Sat.Aug 05, 2017 - Fri.Aug 11, 2017

article thumbnail

Forrester warns CIOs of cloud market consolidation risks and rewards

Computer Weekly

Market watcher's latest cloud report outlines how the consolidation of the cloud software and infrastructure market can mean good and bad news for enterprises

Cloud 253
article thumbnail

How to Prepare Tech Leaders in Your Company

CTOvision

A survey by the United States Department of Labor unveiled that in America, an average individual born in the late 50s or early 60s had to hunt for a job virtually 18 times till they attained the age of 48. This only signals that the search of employment is obligatory. With many job applicants today, […].

Company 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How ERP Can Cut Business Costs

IT Toolbox

The business of business is generating profits. That's the bottom line. Both large corporations and small, family-owned businesses are always on the lookout for ways to cut operational costs while improving efficiency. Getting more work done for lower costs means business growth and improved profits.

213
213
article thumbnail

DCK Investor Edge: Here’s How Data Center REITs Did in the First Half of 2017

Data Center Knowledge

Hyper-scale leasing has cooled, but data center REITs continue outperforming the sector, driven by a new normal of strong enterprise and cloud leasing, and a wave of M&A activity. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK mulls hefty fines for CNI providers with poor cyber security

Computer Weekly

The UK is considering the same hefty fines for critical national infrastructure (CNI) providers with poor cyber security as those failing to protect the personal data of UK citizens

Security 193
article thumbnail

Three Ways to Generate Profit With the Data You Already Have By Andrew Wells and Kathy Chiang

CTOvision

Editor's note: This article captures insights from Andrew Wells and Kathy Chiang, co-authors of the new book, Monetizing Your Data: A Guide to Turning Data into Profit-Driving Strategies and Solutions. -bg Build it and they will come. That is the view many organizations maintain about their data lakes and data warehouses. Companies are rapidly investing in […].

Data 157

More Trending

article thumbnail

SpaceX Rocket to Fire Hewlett Packard Supercomputer Into Orbit

Data Center Knowledge

NASA-approved computer system designed to last a year in space; mission to Mars not possible without longer-lasting computers. Read More.

System 189
article thumbnail

Cultural change a critical but neglected element of IoT security

Computer Weekly

Managing how people within an enterprise deal with data is a vital element of shoring up security around the internet of things, says Vodafone

Security 205
article thumbnail

FBI vs Apple: Context from a cyber law perspective

CTOvision

Editor’s note: This is the first in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg In August 2017, Apple CEO Tim Cook declared “we obey the laws […].

Apple 154
article thumbnail

The Storied Trail to Swagger 3.0.0

IT Toolbox

It is now available and in the wild from the Open API Initiative (OAI) which is operating under the wing of the Linux Foundation as an open standard that will be updated and maintained on GitHub going forward. This is a bright moment for the Swagger standard and includes some major overhauls to the specification.

Linux 179
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

IBM Says It Has Beat Facebook’s AI Server Scaling Record

Data Center Knowledge

Researchers design a way to manage massive GPU clusters while keeping network bottlenecks to a minimum. Read More.

IBM 204
article thumbnail

Gov.uk Verify fails to meet key business case targets

Computer Weekly

Government’s controversial online identity system has missed important milestones that formed the basis of its original 2015 business case

Meeting 202
article thumbnail

O’Reilly Velocity Conference NYC 1-4 Oct 2017

CTOvision

The O'Reilly Velocity Conference is the best place on the planet for web ops and systems engineering professionals like you to learn from your peers, exchange ideas with experts, and share best practices and lessons learned for handling modern systems and applications. Register Today for O'Reilly Velocity Conference New York, 2017. Save 20% with code: […].

article thumbnail

Ubuiquiti is On Fire, I Tellya

IT Toolbox

Ah Ubiquiti… I recently attended Mobility Field Day 2 , and Ubiquiti was NOT there. Yet, Ubiquiti was the one vendor that was talked about more than any other along the lines of “It would be great to hear them present their own story in their own words” when us delegates chatted about such things.

