Fri.May 12, 2017

article thumbnail

AI Is Not An Exception – Technology Has Always Taken Jobs

Forrester IT

Yes, AI will take jobs away from many workers - our relatives, friends, and neighbors. So too have all technologies created throughout human history. We invent things to make things easier and the impossible possible. The invention of the wheel made transport easier. Gutenberg's printing press put lots of monk's out of business. The chainsaw saw a reduction in the number of sawyers (lumberjacks).

article thumbnail

Why smart cities need to become smarter about technology

Computer Weekly

Cities are experimenting with smarter ways to use technologies to improve the life of citizens, but their projects are fragmented. Is there a better approach?

273
273
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive Ransomware Outbreak Highlights Need For A Digital Extortion Decision Tree

Forrester IT

5/12/2017 might be another day of cyber-infamy based on malware as hospitals and critical infrastructure providers are locked out of their machines due to what appears to be a new variant of ransomware dubbed WannaCry spreading through corporate networks. Like the ransomware outbreaks in mid-2016 here in the US, NHS hospitals are experiencing patient care issues as a result of the malware, with some shutdown completely as of 11:37 AM Eastern time.

SMB 304
article thumbnail

Almost three-quarters of tech workers thinking of leaving UK after Brexit

Computer Weekly

The UK’s decision to leave the European Union has many tech workers in the UK considering a move elsewhere

279
279
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Extortionists Mount Global Hacking Attack Seeking Ransom

Data Center Knowledge

‘Major cyber attack’ on UK’s National Health Service; ransomware breach also targets Spanish, Russian companies Read More.

Company 189
article thumbnail

Five cyber security imperatives for all companies

Computer Weekly

There are five things all companies should ensure they are doing in terms of cyber security

Company 232

More Trending

article thumbnail

Net neutrality: The smart person's guide

Tech Republic Cloud

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.

.Net 160
article thumbnail

Furious Land War Erupts Outside CME Data Center

Data Center Knowledge

It’s the latest, and perhaps boldest, salvo in an escalating war being waged to stay competitive in the high-speed trading business. Read More.

article thumbnail

ICO reports record number of data breaches and fines

Computer Weekly

The UK privacy watchdog reports that it has dealt with more data breach reports and issued more fines in the past year than ever before

Report 151
article thumbnail

Apple Doubling Down on Reno Data Center

Data Center Knowledge

Government sweetens the tax-break pot in exchange for massive expansion commitment from company Read More.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Mixed reaction to Trump’s cyber security executive order

Computer Weekly

The latest US presidential executive order on cyber security has been met mainly with praise, but critics say there is nothing really new and takes no decisive action

Security 132
article thumbnail

The 6 Crucial Insights About Cloud Computing Everyone Should Know

IT Toolbox

If you're a small business owner or a tech enthusiast, chances are you too have probably considered switching to cloud computing. Before you do so, however, here are the six essential things you should know about the technology.

Cloud 100
article thumbnail

NHS hospitals hit by suspected ransomware attack

Computer Weekly

Hospitals across England are reporting problems with IT systems and some say it is affecting healthcare treatment

article thumbnail

Overcome the Health IT Skills Gap

IT Toolbox

With new and advanced technology consistently paving its way into the industry, the healthcare domain, here are some of the skills that have become essential for the healthcare industry.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Investing in networks for the future – regulatory developments

Computer Weekly

Regulators are increasingly focused on the policy objective of facilitating investment in new network technologies and high-quality broadband services.

Network 126
article thumbnail

Value Your Health

IT Toolbox

"Get some rest. If you haven't got your health, you haven't got anything.". -- Count Rugen. I cannot stress the impact a person's health has on them. It's amazing (and frightening) to see what happens when a person's health is called into question. It changes them - often in strange and startling ways.

