June, 2016

article thumbnail

With Brexit, A Customer-Focused Agenda Is More Important Than Ever

Forrester IT

Yesterday's decision by UK citizens to leave the European Union ("Brexit") brings about short-term uncertainties and unintended consequences that will make it harder for UK businesses to keep customers and attract talent. While times of high-market volatility can tempt firms to panic and cut spending on customer-focused initiatives, now is the time to drive innovation in order to win, serve, and retain customers.

article thumbnail

Here’s How Much Energy All US Data Centers Consume

Data Center Knowledge

Second study of its kind in history shows overall growth in data center energy use has flattened Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT must ditch ‘Ministry of No’ image to tackle shadow IT

CTOvision

Len Padilla. With enterprises increasingly dependent on shadow IT, enterprise IT departments must stop being seen as the ‘Ministry of No’ and start engaging with users to help them get the business-critical applications they need to do their jobs. The increase in employees going rogue and purchasing shadow IT without the permission, control or knowledge of the IT department is a growing trend, and one that business departments are increasingly relying on.

article thumbnail

Most cyber security strategies ignore the way attackers really work

Computer Weekly

Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals

Strategy 176
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Expert panel explores the new reality for cloud security and trusted mobile apps delivery

IT Toolbox

As enterprises and small to medium-sized businesses (SMBs) alike weigh the balance of apps and convenience with security -- a new dynamic is emerging. Security concerns increasingly dwarf other architecture considerations.

Security 169
article thumbnail

What a Digital Mindset Means Role by Role

Social, Agile and Transformation

We all hear and say that "Digital" requires a different mindset, a "Digital Mindset, but what exactly does that mean? If you think digital mindset is about having the latest gadget, or being the go-to person to configure your mobile device, or knowing the latest startup that is likely to disrupt an industry then you're missing the point. If you believe that digital natives have a leg up on.

Mobile 133

More Trending

article thumbnail

How TierPoint Quietly Built a Data Center Empire in Secondary Markets

Data Center Knowledge

Flying generally under the radar, the private equity-backed data center roll-up has grown from a small local player to a service provider of national scale Read More.

article thumbnail

Why Aren’t Our Networks Staying Up?

The Accidental Successful CIO

Things don’t seem to work as well as they used to Image Credit: Bob Mical. Does anyone besides me remember the phone system? You could be just about anywhere in the world at any time and you could pick up a phone, call someone, and your call would go right through. The Plain Old Telephone System (POTS) just worked. Now nothing is ever perfect and the POTS wasn’t perfect either, but it was 99.999% perfect which meant that it only didn’t work for about 5 minutes per year.

Network 124
article thumbnail

Think like attackers, says HPE cyber security strategist

Computer Weekly

Organisations need to think of cyber attackers as adversaries and competitors focused on stealing data, maximising their profit and minimising their risk, says HPE security strategist Tim Grieveson

Security 168
article thumbnail

The Benefits of Using CRM Data for Programmatic Advertising Campaigns

IT Toolbox

Programmatic advertising automates a significant portion of the ad buying process, which frees up your staff's time for other high-skill tasks. You define your target audience for a campaign through a demand side platform (DSP), which connects you to ad inventory from relevant publishers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Is the Intel Management Engine a backdoor?

Tech Republic Security

Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.

Intel 132
article thumbnail

Let's go back to the future--it is time to start planning now for customer service in 2021

Forrester IT

This a guest post by Meredith Cain , a Research Associate on the Application Development & Delivery (AD&D) team. Let's take trip back to 1989. One of the big movies of that year was "Back to the Future: Part II." One of the great things about that movie was its view of the future--or, because so much has time has passed since the film was released, its view of what our present should be like.

Film 210
article thumbnail

Yahoo Wants to Sell Its ‘Chicken Coop’ Data Center Designs

Data Center Knowledge

Trove of 3,000 patents and applications being sold includes data center design innovations Read More.

article thumbnail

What To Do When Your Boss Is Younger Than You Are

The Accidental Successful CIO

When you work for a younger boss, you’ll have to make some adjustments Image Credit: Christopher Lance. What have you always pictured your boss looking like? If you are anything like me, you’ve always pictured them as a grumpy old man. Or a grumpy old woman if you want to get all modern. However, there is one thing that I’ve never really pictured my boss as being – younger than I am!

Microsoft 124
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Enterprises urged not to view security as a barrier to internet of things adoption

Computer Weekly

The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring

Internet 168
article thumbnail

How Businesses Can Successfully Implement VoIP Services

IT Toolbox

Voice over IP (VoIP) telephony services provide businesses with a host of benefits. From lowered costs to increased security, the advantages over legacy phone systems are numerous. Of course, these benefits don't simply materialize overnight. VoIP implementation can take a bit of work, but as long as a business utilizes the following tips, the transition can be seamless.

