February, 2017

article thumbnail

DevOps, No Longer Just For “Unicorns”

Forrester IT

The born-digital "unicorn" companies such as Etsy, Google and Netflix, are pioneers of modern DevOps, but BT leaders at companies of all ages, sizes, and types are now eagerly pursuing the same principles. [i] The pressure for speed and quality is DevOps becoming pivotal for all organizations. For example, KeyBank are leveraging DevOps to quickly deliver business new customer capability using streamlined coordination between application development and operations.

Devops 416
article thumbnail

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially. Cybersecurity experts predict that the security threats will only increase as cyber criminals become more sophisticated in their attacks.

Data 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yahoo takes $350m cut on deal with Verizon after security breaches

Computer Weekly

Ending months of speculation, Verizon has announced a revised deal for acquiring Yahoo’s core business that is $350m less than the original due to revelations of two major data breaches

Security 253
article thumbnail

 Artificial Intelligence and the Evolution of Data Centers

Data Center Knowledge

Using AI, Google was able to reduce its total data center power consumption by 15 percent, which will save the company hundreds of millions of dollars over the next several years. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Five Keys for Easier ERP Deployments

IT Toolbox

Don’t panic. That might be the famous advice from the Douglas Adams series, The Hitchhiker’s Guide to the Galaxy , but it also is words of wisdom for those entrusted with deploying a new ERP system for their business.

System 195
article thumbnail

Five ways to align digital transformation with data-driven practices

Social, Agile and Transformation

Let's examine a couple of ways you can align two transformation programs to achieve complementary and reinforcing results. Your digital transformation program has a number of initiatives that enable new markets, develop new products, and should be targeting an overall improvement in customer experiences. You may have a separate program aimed at enabling the data driven organization that.

Data 186

More Trending

article thumbnail

Cyber Security Skills Businesses Will Look For in 2017

CTOvision

Rick Delgado. The coming year brings new opportunities for businesses to grow and develop with the latest data tools, but with this advancement comes a series of risks and downfalls. Cyber security is a more pressing issue than ever, with hackers and cyber terrorists advancing all the time. That’s why 2017 calls for experts with the most-needed set of skills, to ensure businesses can continue driving towards success without being taken down by a breach.

Security 229
article thumbnail

Companies partner with CA Technologies to encourage kids into Stem

Computer Weekly

Mars, GSK and Deutsche Bank help CA Technologies with its Step into Stem event designed to encourage young people to pursue careers in science, technology, engineering and maths

Company 233
article thumbnail

Multi-Cloud Won’t Work Without Replication; How Do We Get There?

Data Center Knowledge

As organizations move to multiple public clouds, they in turn will need a way to synchronize data seamlessly across multiple providers — cross-cloud replication makes this possible. Read More.

Cloud 184
article thumbnail

4 Tips for Securing Your VoIP Environment

IT Toolbox

Voice over IP (VoIP) can be a major boon to businesses. It’s cost-effective, provides flexibility for growth, and offers a variety of helpful features that boost productivity.

VOIP 186
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

IBM uses Watson to fill cybersecurity gaps

Tech Republic Security

IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.

IBM 165
article thumbnail

Get ready for Business Intelligence market next wave of M&A

Forrester IT

Business intelligence (BI) is a runaway locomotive that keeps picking up speed in terms of enterprise interest, adoption, and spending levels. The result: Forrester now tracks 73(!) vendors in the segment. Their architectures and user interfaces vary, but they support similar use cases. Forrester started the original research with fewer than 30 vendors in 2014 and ended up with 73 in the current 2017 update.

article thumbnail

Generative Adversary Networks: A very exciting development in Artificial Intelligence

CTOvision

Bob Gourley. For years there has been a growing concern that many forms of machine learning are actually easier to deceive than they should be (and there is good reason to be concerned, for background on why see the paper recommended to me by my friend Lewis Shepherd: " Deep Neural Networks are Easily Fooled "). Many of us have also raised concerns about the current security frameworks around Artificial Intelligence (there are none!

article thumbnail

At IBM’s Watson lab, customers marry the power of AI with the IoT

Computer Weekly

IBM formally inaugurated its Watson Internet of Things headquarters in Munich, Germany in February, and Computer Weekly went to meet the customers and partners who are using Watson AI to deliver on the promise of the IoT

IBM 227
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Surge of New Capacity Expected in Top US Data Center Markets This Year

Data Center Knowledge

Brokers say speculative construction and corporate real estate assets coming to market not likely to create unfavorable conditions for providers. Read More.

article thumbnail

5 VoIP Features That Increase Customer Satisfaction

IT Toolbox

Success in business is heavily reliant on providing great customer service. Even the slightest edge over your competitors in this regard can be the key to growth and continuing success.

