Sat.Oct 22, 2016 - Fri.Oct 28, 2016

article thumbnail

The AT&T Merger With Time Warner Opens A New Chapter For The Telco Industry

Forrester IT

With Laura Koetzle. On October 22, 2016, AT&T announced its intention to acquire Time Warner for an equity value of $85.4 billion. The deal is essentially about the combination of quality content and content distribution, as it transforms AT&T into a content producer and owner -- rather than just a distributor of content. Many telecom regulators restrict revenue growth opportunities for telcos in highly regulated telco markets.

Industry 289
article thumbnail

The Shifting Cyber Attack Target Set And Why It Matters To The Mid-Sized Business

CTOvision

Bob Gourley. For years now the firms with the most to lose by cyber crime have been investing in cyber defense technologies, techniques and procedures designed to mitigate threats. Motivation do enhance defenses has largely been directly correlated to the potential for loss. Resources put on cybersecurity and threat mitigation has been correlated to size of a business.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SDN trailblazer Big Switch Networks launches in UK

Computer Weekly

Having established a base of paying customers through a key partnership with Dell, SDN supplier Big Switch Networks is opening its first European offices and gunning for Cisco’s ACI business

Network 210
article thumbnail

DuPont Fabros Buys Former Printing Plant for Its First Toronto Data Center

Data Center Knowledge

Site will become data center REIT’s first international location Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Videoconferencing Delays Cost You Millions

Forrester IT

Videoconferencing technology has the awesome power to connect teams separated by oceans or internal silos, but it's still not frictionless. Technical difficulties that delay videoconferences account for millions of dollars a year in lost productivity. In our brief Start Your Videoconferences On Time , we take a look at some best practices to avoid productivity loss.

Video 273
article thumbnail

DDoS Attacks: What Happened And What We Should Do About It

CTOvision

Bob Gourley. The security community has been watching the DDoS threat grow to incredible levels. DDoS attacks are up 75% over last year. Over 30% of attacks reach sustained peaks of over 10 Gbps, an amount that will swamp most every business user. Some very large attacks have gone as high as 600 Gbps, a size that is overwhelming to the largest infrastructure providers.

Internet 249

More Trending

article thumbnail

The Era of the Smart Data Center

Data Center Knowledge

Businesses are rethinking their needs and are looking for solutions that use the latest virtualization technologies in an environment they can trust. Carrier-neutral edge colocation is emerging as the preferred solution. Read More.

article thumbnail

The Dark Side Of Cloud Computing

The Accidental Successful CIO

CIOs need to understand that cloud computing is changing Image Credit: Cory M. Grenier. I suspect that by now just like most CIOs you have heard a great deal about the promises offered by cloud computing and if you have not already taken the plunge and dived into cloud computing, then at least you have a plan to do so in the near future because you understand the importance of information technology.

Cloud 147
article thumbnail

Machine Learning May Be The Solution To Enterprise Security Woes

CTOvision

Bob Gourley. For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of millions of logins for their company’s services are freely available on hacker forums.

article thumbnail

Dyn reveals details of complex and sophisticated IoT botnet attack

Computer Weekly

DNS services provider Dyn, which was the victim of a large-scale DDoS attack perpetrated by an IoT botnet earlier in October, discusses details of its experience

204
204
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

These Data Center Providers Use Most Renewable Energy

Data Center Knowledge

Digital Realty and Equinix lead the pack of data center providers but still use much less renewable energy than some hardware and cloud giants. Read More.

article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

Handbook 167
article thumbnail

15 under 15: Rising stars in cybersecurity

CTOvision

Bob Gourley. The Christian Science Monitor's Passcode traveled across the country to meet 15 kids under 15 years old who are fighting off the growing threat of cyberattacks. They are part of a new generation of tinkerers and boundary pushers – many still lugging school backpacks and wearing braces – who are mastering the numerical codes that underpin the digital world.