100
100
article thumbnail

Perimeter Security: Strategies for Data Center Protection

Data Center Knowledge

Securing the new perimeter in the age of cloud Read More.

article thumbnail

Trends Making an Impact on Small Businesses

IT Toolbox

Whether it?s affecting the kind of tech they use or even who they?re supposed to work with, here are the trends that are making big waves for startups.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Top 10 Data Center Stories of the Month: April 2017

Data Center Knowledge

Here are the 10 most popular stories that appeared on Data Center Knowledge in April Read More.

article thumbnail

Major ransomware attack hits hospitals in England, shutting down IT systems

Tech Republic Security

Hospitals and doctor's surgeries across England are having to cancel non-emergency operations after a major ransomware attack on the National Health Service.

System 116
article thumbnail

New ransomware Jaff demands $3,700 payments

Network World

Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700. Like Locky and Bart, Jaff is distributed via malicious spam emails sent by the Necurs botnet, according to researchers from Malwarebytes. Necurs first appeared in 2012 and is one of the largest and longest-running botnets around today.

IBM 101
article thumbnail

Build 2017: Microsoft promises a turnkey globally distributed database service, Azure Cosmos DB

Tech Republic Cloud

By leveraging Azure and the intelligent cloud, Microsoft is offering customers an easy-to-use globally distributed database service called Cosmos DB.

Microsoft 113
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A 'kill switch' is slowing the spread of WannaCry ransomware

Network World

Friday’s unprecedented ransomware attack may have stopped spreading to new machines -- at least briefly -- thanks to a "kill switch" that a security researcher has activated. The ransomware, called Wana Decryptor or WannaCry, has been found infecting machines across the globe. It works by exploiting a Windows vulnerability that the U.S. National Security Agency may have used for spying.

LAN 93
article thumbnail

Video: This smart firewall can protect your home office and business from hidden cyberattacks

Tech Republic Security

Today 6.4 billion devices connect to the Internet, and another 50 billion are expected to come online soon. CUJO CEO Leon Kuperman explains how to say safe in a world loaded with IoT threats.

article thumbnail

VeloCloud launches an SD-WAN security ecosystem

Network World

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. It’s a great time to be in the SD-WAN business. IDC estimates that worldwide SD-WAN revenues will exceed $6 billion in 2020, with a compound annual growth rate of more than 90% over the 2015-to-2020 forecast period. According to IHS, as of the end of 2016, 13% of North American enterprises already have the technology in production and 62% are in lab trials.

WAN 83
article thumbnail

Data Mining for Social Intelligence – Opinion data as a monetizable resource

Dataconomy

The digital age is characterised increasingly by the collective. The centralised database is being superseded by the blockchain; expert opinion yields ever more to the insights of the crowd. The information generated by tapping into the minds of many is driving decisions in both the public and private sector; market. The post Data Mining for Social Intelligence – Opinion data as a monetizable resource appeared first on Dataconomy.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

HP rolls out patch to fix keylogging bug in certain laptops

Network World

Consumers with HP laptops that have been accidentally recording their keystrokes can easily address the problem with a patch from the PC maker. More than two dozen HP laptop models, including the EliteBook, ProBook and ZBook, have an bug in the audio driver that will act as a keylogger , a Swiss security firm said Thursday. A list of affected products can be found here.

HP 64
article thumbnail

How infusing analytics into journalism programs is improving future workforce skills

Tech Republic Big Data

Data science isn't just for STEM majors. A course at the University of Oregon is helping journalism students learn valuable analytics skills.

Journal 56
article thumbnail

Google will review web apps that want access to its users' data

Network World

In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data. To better enforce its policy regarding access to user data through its APIs (application programming interfaces), which states that apps should not mislead users when presenting themselves and their intentions, Google is making changes to the third-party app publishing process, its risk assessment systems and th

Google 60
article thumbnail

The Triple "Focal Point" of Digital Transformation

Future of CIO

Digital organizational maturity is all about business effectiveness, agility, innovation, intelligence, delight, and people-centricity. With rapid change and continuous digital disruptions today, to stay competitive, forward-looking organizations have to stretch out in every business dimension for driving the full-fledged digital transformation. At the high maturity level, companies need to embed digital into the very fabric of the business, explore digital in a structural way and laser focus on

Agile 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.