Sat.May 06, 2017 - Fri.May 12, 2017

article thumbnail

AI Is Not An Exception – Technology Has Always Taken Jobs

Forrester IT

Yes, AI will take jobs away from many workers - our relatives, friends, and neighbors. So too have all technologies created throughout human history. We invent things to make things easier and the impossible possible. The invention of the wheel made transport easier. Gutenberg's printing press put lots of monk's out of business. The chainsaw saw a reduction in the number of sawyers (lumberjacks).

article thumbnail

Why smart cities need to become smarter about technology

Computer Weekly

Cities are experimenting with smarter ways to use technologies to improve the life of citizens, but their projects are fragmented. Is there a better approach?

273
273
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Effective Risk Management in the Data Center

Data Center Knowledge

A standards-based risk management methodology can help prioritize risks and prepare for a data center or critical environments audit. Where to start? Read More.

article thumbnail

Driving Digital: The CIO's Playbook

Social, Agile and Transformation

Thanks to Landmark Ventures and Anthony Juliano for a great CIO Summit last week and for giving me a speaking spot for Driving Digital: The CIO's Playbook. If you weren't there - here's what I covered Don't let your business fall off the disruption cliff Digital disruption is affecting many industries 10 ways to improve IT culture - I spoke about two Become a data driven organization.

Industry 188
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why You Are Getting Disrupted

Forrester IT

The overriding theme of every disruption story I've ever heard is that firms thought they had more time than they did. So, I've been pondering the why. We can see disruption happening all around us, but why is it so difficult to get out in front of it? Then I slogged my way through Ray Kurzweil's Law Of Accelerating Returns and it hit me. Digital disruption is about the clash between exponential change and our brain's wanting things to be linear.

article thumbnail

Edward Snowden: Closed public cloud platforms risk "disempowering" enterprises

Computer Weekly

NSA whistleblower tells OpenStack Summit, via video link, that investing in closed public cloud platforms can lead to users parting with more than just their money

Cloud 233

More Trending

article thumbnail

DCK Investor Edge: Why Money is Pouring Into Data Centers

Data Center Knowledge

Data centers outperform the rest of the real estate sector, attracting institutional and private equity investors. Bonus: REIT Investing 101. Read More.

article thumbnail

Massive Ransomware Outbreak Highlights Need For A Digital Extortion Decision Tree

Forrester IT

5/12/2017 might be another day of cyber-infamy based on malware as hospitals and critical infrastructure providers are locked out of their machines due to what appears to be a new variant of ransomware dubbed WannaCry spreading through corporate networks. Like the ransomware outbreaks in mid-2016 here in the US, NHS hospitals are experiencing patient care issues as a result of the malware, with some shutdown completely as of 11:37 AM Eastern time.

SMB 302
article thumbnail

Almost three-quarters of tech workers thinking of leaving UK after Brexit

Computer Weekly

The UK’s decision to leave the European Union has many tech workers in the UK considering a move elsewhere

279
279
article thumbnail

Why Consumerism is Becoming a Top Priority Among CIOs

CTOvision

Rick Delgado. Within the healthcare industry, CIOs have begun to turn towards consumerism for its technological implications and its innovating change in the healthcare industry. By treating patients less like clients and more like consumers, healthcare organizations can increase engagement between medical providers and the patient-consumer. CIOs have recognized that the patients of today are vastly more resourceful than before with sources like WedMD.

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

The 8-Step Guide to Defining Your Logo Design Strategy

IT Toolbox

Since logo are key to a company's success, the design process is best left to professionals, but that doesn?t mean you should show up on your designer's doorstep empty-handed.

Strategy 160
article thumbnail

NIST Is Jealous That PCI (Still) Matters More Than It Does

Forrester IT

The summary of the new Executive Order is a bit of a letdown: Government agencies must complete a risk management report within 90 days. The risk report should align with NIST. Outside of those with a risk fetish, this new EO probably isn't that exciting from the perspective of any near-term cybersecurity transformation. That said, there are some aspects worth mentioning: Cybersecurity is now a multi-agency public policy issue driven by the Executive Branch.

Education 296
article thumbnail

Cognitive security is the future, says Martin Kuppinger

Computer Weekly

Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger

Security 192
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Marty Meehan. Delivers 1000s Virtual NICs for Ultimate Scalability with the Lowest Possible Latency. Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment.