Mobile 168
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook Thought to Be Behind New Ohio Data Center

Data Center Knowledge

According to the Columbus Dispatch, Facebook is behind a planned $750 million data center to be located in New Albany, Ohio. The newspaper cites “sources familiar with the plans,” who have indicated the social network giant will formally announce plans for the project next week. In.

article thumbnail

Russian cyber espionage group targeting hotel Wi-Fi

Computer Weekly

A Russian cyber espionage group is targeting hotel Wi-Fi networks to carry out malware infections and potentially steal credentials, researchers warn

Hotels 190
article thumbnail

IoT-device swarm intelligence: Think about security before it's too late

Tech Republic Security

Researchers warn that security is historically an afterthought. With everything from thermostats to drones likely belonging to IoT-device swarms in the near future, that's not wise.

Security 148
article thumbnail

Top Five Benefits a Quality Management System Can Offer Your Company

IT Toolbox

Quality management system has become something of a buzz term, generating all kinds of interest over the past decade. With more companies offering a quality management system and department than ever before, it’s only natural to wonder what the top benefits are in installing one of these systems.

System 165
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How A CIO Can Deal With Religion In The Workplace

The Accidental Successful CIO

CIOs need to balance religion when it comes to the office Image Credit: murdelta. Of all of the issues including the importance of information technology that the person with the CIO job has to deal with in the workplace, it’s possible that religion might be the most difficult. The reason for this is simply because there are so many different religions out there.

Survey 127
article thumbnail

UK calls for smart car cyber protection

Computer Weekly

A new generation of internet-connected cars will have to be better protected from cyber attackers, under tough new UK government guidance

Internet 195
article thumbnail

How to Rapidly Plan Digital Products and bring Amazing MVPs to Market Smarter and Faster

Social, Agile and Transformation

When it comes to planning new digital products, I find many organizations fall into one of two camps. "Analysis Paralysis" Camp - These organizations are slow to endorse new product ideas. They send sponsors and product managers back for more and more market research, industry analysis, financial forecasting, and other activities to build up organizational confidence that they are embarking.

Analysis 123
article thumbnail

The Era of Mobile Apps Are Changing Small Business as We Know It

IT Toolbox

Mobile phone technology has gotten to the point that a survey has shown that Americans now spend more time looking at their phones than they do watching television. Out of all that mobile phone time, nearly 90 percent of it is devoted to using applications.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

China sends 'unbreakable code' from quantum satellite to Earth

Tech Republic Security

A new satellite has been able to transmit 'unbreakable' code in an effort to build 'hack-proof' communications, according to Chinese state media.

Media 158
article thumbnail

HSBC uses IBM to automate the processing of 100 million document pages

Computer Weekly

In another instance of banks adopting automation to lower costs and drive productivity, HSBC uses IBM analytics technology to cut down on its paper trail

IBM 181
article thumbnail

Security Researchers Inject DNA with Malware — But Don’t Panic Yet

Data Center Knowledge

Researchers at the University of Washington in Seattle call the hack the first DNA-based exploit of a computer system. Read More.

Research 146
article thumbnail

Artificial intelligence is creating a gap in customer-facing CRM

IT Toolbox

What are the limits to machine learning in CRM? Much is already being done within the CRM universe to improve the experience of users of CRM systems, particularly in automation of the activities of sales teams within the CRM interface.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AWS Snowball Edge vs. Azure Stack: What on-premises public cloud means for your data center

Tech Republic Data Center

Cloud customers wanting to exit the business of managing data centers run into road blocks presented by the edge. Here's how two solutions by leading public cloud vendors stack up.

article thumbnail

NIS Directive plans show UK is serious about tackling cyber threats

Computer Weekly

UK government plans to implement the EU’s Network and Information Systems (NIS) Directive have been welcomed for assuring its commitment to cyber defence post-Brexit

article thumbnail

HPE Deal Big Switch’s Latest Step in Becoming VMware of Data Center Networks

Data Center Knowledge

The startup wants to bring hyper-scale network design to the masses, and enterprise-giant partnerships are key to achieving that. Read More.

Network 132
article thumbnail

Understanding Collaboration - Disrupt, or be Disrupted

IT Toolbox

There are many scenarios to consider for collaboration, and I’ve been writing about this lately, both for internal use cases among workers, and external use cases to support end customers. A big challenge facing decision-makers is building a fence around collaboration so everyone understands what’s involved.

Exercises 140
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.