Sat.Aug 19, 2017 - Fri.Aug 25, 2017

Big Data Management: A Few Pointers First-Timers Should Remember


There is no doubt about it, data is becoming vital for small and large companies. One of the major reasons data is becoming more important probably deals with its power to save money and optimize performance. Still, to many, using big data is pretty new, so it might be a good idea to consider the following tips […]. Big Data Cloud Computing CTO News Business Tech/Internet Technology Leadership

Security professionals name top causes of breaches

Computer Weekly

Security professionals have named the top reasons for successful cyber attacks, which are affecting more than half of organisations

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The cloud could drive open source out of the enterprise

David Linthicum

For a decade, there’s a question that just won’t go away: Is the cloud killing open source? It still strikes up some emotions. Open source software has been the backbone of enterprise platforms for a long time—remember the LAMP stack of Linux, Apache, MySQL, and PHP/Perl? But consuming open source software via the cloud could change open source’s enterprise footprint. [ Are you ready for the container invasion? Learn how to get started with Kubernetes.

The 12 IT practices CIO says you should not use: Stories, Charge-backs (ii)

IT Toolbox

In 12 'best practices' IT should avoid at all costs , Bob Lewis, CIO columnist, says that "industry best practices are sure to sink your chances of IT success". What makes IT organizations fail? Often, it’s the adoption of what’s described as “industry

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Are you ready for state-sponsored zombie malware attacks?


On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

How AI can aid, not replace, humans in recruitment

Computer Weekly

Artificial intelligence is gaining prominence in a number of industries and brings advantages and disadvantages in the field of recruitment

More Trending

What is DeOS?

IT Toolbox

In these days of organized cyber attacks, you need security companies to be thinking one step ahead of the hackers, and now Cisco has come out with a new acronym to keep us awake at nights. No longer is DDoS (Distributed Denial of Service) our only worry, Cisco suggests that we need to think about Destruction Of Service (DeOS) attacks

FBI vs Apple: Policy Analysis


Editor’s note: This is the second in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg bg Despite foreboding tales of doom associated with the potential outcome on each […]. CTO Cyber Security News

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Uptime in Space and Under the Sea

Data Center Knowledge

How computers deployed in space and on the ocean floor may end up improving your bank's server farm. Read More. Design Featured Hardware Hewlett Packard Enterprise Microsoft Power and Cooling

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

3 Causes for Poor VoIP Call Quality and How to Fix Them

IT Toolbox

Voice over IP (VoIP) can help businesses save money on phone services by using the Internet as its medium rather than traditional phone lines. However, cost savings aren’t the only reason many businesses have moved to VoIP. This technology makes setup as simple as plugging a VoIP phone into a network jack. Not only that, but the myriad apps available for mobile phones and computers make it

VOIP 148

How to improve IoT security

Network World

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks.

Top UK directors lack training to deal with cyber attacks

Computer Weekly

The UK’s top firms and charities urgently need to do more to protect themselves from online threats, according to a government-backed audit

Harvey: Hurricane Preparation Tips for Data Center Managers

Data Center Knowledge

Here are some essential steps data center crews should take before, during, and after an extreme-weather event Read More. Featured How to… Manage Uptime

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. To help them achieve this goal, software emerged on the market called mobile device management (MDM). Rather than review specific MDM tools, however, this article

Connected cars have an ‘indefensible’ security vulnerability

Network World

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.

Business confidence in managing digital threats low, survey shows

Computer Weekly

Business digital transformation and cyber threats have outpaced enterprise security capacity, a survey has revealed

Survey 170

Apple Said to Be Mulling Iowa Data Center

Data Center Knowledge

Company would join Google, Facebook, Microsoft, who have data centers in Iowa Read More. Apple North America

Apple 197

Machine Learning for Builders: Tools, Trends, and Truths

Speaker: Rob De Feo, Startup Advocate at Amazon Web Services

Machine learning techniques are being applied to every industry, leveraging an increasing amount of data and ever faster compute. But that doesn’t mean machine learning techniques are a perfect fit for every situation (yet). So how can a startup harness machine learning for its own set of unique problems and solutions, and does it require a warehouse filled with PhDs to pull it off?