Software 151
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Should CIOs Learn How To Forgive?

The Accidental Successful CIO

To forgive is divine, but is this something that CIOs should be doing? Image Credit: timlewisnm. Ah, the process of getting older. Each one of us is doing this every day and, with a little luck, we really don’t spent all that much time thinking about it. However, with increasing age comes more time for us to think about all of the things that have happened to us during our lives.

How To 157
article thumbnail

Energy Is Embracing Zero Trust, All Industries Should Too

Forrester IT

I recently heard a segment on WBUR (a public radio station in Boston) on the emergence of microgrids and I was amazed at how much the concept of microgrids closely aligned with the concept of microperimeters within our Zero Trust model of information security. Zero Trust is a conceptual and architectural model for how security teams should redesign networks into secure microperimeters, increase data security through obfuscation techniques, limit the risks associated with excessive user privilege

Energy 267
article thumbnail

Dell EMC World brings “bigger, faster, stronger” storage upgrades

Computer Weekly

All-flash additions plus hardware and software upgrades see platform refreshes across all Dell EMC storage offerings, as well as design changes in Isilon and Xtremio

Dell 189
article thumbnail

Video: Inside the New Facebook Data Center in Texas

Data Center Knowledge

First building on what will eventually become a sprawling server farm campus is now online Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

9 best practices to improve security in industrial IoT

Tech Republic Security

Dell EMC's senior product manager for IoT security, Rohan Kotian, hosted a presentation at Dell EMC World explaining how industrial enterprises can protect their IoT deployments.

Industry 167
article thumbnail

5 Reasons Why Your Business Needs ERP Software

IT Toolbox

Enterprise resource planning (ERP) solutions have been helping businesses to achieve their goals and objectives for a number of years. Ever since the early '90s, the ERP software industry began to take off to fill in a number of gaps and problems facing businesses from human resources to supply chain management. That rule hasn't changed. To this day, ERP software is the No.

Software 140
article thumbnail

Blockchain economy on the horizon

Computer Weekly

Blockchain technologies will enable many new and disruptive business models than the internet itself, an expert predicts

Internet 222
article thumbnail

Extortionists Mount Global Hacking Attack Seeking Ransom

Data Center Knowledge

‘Major cyber attack’ on UK’s National Health Service; ransomware breach also targets Spanish, Russian companies Read More.

Company 189
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

4 questions businesses should be asking about cybersecurity attacks

Tech Republic Security

At the 2017 Dell EMC World conference, RSA senior director of advanced cyber defense, Peter Tran, walked through examples of real-world IT questions and how they could be answered.

Dell 158
article thumbnail

Net neutrality: The smart person's guide

Tech Republic Cloud

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.

.Net 160
article thumbnail

Aruba Atmosphere: Businesses at odds with IT departments over IoT

Computer Weekly

A survey of business and IT leaders conducted for wireless networking supplier Aruba has found a lack of cohesion between departments is affecting IoT usage, confidence levels and security across Emea

Wireless 176
article thumbnail

Cyxtera Puts a Fresh Spin on CenturyLink’s Former Data Center Empire

Data Center Knowledge

Colo veteran Manny Medina’s new firm attempts to carve out a niche in a highly competitive space. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Enterprise Architecture has to go down to the level of detail stakeholders need (i)

IT Toolbox

Martin Owen, Vice President of Product Management at ERwin, posts on LinkedIn that. " Enterprise Architecture is arguably one of those jobs that isn't ever finished. But I'd argue that over analysis is just as damaging to a business as the opposite.

article thumbnail

6 questions every business must ask about big data architecture

Tech Republic Data Center

At the 2017 Dell EMC World conference, Dell EMC systems engineer Cory Minton explained how IT leaders can better think through their big data deployments.

Big Data 149
article thumbnail

Allianz researchers working with car makers on cyber security

Computer Weekly

Allianz Germany is working with the local car manufacturing industry to highlight the vulnerabilities in the electronics systems of vehicles that can be exploited by criminals

Research 174
article thumbnail

The Hidden Bias in Machines

Data Center Knowledge

As image recognition technology continues to be refined, developers need to be conscious of the images they use in their solutions and the implications it will have on their technology, and in the case of Google, society. Read More.

Google 149
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.