VOIP 165
article thumbnail

1.2 million infected: Android malware 'Hummer' could be biggest trojan ever

Tech Republic Security

Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps.

Malware 113
article thumbnail

Architect Process Agility With BPM Platforms For Digital Business

Forrester IT

Some CIOs and enterprise architecture (EA) pros believe that business process management (BPM) is on the opposite side of agility -- but they don't realize that BPM technology itself is also evolving. Agility-oriented BPM platforms are the foundation of a digital business. I've recently published a report that discusses the four key areas that EA pros must focus on to accelerate digital transformation with BPM.

Agile 186
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Data Center SDN: Comparing VMware NSX, Cisco ACI, and Open SDN Options

Data Center Knowledge

What to keep in mind when evaluating SDN options for the ever important networking layer Read More.

article thumbnail

Serverless Reference Architectures with AWS Lambda

All Things Distributed

Building your applications with only managed components has become very popular, and AWS Lambda plays a crucial role in that. I see a tremendous interest in examples how to build such applications, and articles such as " The Serverless Start-Up - Down With Servers! " about teletext.io are read eagerly around the globe. If you are looking for more examples there are the Lambda Serverless Reference Architectures that can serve as the blueprint for building your own serverless applications.

article thumbnail

Micro-segmentation key to new approach to infosec, says Unisys

Computer Weekly

Micro-segmentation enables organisations to improve data security at reasonable cost without compromising agility, governance, risk and compliance, says Unisys

Agile 177
article thumbnail

5 Ways to Boost VoIP Call Quality

IT Toolbox

Voice over IP (VoIP) is a terrific communications tool on which businesses increasingly rely to move their work forward, but especially for IT teams new to handling telephony in-house, it can be challenging to manage well at the outset. VoIP makes stronger demands on network quality than most other applications, and users tend to notice (and complain) right away if call quality slips.

VOIP 160
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to free up iPhone data and iCloud storage

Tech Republic Cloud

Forgot you subscribed to a podcast that no longer interests you? Never deleted that audiobook you finished? It's time to free up that needed space on your iPhone or iPad.

Storage 109
article thumbnail

Cisco buys Cloud Security Gateway vendor CloudLock for $293M

Forrester IT

Given Symantec's recent acquisiton of BlueCoat (and with it BlueCoat's earlier acquired Elastica and Perspecsys cloud security gateway (CSG) assets), and IBM's organic buildout of its Defender CSG solution it comes hardly as a surprise that Cisco today announced its intent to acquire CloudLock for US$293M (in Forrester's estimation this purchase price represents at least 10-15x of CloudLock's current revenues).

Cloud 186
article thumbnail

Report: Flood of Data Center Builders Causes Housing Shortage in Prineville

Data Center Knowledge

Workers building Apple and Facebook data centers having a hard time finding local places to live Read More.

article thumbnail

Clinton allegedly hacked again, and documents leaked from DNC attack

Tech Republic Security

The Clinton Foundation's network was allegedly hacked late Tuesday, while a variety of documents from last week's DNC hack were leaked simultaneously, pushing cybersecurity toward center stage.

Network 104
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Post-Brexit price hikes hit cloud and datacentre community, as currency fluctuations bite

Computer Weekly

Cloud and datacentre analysts claim IT buyers are already feeling the pinch from the outcome of the EU referendum, but past performance suggests demand for colocation space will rise in the event of recession

Cloud 162
article thumbnail

CRM Your Way to Success

IT Toolbox

Any CEO will tell you that it's a hard climb to reach the heights of success, especially in an uncertain economy. This is why more companies are looking at investing in software solutions which help them to increase sales and reduce operational costs. Customer Relationship Management (CRM) technology is one of the most popular choices for enterprises because it is multi-functional and versatile.

article thumbnail

How to keep your presentation data up-to-date with Google Sheets in Slides, Docs, or Silk.co

Tech Republic Cloud

Insert a chart from a Google Sheet in Google Slides and Google Docs, or create an interactive data story with Silk.co, to make sure your presentation always stays current.

Google 108
article thumbnail

PowerShell: Automatically Populate the Microsoft Office Updates folder via SCCM

Mick's IT Blog

One of the things that has annoyed me in the past is having to keep the Microsoft Office Updates folder up-to-date with the latest.MSP files. The reason I bother with keeping the Updates folder up-to-date is because it speeds up the process of building a golden image, which in my environment, Office is installed during that phase. To automate this process, I created an automatic deployment rule in SCCM that keeps the Microsoft Office software update group up-to-date with the latest Office update

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.