The LAN: A History of Network Operating Systems Part 3

IT Toolbox

Even though the earliest LANs were of this genre, by 1989 it appeared that they were on the way out. By 1992, however, new life had been breathed into peer-to-peer networking by both Novell and Microsoft, along with the popularity of Artisoft's LANtastic. We will take a close look at peer-to-peer LANs at a deeper level in some future posts

Building an Awesome CLI App in Go Oscon 2017


A workshop written and delivered by Steve Francia and Ashley McNamara at OSCON 2017. outlining the techniques, principles, and libraries you need to create user-friendly command-line interfaces and command suites before walking you through building your own app. Along the way, you’ll cover everything from how to design and build commands to working with and parsing flags, config files and remote config systems, and how to work with environment variables and 12-factor apps

How To 109

Most firms don’t test, but rely on supplier to spec storage, finds survey

Computer Weekly

Most customers simply trust storage suppliers and resellers to recommend the right product for their workloads, while a small minority test their needs and involve application owners

Survey 167

This is Europe’s Hottest Emerging Data Center Market

Data Center Knowledge

Cloud and content giants look south, as new submarine cables come online and demand for digital content spikes in Africa, Middle East, and Asia Read More. Colocation Europe Featured Interxion

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Seven Tricks for Better ERP Automation

IT Toolbox

ERP serves as a critical nerve center for most businesses that use them. This means that efficiency with an ERP system often directly translates into business efficiency. And that, in turn, drives competitiveness. One place where businesses frequently cede competitiveness to their nimble rivals is around the area of ERP automation. Poorly designed automation can become a subtle

System 138

This Linux tool could improve the security of IoT devices

Network World

The first rule of building a secure and feature-rich ecosystem is software management — push and pull software updates and software discovery through an app store mechanism from a trusted source. In the go-to-market IoT race, though, that often doesn’t happen.

Linux 101

Future of dark web markets not yet in question, says analyst

Computer Weekly

AlphaBay and Hansa shutdowns are unlikely to jeopardise the future of dark web markets, according to a security analyst

DCK Investor Edge: Why CoreSite is REIT Royalty

Data Center Knowledge

A new research report crowns CoreSite Realty the top REIT for total returns for the past three and five-year periods. Read More. Business Colocation CoreSite Investing

Microservices: The Dark Side

Speaker: Prem Chandrasekaran

A few years ago, Barclays embarked on a journey to migrate its legacy services to a modern tech stack with the objective of achieving a high level of scale, resilience, and reliability. During the incremental, iterative move towards an ecosystem of focused, distributed services, it’s fair to say that the company discovered the challenges of distributing objects. Join us for an episode you can’t miss if you’re finding it a lot harder to architect in practice than in theory, and learn how you can shed light on the dark side of microservices.

The Technological Era and the New Breed of Scammers

IT Toolbox

In this article, we will take a glance at some of the biggest cyber scams out there and how you can protect yourself from being tricked by these rascals


Tips to  Snapchat spying on someone’s account

Doctor Chaos

Snapchat is fast becoming one of the most popular and most used apps these days. The popularity of the app will only grow rather than decreasing. Teenagers are crazy after the app and its maximum users when compared to the adults. They send pictures, drawings, videos and such in addition to sending the regular messages […]. Wireless mobile

Video 100

Infosys CEO resigns amid public criticism from a founder

Computer Weekly

Infosys CEO Vishal Sikka steps down, with the company blaming criticism from a company founder for his decision

Digital Realty to Build Mega-Data Center in RagingWire’s Texas Backyard

Data Center Knowledge

Giant plans 150MW campus in Garland Read More. Colocation Digital Realty North America

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.