VOIP 172
article thumbnail

4 tips to help your business recruit, and keep, cybersecurity pros

Tech Republic Security

According to a new report from ISACA, 27% of US companies are unable to fill cybersecurity positions, and most applicants aren't qualified for the job. Here's how to better recruit cyber professionals.

article thumbnail

This Valentine’s Day, Pause and Appreciate Flower Logistics.

Forrester IT

Over the past few days, Boston has been slammed by multiple snow storms. This causes challenges for my pending flight to San Jose, but another deadline looms: some roses might not be able to make it to Boston on time for Valentine's Day. Only someone deeply concerned with Supply Chain and Logistics worries about delivery time on Valentine's Day.

Study 358
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Protecting Your (and your workforces’s) Personal Information at Home

CTOvision

Bob Gourley. A trend we have noticed in engagements across multiple sectors of the economy is an absolute thirst for information on best practices for protecting information at home. Every employee of every company, from the most senior executive to most junior intern, is now leveraging advanced interconnected technologies in amazing new ways at home.

Trends 216
article thumbnail

Major DDoS attacks see huge increase, says Akamai

Computer Weekly

Akamai’s State of the Internet/Security Report for the fourth quarter of 2016 finds that distributed denial of service attacks larger than 100Gbps are rapidly increasing as more IoT devices are compromised

Internet 224
article thumbnail

Mother Nature Attacks! Is Your Disaster Recovery Plan Ready?

Data Center Knowledge

There’s no point in investing in a backup and disaster recovery solution that only offers slow and partial recovery – in today’s competitive world, users and customers will hold delays and lost functionality against you. Read More.

article thumbnail

Five AI Initiatives that Improve ERP

IT Toolbox

This marriage has been a long time in coming, but finally we’re here. Enterprise resource planning has always been about managing a large set of variables and using the data for better forecasting, resource allocation and efficiencies. The problem with ERP has been complexity and fully utilizing the data, however.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Free charging stations can hack your phone, here's how to protect yourself

Tech Republic Security

A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.

How To 158
article thumbnail

The 2017 Enterprise Architecture Awards: Driving The Customer-obsessed Digital Business

Forrester IT

Just about every company Forrester works with tells us they are driving to become Digital Businesses. But not just 'digital' as a technology imperative - they are investing in digital to dramatically change how they serve their customers - with target benefits rippling over to customer retention and acquisition. We call this focus Customer-obsessed Digital Business.

article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Crystal Lister. This article increases awareness for organizations seeking to enhance their digital risk posture against the increasing threat of ransomware (a type of malware) deployed by threat actors to prevent or limit users from accessing their system until a ransom is paid. Ransomware is increasingly targeting multiple industries with downtime and lost productivity as its attack surface expands beyond the virtual realm to the physical via the Internet of Things (IoT), however, organization

article thumbnail

Banking malware, DDoS, ransomware and CEO fraud top UK cyber threats

Computer Weekly

Businesses need to be aware of the value of their data, how that data is likely to be attacked, and how to defend against particular attacks, says leading UK cyber cop

Malware 224
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Will the Submarine Cable Boom Drive More Revenue to Colos?

Data Center Knowledge

The way undersea cable capacity is priced and sold could accelerate enterprise adoption of multi-cloud IT architecture. Read More.

article thumbnail

Five Revenue Opportunities from Intelligent ERP

IT Toolbox

What’s the next big thing in the evolution of ERP systems? Intelligence. Capturing and presenting business data is not enough, as any analytics or big data pundit will tell you. The data must yield outcomes, and that requires smarter applications than the monolithic ERP systems of yore.

article thumbnail

Public and hybrid cloud winning out over private cloud, says report

Tech Republic Cloud

The latest RightScale State of the Cloud Report claims that private cloud deployments are dropping, and Microsoft Azure is continuing to grow as a major competitor to AWS.

Cloud 162
article thumbnail

Did Move 37 Signal The Impending Death Of The Financial Services Industry As We Know It?

Forrester IT

A couple of years ago I wrote a post predicting a new business paradigm for financial services. You may have read this post and been skeptical. Maybe you thought it wasn't realistic. If so, you may be wishing you were paying more attention very soon. Read on. This week I spoke on "The Experience Economy" at a client conference where attendees were primarily from the financial services industry.

Financial 264
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.