August, 2017

article thumbnail

Merck Cyber Attack Will Cause Loss Of Innocent Life

CTOvision

For years we have heard warnings of cyber attacks against manufacturing processes and against infrastructure, and for years we have seen these attacks grow from theoretical to real. We have also seen many who do not know how connected these systems are say that all is well and the threat is being over stated. We […].

System 263
article thumbnail

The Data Digest: Understand Emotion To Drive Technology Engagement

Forrester IT

Thanks to the rise of empowered consumers, products and experiences that once seemed improbable, such as (literally) instant delivery, are now integral to our lives. But this era of innovation has also seen its fair share of flops: From Pokémon Go to Google Glass, technologies that looked like promising disrupters stalled quickly or generated more […].

Data 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO highlights challenge Slack-like tools pose to public sector FOI request compliance

Computer Weekly

The Information Commissioner’s Office outlines how the growing use of cloud-based communication channels could complicate how public sector organisations respond to Freedom of Information requests

Tools 249
article thumbnail

How ERP Can Cut Business Costs

IT Toolbox

The business of business is generating profits. That's the bottom line. Both large corporations and small, family-owned businesses are always on the lookout for ways to cut operational costs while improving efficiency. Getting more work done for lower costs means business growth and improved profits.

217
217
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Are You Ready for a Multi-Cloud Future?

Data Center Knowledge

Sponsored by: Dell EMC and Intel There are so many conversations around cloud, moving to various types of cloud services, and how to leverage the power of hybrid. But, it’s important to note just how much cloud services – and hybrid, in particular, have been growing and where they are.

Cloud 206
article thumbnail

Driving Digital in the News!

Social, Agile and Transformation

Long time readers of Social, Agile, and Transformation know that I've recommended going on vacations to help clear the mind and having fun as a key tenet of your organization's culture. So before I sign off for some end-of-summer time off, I'd like to update you on the latest news around my book, Driving Digital: The Leader's Guide to Business Transformation Through Technology.

More Trending

article thumbnail

Women in cybersecurity: IBM wants to send you to a hacker conference for free

Tech Republic Security

A new IBM scholarship will cover 100% of the entry fees for any woman interested in attending EC-Council's Hacker Halted conference. Here's how to take advantage of the offer.

IBM 166
article thumbnail

Forrester warns CIOs of cloud market consolidation risks and rewards

Computer Weekly

Market watcher's latest cloud report outlines how the consolidation of the cloud software and infrastructure market can mean good and bad news for enterprises

Cloud 253
article thumbnail

The Added Benefits of VoIP - What Can it Bring to Your Business?

IT Toolbox

If you're in business, whether large or small, you're always on the prowl for ways to cut expenses and boost profits. When it's time to crunch the numbers, every penny matters. So, when the prospect of cutting your company's phone bill comes along, it is worth a serious look. Voice over Internet Protocol (VoIP).

VOIP 213
article thumbnail

Equinix Positioning for “Next Wave” of Cloud Data Center Deployments

Data Center Knowledge

Next-gen apps and lessons of past deployments are driving architectural changes in cloud infrastructure, and the colo giant wants to stay in tune. Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Five Questions Transformational Leaders and PMOs Should Address When Driving Digital

Social, Agile and Transformation

Let's consider the modern Project Management Office or PMO and what transformational leaders need from this function when driving digital transformation programs. The Role of the PMO Before Transformation In many organizations, the PMO is synonymous with bureaucracy and administration since many focus on tracking projects, managing budgets, defining project management standards, and.

article thumbnail

7 free tools every network needs

Network World

In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster. Fortunately, many good tools, both commercial and open source, are available to shine much-needed light into your environment.

Network 156
article thumbnail

IoT-device swarm intelligence: Think about security before it's too late

Tech Republic Security

Researchers warn that security is historically an afterthought. With everything from thermostats to drones likely belonging to IoT-device swarms in the near future, that's not wise.

Security 148
article thumbnail

Security professionals name top causes of breaches

Computer Weekly

Security professionals have named the top reasons for successful cyber attacks, which are affecting more than half of organisations

Security 253
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How communications firms use VoIP to build national status

IT Toolbox

One of the key trends we have been watching in the US VoIP market has been the efforts made by regionally-established communications players to expand their footprint as quickly as possible to a national scale. How do they do it? So far, by following one of two routes: Either slower via organic growth or more rapidly via alliances or acquisitions.

