Sat.Sep 30, 2017 - Fri.Oct 06, 2017

article thumbnail

HMRC accused of suppressing IR35 stakeholder views on public sector contractor walkouts

Computer Weekly

Stakeholders are accusing HMRC of trying to suppress their take on how the tax avoidance reforms are affecting contractors, following claims their views were omitted from the latest IR35 Forum minutes

246
246
article thumbnail

Five General Maintenance Tasks Every Webmaster Needs To Do

CTOvision

You are no longer a web student… today, you become a webmaster! But what does that mean, exactly? What does a webmaster do? Or, more to the point, what does a good webmaster do? Whether you’re an aspiring webmaster, an experienced one looking to improve their game, or a hiring manager that wants to know […].

CTO Hire 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Steps to Prepare Your Organization for Artificial Intelligence

Social, Agile and Transformation

Last week I delivered a keynote talk at Synechron's InSync Charlotte event around developing the data driven organization. The talk showed the audience the alignment between digital transformation and data driven practices and how evolving data practices should address small data (through citizen data science programs) and big data governance that can enable organizations to be organizationally.

article thumbnail

VoIP for 2018 and Beyond

IT Toolbox

VoIP is an acronym that anyone who uses the internet probably knows or will see before long. Voice over Internet Protocol (VoIP) is a technology that turns a broadband internet connection into a regular phone line. That means you can make voice calls over your internet connection.

VOIP 196
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Business needs help to act on cyber security advice

Computer Weekly

Organisations need help to act on all the information they receive about cyber security, the London Digital Security Centre has learned since its inception in 2015

Security 246
article thumbnail

Kinetica Brings GPU Acceleration to Tableau

CTOvision

Tableau is transforming the business world by making it easy to visualize and understand data. However, with large datasets, streaming data and more complex queries, enterprise users can find themselves frustrated with slow performance and long wait times as the underlying database struggles to keep up. Kinetica, a provider of GPU-accelerated database technology, is introducing […].

More Trending

article thumbnail

More Gee Whiz for the Netscout AirCheck G2

IT Toolbox

There are two kinds of wireless support people in the world- those who have the Netscout AirCheck G2 and those who want it. The G2 (as us hipsters call it) has settled into the market as the one portable tool to have if you can only have one portable Wi-Fi tool.

Wireless 169
article thumbnail

Investigatory Powers Tribunal faces challenge in appeal court over mass hacking

Computer Weekly

Appeal court will decide whether UK citizens have the right to challenge controversial decisions made by Britain’s most secret court, the Investigatory Powers Tribunal

219
219
article thumbnail

SINET 16 Innovator Winners: Every year this list highlights firms every enterprise tech professional should track

CTOvision

The Security Innovation Network (SINET) is on a mission. This group coordinates and collaborates among many stakeholders in the business community, government and the world of tech innovation to move the state of cybersecurity forward. SINET knows that effective cybersecurity is required to facilitate economic growth, protect critical infrastructure and maintain political stability.

article thumbnail

The Data Way

Eric D. Brown

The world has become a world of data. According to Domo , the majority of the data (roughly 90% of it) that exists today has been created within the last two years. That’s a lot of data. Actually…that’s a LOT of data. And it’s your job to use that data to make better decisions and guide your organization / team to a brighter future. Whether you’re in marketing, IT, HR, Finance, Sales or any other function within an organization, you have data and you need to figure out how to use tha

Data 127
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

US-based customer support: critical for small business VoIP clients

IT Toolbox

Although once not considered necessarily a top concern, within the cloud communications industry customer support is fast becoming a differentiating factor, going well beyond the established quotients of coverage, infrastructure and up time. Leaders in the VoIP market are now looking to extend customer support – that means 24/7 - to their flagship products and beyond.

VOIP 156
article thumbnail

Cyber security industry key to solving skills gap

Computer Weekly

In the face of a growing shortage of cyber security skills around the world, the security industry itself needs to do more to attract people

Industry 238
article thumbnail

FBI Deputy Director On Russian Election Influence Ops: “We should have seen this coming”

CTOvision

The Deputy Director of the FBI, Andrew McCabe, has just said something we should all pay attention to regarding Russian election influence operations. “We sort of should have seen this coming.” No kidding! Many of us did (CTOvision readers had plenty of pontification on this including the sternly titled: Clear And Unambiguous Warning: Cyber Attacks […].

CTO 152
article thumbnail

The troubling lack of focus on securing the IoT

Network World

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device principals that we have been working with for years, particularly enhanced security and privacy. With so many distinct applications, device scope and diversity represent a unique security challenge that so far has not been met.

Security 133
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Making sense of the world, eat me

IT Toolbox

Continuing on with this tasty subject I mentioned last time that as machines run on electricity they don't need to taste things. Something struck my brain cells after that and I remembered. We also run on electricity. Our thoughts, our nervous signals and a whole lot of other stuff runs on electrochemical interactions.

