Sat.May 21, 2016 - Fri.May 27, 2016

article thumbnail

Forrester’s Security & Risk Research Spotlight - Governance, Risk And Compliance

Forrester IT

Crises don't discriminate. Whether they are economic, geopolitical, technological or environmental, you can expect to have to deal with a major one soon. And how well you minimize the impact of that crisis is the difference between achieving your business objectives, and completely missing them, disappointing your customers, employees, partners, and shareholders in the process.

article thumbnail

New Zealand reaps fibre benefits as copper-choked UK risks digital exclusion

Computer Weekly

Telecoms and technology consultant, futurist and ex-BT CTO Peter Cochrane highlights the urgency for the UK to consider FTTP if it wants to maintain its place in the world economy

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Cognitio, the World Bank and Nlyte 9 June in an Examination of Data Center Optimization Strategies and Best Practices

CTOvision

Bob Gourley. On 9 June 2016 Cognitio and Nlyte are hosting a data center optimization leadership breakfast that will feature a moderated exchange of real world lessons learned and best practices. Hear from Frank Butler of The World Bank on how he and his team optimized and consolidated their data centers resulting in getting even more out of their operations.

article thumbnail

How UC Supports the Needs of Remote Workers

IT Toolbox

Previous posts in this series have focused on the needs of various job functions inside the business, and that’s the natural starting point when considering UC. They will account for the majority of activity, both in terms of utilizing UC applications and bandwidth consumption on your network.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

My Mobile Mind Shift Acceleration

Forrester IT

My Mobile Mind Shift (MMS) happened this year! What's interesting about this revelation is that I've been working in the smartphone industry for more than 10 years now. If that's how long it took me, and I work in the industry, how long is it going to take the rest of the world? Not much longer, I expect. I used to work for BlackBerry, so I was involved with early smartphones.

Mobile 199
article thumbnail

Interview: Kate Johnson, chief commercial officer at GE Digital, on digitising manufacturing

Computer Weekly

GE Digital’s CCO is driving service revenue growth through the commercialisation of Predix, the company’s big data and analytics software platform, as it seeks to exploit the industrial internet of things

Big Data 179

More Trending

article thumbnail

Do You Need a New ERP Process Control System?

IT Toolbox

Process manufacturing has special requirements and until recently you couldn't get the ERP system you needed without a lot of customization. This is changing as vendors become more attuned to the special needs of process control manufacturing.

System 167
article thumbnail

Is "Mobile Approval" An Oxymoron?

Forrester IT

I've recently been studying what a customer-obsessed operating model means for Purchasing functions and the software they use. I've concluded that Purchasing needs to transform its approach to visibility and control, due to the tradical impact that Mobility has on procure-to-pay (P2P) processes. I've been warning ePurchasing software companies for years about the potential impact of Mobility, but while a few visionaries have heard and acted on the message, most are lagging behind.

Mobile 170
article thumbnail

An overview of cloud customer relationship management

Computer Weekly

Businesses are confident about buying customer relationship management (CRM) software as a cloud-based service.

Cloud 219
article thumbnail

Using Big Data to Build Brand Evangelists Within Your Company

CTOvision

Brigg Patten. Any organization, whether big or small, will always struggle with getting public recognition. Marketers want to improve brand awareness, brand equity, and brand humanization to give it a positive impact. The most powerful, loyal and vibrant brand evangelist are the most important people in making a business voice heard. These evangelists are within the corporation walls.

Big Data 152
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Inside the Facebook Data Center in Sweden (Video)

Data Center Knowledge

Bloomberg’s Ashlee Vance tours Facebook’s huge Luleå facility Read More.

article thumbnail

Why the Modern-Day Marketer Shouldn't Ignore CRM

IT Toolbox

Marketing and CRM software are two unlikely friends; never destined to work together but somehow click perfectly in place. However, much like children fighting over a new toy, Sales Reps and Marketers are in a constant tug of war over their organization’s CRM. Why?

Software 160
article thumbnail

What the EU’s new data protection laws mean for UK industry

Computer Weekly

The General Data Protection Regulation, which will come into force on 25 May 2018, could have a big impact on any company in the world that deals with the personal data of EU citizens

Industry 168
article thumbnail

How Can Sysadmins Foster Better Employee Communication?

CTOvision

Tim Mullahy. Sysadmins are now interacting with employees more than ever - so it’s imperative that they learn how to effectively communicate. We’ll explain how they can. As a sysadmin, it can be difficult communicating with non-technical employees. They lack the understanding of your organization’s backend that you have, and if they do have technical knowledge, it’s usually just enough that they can cause some serious damage if left unchecked.

How To 151
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Colocation and the Cloud Killed the Data Center

Data Center Knowledge

As Gartner recommends, don’t relegate your colocation plans to one-off or siloed projects; instead, make them a focus of your broader hybrid cloud and digital business plans. Read More.

article thumbnail

How UC Supports the Needs of Mobile Workers

IT Toolbox

To close out this series , I’m going to focus on the largest and perhaps most important group of end users when it comes to UC. Up to this point, my posts have focused on specific job functions and roles that are found to varying degrees within an SMB.