Travel 233
article thumbnail

Interview: How Swedish bank prepared robot for customer services

Computer Weekly

SEB bank is currently integrating artificial intelligence into its customer services channels, following an internal trial of the technology

Banking 211
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How to Leverage AWS as a Secondary Data Center

Data Center Knowledge

For many enterprises today, running a standalone traditional data center doesn’t cut it. Customers and business partners demand and expect externally-facing applications to be available and performing around the clock. Read More.

article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Security 165
article thumbnail

5 New Tech Inventions

CTOvision

Michael Johnson. This video has five parts, which are overviews of really cool technologies. Each provide a glimpse of tech that can make a difference in how you leverage capabilities to get things done. This includes a space-saving 3D printer, a device that transforms your TV into a touch enabled device, plus a new easy way to browse the internet, completely anonymously.

3D 232
article thumbnail

How collaboration will feature in the future of digital supermarkets

Computer Weekly

Morrisons’ new deal with Ocado has helped the supermarket chain expand its online capabilities, but will we see more collaboration between retailers and digital service providers in the future?

Retail 190
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Storage Innovations Spur a Second Look at Cloud and On-Premise Options

Data Center Knowledge

Recent changes in the storage market have weakened the argument that storage in the public cloud is the only cost-effective option. Read More.

Storage 184
article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Groups 131
article thumbnail

What Business Users Should Do To Mitigate DDoS Threats

CTOvision

Bob Gourley. Businesses have long known of the threats of DDoS to their operation, and the security community has been watching this threat evolve to the point where we all need to take collective action to prevent attack. Businesses of every size need to know what devices you have and what you have them for. This gets hard but must be done if you are to optimize your IT.

Firewall 225
article thumbnail

Red Cross data breach shows security is still not a priority

Computer Weekly

The Australian Red Cross Blood Service has responded quickly to a breach of 550,000 donor details, but security commentators say the incident shows security is still not a priority for many organisations

Security 188
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What MSPs Should Learn from the Dyn Internet Attack

Data Center Knowledge

The Dyn network outage, which was made possible by default login credentials on IoT devices, underscores the responsibility of MSPs to understand and fix security risks like these for their users. Read More.

Internet 166
article thumbnail

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact.

129
129
article thumbnail

How Connected-Cars Could Cost You Your Privacy

CTOvision

Jeremy Sutter. Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile, and they could be on the road within a decade. They present many exciting opportunities, but also new threats to our privacy and security. In this post, we'll dive into exactly what lies behind the connected car concept and what it means for privacy.

Internet 218
article thumbnail

Apple iCloud and Gmail hacker gets 18 months in jail

Computer Weekly

A US man is given a sentence of 18 months in jail for hacking into celebrity iCloud and Gmail accounts after investigators failed to find a link with the leak of celebrity nude photos online in 2014

Apple 188
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Alphabet’s Big Bets Shift to Cloud, Away From Moonshots

Data Center Knowledge

Business software will replace burrito-carrying drones and super-fast internet service as key area of focus Read More.

Cloud 194
article thumbnail

How to connect Dropbox to WPS Office on a supported Chromebook

Tech Republic Cloud

If you need to easily work with documents locally and in the cloud on your Chromebook, see how to do so with a Google Play supported device, WPS Office, and Dropbox.

How To 132
article thumbnail

Why Measure the Value of an Organization’s Information?

CTOvision

Dennis D. McDonald. Information value. CTOvision.com recently posted an interesting article by John Mancini titled Putting a value on your company information. In it Mancini says, it is imperative that standard models to measure information are introduced as a matter of urgency in this digital age. But two major hurdles stand in the way: how to measure the value of information you don’t control and understanding that it can only realistically be measured in the context in which it is being used.

Data 218
article thumbnail

Dyn DDoS attack highlights vulnerability of global internet infrastructure

Computer Weekly

Last week’s DDoS attack on DNS firm Dyn has highlighted both the vulnerability of the world’s internet infrastructure, and the dangers of leaving internet of things devices unsecured

Internet 188
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.