March, 2017

article thumbnail

The Top Emerging Technologies For Digital Predators

Forrester IT

If you've been following my research, you know I like to divide the business world into three categories of company: Digital Predators successfully use emerging digital technologies to gain market share and/or displace traditional incumbent companies (e.g. Amazon, Lyft, Priceline, AirBnB, Netflix). Digital Transformers evolve a traditional business to take advantage of emerging technologies, creating new sources of value for customers and opening up new competitive strategies (e.g.

article thumbnail

What Big Data and Public Speaking Have in Common

CTOvision

Brigg Patten. Public speaking is about turning even boring subjects into an inspiring experience. However, some speakers can make audiences cheer, while others put them to sleep. Genuine passion for the subject and good articulation can help, but successful public speaking engagements take something more. Analytics can actually tell us which elements can transform mere words into a unique experience.

Big Data 275
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More than a million Gmail and Yahoo account credentials on sale

Computer Weekly

Usernames, email addresses and plaintext passwords of more than a million Yahoo and Gmail accounts are reportedly on sale on the dark web, posing a threat to corporate security

Report 244
article thumbnail

Meet Microsoft, the New Face of Open Source Data Center Hardware

Data Center Knowledge

If you’re running a cloud platform at Microsoft’s scale (30-plus regions around the world, with multiple data centers per region) and you want it to run on the best data center hardware, you typically design it yourself.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

6 Ways to Improve Security on Your Android Device

IT Toolbox

Since there are many android smartphone users surfing the internet on a daily basis, we have decided to give you six simple ways to improve the security on your android device.

Security 203
article thumbnail

What discipline should CIO master to drive transformation?

Social, Agile and Transformation

Several years ago, I was in a forum where a CIO I deeply respect admitted to me that the hardest thing for him to do on a daily, weekly, and monthly basis was manage his time. Time was his biggest issue? Not a demanding CEO? Not firefighting the latest operational issue? Not trying trying to get a team to align on priorities or technical strategy? We all have struggles managing our time and.

Strategy 201

More Trending

article thumbnail

Amazon Lambda: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers Amazon Lambda, an on-demand serverless computing service. Learn how Amazon Lambda complements other AWS services, and how your business can use it.

161
161
article thumbnail

Cardiff man admits terrorist charges after posting encryption instructions on Islamic blog

Computer Weekly

Samata Ullah, a resident of Cardiff, pleaded guilty to five terrorism charges, including developing an encrypted version of an Islamic website and posting videos explaining how to use encryption

Video 230
article thumbnail

Why Microsoft Says ARM Chips Can Replace Half of Its Data Center Muscle

Data Center Knowledge

Recent years’ relative quiet on the ARM server front, the scarcity of large-scale IBM Power deployment news, and the consistent growth reported by Intel’s Data Center Group may in totality create an impression that the data center chip wars have subsided, with Intel enjoying a massive – and secure.

article thumbnail

How IT Uses Collaboration for Digital Transformation

IT Toolbox

As this series progresses, I’ll address the impact of digital transformation on three stakeholder groups, along with how each can use collaboration solutions like UC to manage these changes.

Groups 191
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

Apple 157
article thumbnail

DevOps has reached critical mass, CIOs need to get on board

Forrester IT

DevOps is one of the most powerful weapons that CIOs have in their arsenal. DevOps unites the entire enterprise in delivering business transformation with superior customer experience. Companies like Target , Capital One , Walmart , ING , Nordstrom , Netflix and JetBlue are already reaping the benefits. In order to unlock the promise of DevOps, CIOs must lead the call for cultural change.

Devops 385
article thumbnail

Why machine learning and data analysis are critical to Google's success in the cloud

Tech Republic Cloud

At the 2017 Google Cloud Next conference, machine learning efforts took center stage in the first keynote address, highlighting Google's work with data as a core asset.