156
156
article thumbnail

Much GDPR prep is a waste of time, warns PwC

Computer Weekly

Many organisations are not paying enough attention to technology in their preparations for the General Data Protection Regulation and risk compliance failure

Data 218
article thumbnail

Track the Correct Service Desk Metrics for the Right Reasons

CTOvision

You have successfully created an array of reports and figures that can tell you everything about every aspect of every call ever logged for your organization’s service issues. You now have a great deal of information that will take time from what you should be focusing on: the customer. I've noticed that there's a tendency […].

Report 151
article thumbnail

Your Next Computer. in the Cloud ?

Fountainhead

For years, the “virtual PC” has been the dream of users and corporations alike. After all, why do millions of us lug around a laptop with our Windows desktop stuck to it? Why do we risk theft, loss or damage to valuable data when our entire workspace — and data – could instead live in the cloud and be accessed from anywhere by any of our devices…. [ This is a re-post of my Blog on Wired Innovation Insights.

Cloud 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SAP HCM - Stuck in the middle again

IT Toolbox

SAP dropped $3.4 billion on human capital management software company SuccessFactors in late 2011, at the time they were one of the biggest vendors of a SaaS HCM solution. Human resources features are starting to appear in SAP's next-generation ERP system, S/4HANA - that's creating confusion for existing and prospective SAP customers.

SAP 152
article thumbnail

Role models best way to increase diversity, says Most Influential Woman in UK IT 2017 Sherry Coutu

Computer Weekly

The winner of Computer Weekly’s 2017 Most Influential Woman in UK IT award, Sherry Coutu, says role models are the best way of addressing the diversity imbalance in the technology industry

Industry 201
article thumbnail

Trusted Sites Report

Mick's IT Blog

Recently, we had to add a new trusted site to the trusted sites GPO. As you may know, if the GPO contains a lot of trusted sites, it can be cumbersome to determine if a site is in there. I wrote this PowerShell script that will generate a report listing all trusted sites. This script will grab both user and local machine based trusted sites. It separates those in the report.

Report 99
article thumbnail

How Big is the Hosted Desktop (DaaS) Market - Part 2

Fountainhead

Originally published on Citrix Blogs As I mentioned in Part 1 of this Blog, “how big is the cloud-hosted desktop market?” is still the top inquiry I get from our Citrix Service Provider ( CSP ) partners looking to enter the market. In that first post I outlined some of the approaches I take to describe the growing size of this market. In this post, I want to offer additional data that Service Providers can use when justifying investments of IP and capital for ventures into cloud-hosted desktops.

SMB 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Preparation of the Enterprise for the Digital Transformation (ii)

IT Toolbox

continuing from. The Preparation of the Enterprise for the Digital Transformation. 4). Do model the target Enterprise around services (SOA, APIs, web services, even microservices.

SOA 148
article thumbnail

Computer Weekly announces the Most Influential Women in UK IT 2017

Computer Weekly

Computer Weekly has announced the list for Most Influential Women in UK IT 2017, including this year’s winner Sherry Coutu

243
243
article thumbnail

SCCM ConfigMgr CB Training Led by Wally Mead

Anoop

SCCM (ConfigMgr) is 25 years old. And Wally Mead also started working with Microsoft in the year of 1992. He has been lead evangelist for SMS/SCCM/ConfigMgr IT Pro community for 25 years. In this post, we will see the details about SCCM ConfigMgr CB Training Led by Wally Mead. This is a short post where you […]. The post SCCM ConfigMgr CB Training Led by Wally Mead appeared first on Anoops.

article thumbnail

How Big is the Hosted Desktop (DaaS) Market - Part 1

Fountainhead

Originally published on Citrix Blogs Without question, “How big is the hosted desktop market” is the top inquiry I get from our Citrix Service Provider ( CSP ) partners. Our thousands of global partners are constantly making investments in infrastructure, marketing, business operations and sales. And frequently they are going to their board (and sometimes to external investors) for funding to chase the high-margin, high-value hosted desktop market.

Licensing 100
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Here's What Businesses Need to Know About UC and APIs

IT Toolbox

Unified communications (UC) is in an interesting phase of development, transforming from simply a workplace collaboration platform into the nexus for powerful business software integrations. Key to that evolutionary step are application programming interfaces (APIs).

article thumbnail

Cyber threat to payment industry demands multi-layer defence

Computer Weekly

No industry is immune to cyber attack, and Mastercard believes the threat to the payment card industry demands a multi-layered approach, with a new fraud prediction tool in its arsenal

Industry 193
article thumbnail

Get More Details about Windows 10 Accelerator Program

Anoop

Most of the organization are getting ready for Windows 10 migrations. IT pros like us are under intense pressure to migrate to Windows 10. Migrating to new Windows 10 to tens of thousands of devices is not very easy task. The Windows 10 migration can be slow, expensive and time-consuming. In this post, we will […]. The post Get More Details about Windows 10 Accelerator Program appeared first on Anoops.

article thumbnail

Time to rethink how much customer data you store

Network World

Does the company you work for (or own) retain data on customers? Odds are pretty high that it does, at least in some form (often fairly extensively). It's often attractive to do so for both marketing and functionality purposes. But here's the thing, storing that data is probably a bad business decision. One that could cost your business a huge amount of money and, even worse, potential loss of trust by your most valuable customers.

Data 88
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.