Sat.Jun 25, 2016 - Fri.Jul 01, 2016

article thumbnail

Digital Transformation - Part 2: Culture And Organization

Forrester IT

The most digitally aware managers are realizing that cultural and organizational transformation will dominate their agenda for years to come. Emerging business models will not function based on old organizational structures, traditional innovation approaches, and outdated management techniques. In the late 1990s, many traditional businesses mentally leapfrogged by adding a "dotcom" to their name.

Agile 253
article thumbnail

Here’s How Much Energy All US Data Centers Consume

Data Center Knowledge

Second study of its kind in history shows overall growth in data center energy use has flattened Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A New Era of Data Integration with Tamr and 451 Research

CTOvision

Michael Johnson. Data preparation involving the integration, cleansing and enrichment of data so that it is ready for analysis is a tedious and time-consuming process, and it can occupy up to 80% of an analytical development effort. Because it is vital to analytics, given the ‘garbage in garbage out’ maxim, data preparation can’t be circumvented. But it can be made easier, more efficient and indeed faster.

Research 157
article thumbnail

Barclays banks on agile and DevOps to tackle competitive threats in fintech

Computer Weekly

Barclays Bank opens up about how increasing competition in the financial services sector has fuelled its 18-month, company-wide campaign to increase its use of agile and DevOps methodologies

Devops 177
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Let's go back to the future--it is time to start planning now for customer service in 2021

Forrester IT

This a guest post by Meredith Cain , a Research Associate on the Application Development & Delivery (AD&D) team. Let's take trip back to 1989. One of the big movies of that year was "Back to the Future: Part II." One of the great things about that movie was its view of the future--or, because so much has time has passed since the film was released, its view of what our present should be like.

Film 210
article thumbnail

Putting Together Your LAN Troubleshooting Toolkit

IT Toolbox

After seeing this smorgasbord of equipment available for helping you to test and troubleshoot your network, the next logical question is, "Which tools should I purchase for my network?

LAN 140

More Trending

article thumbnail

Most cyber security strategies ignore the way attackers really work

Computer Weekly

Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals

Strategy 176
article thumbnail

Architect Process Agility With BPM Platforms For Digital Business

Forrester IT

Some CIOs and enterprise architecture (EA) pros believe that business process management (BPM) is on the opposite side of agility -- but they don't realize that BPM technology itself is also evolving. Agility-oriented BPM platforms are the foundation of a digital business. I've recently published a report that discusses the four key areas that EA pros must focus on to accelerate digital transformation with BPM.

Agile 186
article thumbnail

Yahoo Wants to Sell Its ‘Chicken Coop’ Data Center Designs

Data Center Knowledge

Trove of 3,000 patents and applications being sold includes data center design innovations Read More.

article thumbnail

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Nate Crocker. Is AI ready for primetime? Not according to Admiral Michael S. Rogers, Commander U.S. CYBER COMMAND. In a recent interview with Charlie Rose, he stated that machine learning showed great promise for cybersecurity, but that the necessary technology was probably five years out. If machine learning is currently so successful in other areas of society, why isn’t it ready for cybersecurity?

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Post-Brexit price hikes hit cloud and datacentre community, as currency fluctuations bite

Computer Weekly

Cloud and datacentre analysts claim IT buyers are already feeling the pinch from the outcome of the EU referendum, but past performance suggests demand for colocation space will rise in the event of recession

Cloud 162
article thumbnail

Cisco buys Cloud Security Gateway vendor CloudLock for $293M

Forrester IT

Given Symantec's recent acquisiton of BlueCoat (and with it BlueCoat's earlier acquired Elastica and Perspecsys cloud security gateway (CSG) assets), and IBM's organic buildout of its Defender CSG solution it comes hardly as a surprise that Cisco today announced its intent to acquire CloudLock for US$293M (in Forrester's estimation this purchase price represents at least 10-15x of CloudLock's current revenues).

Cloud 186
article thumbnail

Data Center SDN: Comparing VMware NSX, Cisco ACI, and Open SDN Options

Data Center Knowledge

What to keep in mind when evaluating SDN options for the ever important networking layer Read More.

article thumbnail

Verisign iDefense IntelGraph: Vulnerability Threat Exposure Use Case

CTOvision

Michael Johnson. Verisign iDefense IntelGraph is an innovative new tool to capture and link all facets of cyber threat landscape data together. This data driven security intelligence application allows practitioners to quickly understand the diverse threats they are facing, investigate additional risks to their organization, allocate resources more effectively and determine the proper courses of action to take.