SMB 157
article thumbnail

UK Government details plans for National Cyber Security Centre

Computer Weekly

The objectives of the UK’s National Cyber Security Centre are to address systemic vulnerabilities, reduce risks, respond to serious incidents and nurture national cyber security capability

Security 167
article thumbnail

Nlyte: For Data Center Infrastructure Management

CTOvision

Research Team. With this post we are initiating coverage of Nlyte. The modern data center is key to so many enterprise missions. Well run data centers make direct contributions to mission. Nlyte makes direct contributions to running your datacenter well. For an overview of Nlyte see the video of the video at this link and embedded below: Nlyte provides Data Center Infrastructure Management (DCIM) and Data Center Service Management Solutions (DCSM).

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Top Three Barriers to Cloud Adoption and What to Do about Them

Data Center Knowledge

By having a fundamental understanding of the provider’s approach to securing your data, you can create a solid “handshake” between the data stored on-premises and data hosted in the cloud. Read More.

Cloud 141
article thumbnail

Blockchain's biggest blocker: Cryptocurrencies!

IT Toolbox

Blockchain on its own, is simply a novel implementation of a bunch of well-established technologies and there is a significant opportunity to expand and contract this pool of technologies to do even more interesting things with blockchain than people realize.

150
150
article thumbnail

Exploding IoT attack surface not an immediate threat to business

Computer Weekly

Companies should take care of the security vulnerablities in their IT infrastructure, cloud back-ends and mobile applications in preparation for the challenges of IoT, says Adrzej Kawalec

Mobile 167
article thumbnail

RiskIQ: Providing actionable data to map your digital attack surface

CTOvision

Research Team. With this post we are initiating coverage of RiskIQ. RiskIQ is all about providing actionable data and high quality insights designed to map your digital attack surface, pinpoint and research threats and reduce overall risk to mission. RiskIQ provides their data in ways easy to put into the context of your business/mission needs which makes it actionable.

Data 151
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Salesforce Names Amazon Its Preferred Cloud Provider

Data Center Knowledge

Salesforce has officially named Amazon Web Services its preferred public cloud infrastructure provider, Amazon announced Wednesday. The announcement follows a report by the Wall Street Journal earlier this month that Salesforce was using AWS for infrastructure that underpins its new Internet of.

Cloud 135
article thumbnail

Proper LAN Testing Equipment Part 2

IT Toolbox

Volumes have been written regarding the damage that electrical transients, surges, and improper grounding techniques can cause to sensitive computer equipment ? including many of my previous posts. Instead of providing details on the subject of power protection per se, I will concentrate this time on test equipment that a typical network administrator might use.

LAN 150
article thumbnail

Cyber attacks on at least three Asian banks share malware links

Computer Weekly

Cyber attacks on banks in Bangladesh, Vietnam and the Philippines used the same malware, which has links to other attacks on banks in the region, reports Symantec

Banking 167
article thumbnail

Don’t get “Theranosed”

Eric D. Brown

Kaiser Fung just posted a blog titled “ Tip of the day: don’t be Theranosed ” where he defines “theranosed” as: Theranos (v): to spin stories that appeal to data while not presenting any data. To be Theranosed is to fall for scammers who tell stories appealing to data but do not present any actual data. This is worse than story time, in which the storyteller starts out with real data but veers off mid-stream into unsubstantiated froth, hoping you and I got carried a

Data 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Metro Optical Networks at the Heart of Internet Exchanges

Data Center Knowledge

Several major trends are driving demand for Internet exchange services as well as the need for high-capacity metro optical data center interconnection into and between IX facilities. Read More.

Internet 133
article thumbnail

Critical Success Factors in ERP

IT Toolbox

There are several factors which are critical in a successful ERP implementation. If you understand these you are well on your way to getting ERP right. Perhaps the most important factor is strong, continuing support from top management. If you don't have that then your chances of succeeding in your project is markedly diminished.

145
145
article thumbnail

DDoS attacks openly on offer for $5 an hour, researchers discover

Computer Weekly

DDoS attacks have become a commodity, and are available openly on professional services online marketplaces for as little as $5 an hour, say security researchers

Research 161
article thumbnail

Windows 10: Windows could not parse or process the unattend answer file for pass [specialize]

Mick's IT Blog

I am in the beginning stages of working on upgrading the firm I work at to Windows 10. Using MDT, The OS would inject drivers and lay down with no issues. Upon the first reboot, it would pop up the following error message: The first thing I did was to look at the Unattend.xml file by opening the task sequence properties >OS Info tab. When I looked under the Specialize >Microsoft-Windows-Shell-Setup, everything looked normal, except for one thing.

Windows 109
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.