal After Takeover by SoftBank

Data Center Knowledge

SoftBank expects ARM to be worth at least $100 billion in the next three years. Read More.

Internet 100
article thumbnail

US surveillance law may see no new protections for foreign targets

Network World

Any reform of a controversial U.S. law allowing the National Security Agency to spy on people overseas will likely focus on its impact on U.S. residents, without curbing its use elsewhere. Section 702 of the Foreign Intelligence Surveillance Act expires on Dec. 31, and some digital rights groups are calling on Congress to overhaul the law to protect the privacy of residents of both the U.S. and other countries.

Groups 73
article thumbnail

The hidden value in imperfect big data

Tech Republic Big Data

Fuzzy data sources have become mainstream with analytics. Here's how to properly handle less-than-pristine big data sources.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.