Course 154
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Brexit: Cloud community mulls over implications for data protection regulation reform

Computer Weekly

TechUK fears Brexit could see the UK lose its power to influence cloud regulations, while others say it could free the market from having to toe the EU line so closely

Cloud 162
article thumbnail

What a Digital Mindset Means Role by Role

Social, Agile and Transformation

We all hear and say that "Digital" requires a different mindset, a "Digital Mindset, but what exactly does that mean? If you think digital mindset is about having the latest gadget, or being the go-to person to configure your mobile device, or knowing the latest startup that is likely to disrupt an industry then you're missing the point. If you believe that digital natives have a leg up on.

Mobile 133
article thumbnail

Oracle Loses $3B Verdict for Ditching HP Itanium Chip

Data Center Knowledge

Jury appears swayed by argument that pulling Itanium support was deliberate effort by Hurd and Ellison to damage Hurd's former employer Read More.

HP 152
article thumbnail

Social Engineering and Phishing

CTOvision

Stu Sjouwerman. Social engineering is one of the most problematic attack techniques to combat. It preys on our nature as human beings and is therefore difficult to counter by using technology. User education is most effective at stopping a social engineer. Users who are aware of the potential for social engineering attacks and learn to recognize them can use simple methods to thwart these attacks successfully.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

SMEs move into cyber criminals’ crosshairs

Computer Weekly

The consequences of data breaches for small businesses are greater than ever, with data protection law becoming tougher just as SMEs are turning into a top target for cyber attackers

article thumbnail

Can Machine Learning Replace Human Expertise in Cyber Security?

IT Toolbox

Can machine learning can already replace human expertise and intervention in securing digital assets against malicious hackers or data leakages?

Security 145
article thumbnail

Report: Flood of Data Center Builders Causes Housing Shortage in Prineville

Data Center Knowledge

Workers building Apple and Facebook data centers having a hard time finding local places to live Read More.

article thumbnail

An Update on the Megatrend of Cybersecurity

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of enhanced Cybersecurity.

Trends 152
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Facebook data case raises US national security issues

Computer Weekly

Dublin court case on the legality of Facebook's data transfers to the US raises issues that impact US national security, claims US Department of Justice.

Security 168
article thumbnail

Why Aren’t Our Networks Staying Up?

The Accidental Successful CIO

Things don’t seem to work as well as they used to Image Credit: Bob Mical. Does anyone besides me remember the phone system? You could be just about anywhere in the world at any time and you could pick up a phone, call someone, and your call would go right through. The Plain Old Telephone System (POTS) just worked. Now nothing is ever perfect and the POTS wasn’t perfect either, but it was 99.999% perfect which meant that it only didn’t work for about 5 minutes per year.

Network 124
article thumbnail

Google-Backed FASTER Submarine Cable Goes Live

Data Center Knowledge

System adds much needed bandwidth between US and Asian data center markets Read More.

article thumbnail

DriveScale Introduction – Smarter Data Center Infrastructure for Scale-Out

CTOvision

Michael Johnson. The video below provides context on DriveScale. DriveScale provides the only scale-out solution that enables administrators to bring the full benefit of their scale-out investment to their organizations. DriveScale enables organizations to buy commodity compute, storage, and networking resources separately, configure and rebalance ratios of resources optimally, and manage them simply.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Lauri Love using illness as a shield against extradition claims prosecution

Computer Weekly

Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges, as Love's legal team press for the case to be heard in the UK.

153
153
article thumbnail

The four laws of robotics

IT Toolbox

Any one who has been involved in any sort of robotics must have heard of the three laws of robotics. From memory they go something like this. Law 1. A robot must not through action or inaction allow any harm to come to a human being. Law 2. A robot must always obey a human being unless it contradicts with law one. Law 3.

124
124
article thumbnail

HPE Wants to Give Data Center Automation a Fresh Start

Data Center Knowledge

Platform unifies automation scripts by DevOps and developers in heterogeneous data centers Read More.

article thumbnail

Intro to Graph Databases Series: Episode 1

CTOvision

Michael Johnson. Ryan Boyd, Neo4j Head of Developer Relations NA, introduces Graph Databases in this series of short videos. This episode talks about the evolution of databases and how Graph Databases fit in the bigger picture.

Video 151
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.