VOIP 189
article thumbnail

The Rise of Edge Computing

Data Center Knowledge

Moving computation to the edges of the network and toward the users is both a natural progression and ideal solution to the challenges the internet will face in the coming decades. Read More.

Internet 177
article thumbnail

AWS Snowball Edge vs. Azure Stack: What on-premises public cloud means for your data center

Tech Republic Data Center

Cloud customers wanting to exit the business of managing data centers run into road blocks presented by the edge. Here's how two solutions by leading public cloud vendors stack up.

article thumbnail

How to improve IoT security

Network World

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks. Proof comes from a recent meta-study titled The Internet of Hackable Things (pdf) from researchers at the Technical University of Denmark, Denmark; Orebro University, Sweden; and Innopolis University, Russian Federation—compiled from industry and academic research reports—that finds smart devices used in healthcare and s

Security 154
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Musk, tech leaders urge UN to ban AI-powered lethal autonomous weapons

Tech Republic Security

A group of 116 tech executives recently penned an open letter urging the UN to double its efforts protecting against autonomous weapons, which some have called 'killer robots.

Groups 144
article thumbnail

Enterprises will need more bandwidth than public internet

Computer Weekly

As enterprises continue to digitise their operations over the next few years, their demand for data and bandwidth capacity will massively increase, says Equinix

article thumbnail

VoIP in 2017 and Beyond: Big Changes Are Coming

IT Toolbox

In the past, when people talked about the latest in VoIP technology, they'd discuss "must have" features like call routing or voicemail-to-email transcription. Today, trends in VoIP technology are pointing toward giving VoIP a new role in the business technology arena. The VoIP Industry Is Growing Rapidly. The VoIP in the U.S.

VOIP 184
article thumbnail

Can Windows Server Make Hyper-Converged Infrastructure a Boring Commodity?

Data Center Knowledge

Microsoft isn't exactly known as a hyper-converged infrastructure vendor, but that may soon change; its latest server OS has hyper-convergence baked in. Read More.

Windows 182
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Google Cloud Machine Learning Engine: The smart person's guide

Tech Republic Cloud

In 2016, Google gave businesses the ability to build machine learning models using its cloud platform. TechRepublic's comprehensive guide explains how it works and why it matters.

Google 113
article thumbnail

30 ways to improve IoT privacy

Network World

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s

article thumbnail

China sends 'unbreakable code' from quantum satellite to Earth

Tech Republic Security

A new satellite has been able to transmit 'unbreakable' code in an effort to build 'hack-proof' communications, according to Chinese state media.

Media 158
article thumbnail

Interview: Equality starts with education, says Salesforce.org exec

Computer Weekly

Everyone needs access to education to create a level playing field for entering the technology industry, but the curriculum needs to change, says Salesforce’s Charlotte Finn

Education 208
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The Storied Trail to Swagger 3.0.0

IT Toolbox

It is now available and in the wild from the Open API Initiative (OAI) which is operating under the wing of the Linux Foundation as an open standard that will be updated and maintained on GitHub going forward. This is a bright moment for the Swagger standard and includes some major overhauls to the specification.

Linux 183
article thumbnail

Four Providers’ Houston Data Centers Online, but Access Roads Flooded

Data Center Knowledge

Companies report their staff are safe and accounted for; customers cannot access most facilities Read More.

article thumbnail

Going high tech with IBM Cloud at Atlanta's new Mercedes-Benz stadium

Tech Republic Data Center

The newest professional sports stadium opens next week in Atlanta, and it's filled with new tech to improve the fan experience as a result of the team's partnership with IBM.

IBM 113
article thumbnail

Hot products at VMworld 2017

Network World

VMworld 2017 Image by Thinkstock/VMware VMworld 2017 is underway in Las Vegas, where IT pros are converging to learn about the latest in enterprise cloud, virtualization, security, and software-defined data center technologies. Here are some of the product highlights on display at the show.

Vmware 131
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.