Google 167
article thumbnail

Recruiting women key to closing cyber security skills gap, say experts

Computer Weekly

The European cyber security industry has one of the lowest proportions of women and the highest gender pay gaps in the world, the latest Global Information Security Workforce Study shows

Security 221
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Linux Conquered the Data Center

Data Center Knowledge

Linux’s ubiquity in the data center wasn’t by design. It was the effect of a powerful and unpredictable undercurrent. Read More.

article thumbnail

4 Benefits of VoIP and CRM Integration

IT Toolbox

Voice over Internet Protocol, commonly called VoIP, lets businesses make phone calls from the internet. It boosts portability, cuts costs -- 99.9 percent of users see a reduction in their phone expenses, according to one report -- and provides more flexibility than traditional telecommunications. Companies that integrate VoIP with customer relationship management software could reap further benefits.

VOIP 189
article thumbnail

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

Tech Republic Security

Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.

IBM 149
article thumbnail

Google Drives Into The Business Content Services Segment of ECM

Forrester IT

Several Forrester colleagues and I attended the Google Next conference earlier this month, an event showcasing the Google Cloud Platform portfolio. One message, however, was distinctly NOT cloudy: Google is aiming at the enterprise market. And that includes your enterprise content. Google Drive has been a popular offering in the cloud enterprise file sync and share market, and we evaluated it as a Leader in our 2016 Forrester Wave (subscription required).

Google 382
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Ubuntu Server: The smart person's guide

Tech Republic Cloud

Ubuntu Server is more popular than ever, thanks to containers and the cloud. This resource guide about Ubuntu Server covers why the platform matters, how to use it, and more.

Resources 153
article thumbnail

Government to ramp up help for UK cyber security industry

Computer Weekly

Government, in partnership with industry, is pursuing a range of initiatives aimed at establishing a UK cyber security ecosystem, developing skills and products and boosting exports, says DIT’s Conrad Prince

article thumbnail

Switch Launches Its Pyramid-Shaped Data Center in Michigan

Data Center Knowledge

Sticks to its signature bold design approach, using dramatic lighting, Focault pendulum in the lobby. Read More.

article thumbnail

5 Ways to Combat VoIP Eavesdropping

IT Toolbox

Phone eavesdropping is back in the headlines, making it a good time to review options for guarding your voice over IP (VoIP) phone system. There’s a rich history to VoIP eavesdropping, including such attacks as Vomit, SIPtap, and Peskyspy.

VOIP 174
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Raspberry Pi in the data center: A unique option for object storage and edge computing

Tech Republic Data Center

Despite its CPU and I/O limitations, the Raspberry Pi potentially represents the future of computing with interesting options in the enterprise data center.

article thumbnail

Platforms Are The Foundation For New Value Creation

Forrester IT

While a lot has been written about consumer-facing platforms like Facebook and Uber, the platform impact on business-to-business relationships has not been as extensively investigated. However, these "business platform models" are transforming the way how traditional businesses create value. Business platforms will reorganize a wide variety of markets, work arrangements, and ultimately value creation and capture.

B2B 363
article thumbnail

Google Cloud Platform: The smart person's guide

Tech Republic Cloud

This comprehensive guide covers the history of Google Cloud Platform, the products and services it offers, and where it fits in the overall cloud market.

Google 167
article thumbnail

IR35 reforms will harm public sector innovation and competitiveness, say contractors

Computer Weekly

Research from recruitment consultancy Harvey Nash highlights contractor concerns about how the forthcoming IR35 reforms will affect competitiveness and talent recruitment in the public sector

Research 203
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

JPMorgan Marshals an Army of Developers to Automate Finance

Data Center Knowledge

New era of automation is now in overdrive as cheap computing power converges with fears of losing customers to startups. Read More.

article thumbnail

What's Trending for ERP in 2017?

IT Toolbox

Enterprise Resource Planning (ERP) is the cornerstone of modern business, from small storefronts to large manufacturers. ERP is an integrated application that lets computers share, mix and assimilate information across all business functions. It provides a business with a centrally located, consolidated core to systematically process information between departments.

Trends 171
article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

Sysadmins: You're All Developers Now

Forrester IT

In a past life I was a system administrator, or "sysadmin" I enjoyed it, but even in those halcyon days of remoting into servers and driving to the office at 2 AM (hoping the server room wasn't on fire), I knew I had a limited shelf life. It wasn't until years later that I fully understood why: Administrators are babysitters. The era of tech babysitters is over.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.