Sat.Sep 24, 2016 - Fri.Sep 30, 2016

article thumbnail

How To Unlock Tech Industry Digital Transformation

Forrester IT

It's no surprise that tech companies are vested in the digital transformation of their customers. But many tech companies find it difficult to leave their product-centric models behind and focus on customer outcomes. That's just one of the findings from the research published on digital transformation in the tech sector. True customer obsession demands an outside-in perspective.

Industry 315
article thumbnail

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Sunil Thomas. Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. This post is the continuation of a series discussing why a CTO makes or breaks your enterprise mobile strategy and in case you’ve missed it we have already discussed how to choose between building native apps vs. adopting the mobile web.

Mobile 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NGOs challenge UK and US mass surveillance in human rights court

Computer Weekly

Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights

Groups 205
article thumbnail

Latest Microsoft Data Center Design Gets Close to Unity PUE

Data Center Knowledge

Innovation in data center design by cloud giants has widespread implications for their users as well as for the data center industry in general. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

R.I.P. BlackBerry Phones

Forrester IT

An era has passed. BlackBerry will no longer make phones. RIM opened our eyes when it put the power of digital communications into our pockets. Email on the go was the beginning of the mobile mind shift. I loved the passion of Mike Lazaridis and his team for building great devices that we'd drive home and get if we left on the counter. His devices were the first to inspire such passion, such intimacy, such a feeling of empowerment that we now all take for granted.

Mobile 291
article thumbnail

AWS ElasticSearch Setup

CTOvision

Adam Gerhart. This is the first of a two-part post on getting Amazon's version of ElasticSearch set up in AWS. We go over the basics of setting up an AWS ES cluster and then tackle supplying the cluster with data via Logstash. Amazon has taken all the fun (read: difficulty) out of creating an ElasticSearch cluster. Instead of installs, configurations, and server management, we have been relegated to filling out forms and clicking buttons!

Storage 217

More Trending

article thumbnail

Microsoft to Plug Renault-Nissan Cars Into The Cloud

Data Center Knowledge

Microsoft will build cloud infrastructure for the two carmakers that can host navigation data and allows drivers to predict gas usage and check on their cars remotely. Read More.

Microsoft 176
article thumbnail

Bosch And SAP Agree A Strategic Internet Of Things (IoT) Partnership To Facilitate Data Orchestration

Forrester IT

I recently attended an event at which Bosch and SAP announced a major partnership to more closely align their respective cloud and software expertise around the industrial internet of things. This partnership underlines the fact that SAP and Bosch are prepared to significantly transform their respective business models to generate new value for their customers.

SAP 280
article thumbnail

The 4 Oct Synergy Forum in DC Can Help You Change The World

CTOvision

Bob Gourley. Thank you everyone who is engaging with us at our 4 Oct Synergy Forum in DC. What an incredible turnout. We can't share the signup list of attendees for obvious privacy reasons, but here is a gist: The event will be a gathering of some of most incredible, action-oriented thought leaders in America today. CIOs, CTOs, CISOs, Data Scientists, SES's, CEOs, Flag and General Officers are signed up to attend.

article thumbnail

Yahoo security still poor despite massive breach, claims Venafi

Computer Weekly

Yahoo is likely to have been a victim of its own encryption and security is still poor despite the huge breach that hit the company in 2014, according to security firm Venafi

Security 197
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Will Internet of Things Ignite Power by the Hour?

Data Center Knowledge

The Internet of Things has moved beyond technology talk and toward business outcomes, even industry-wide disruption like consumption-based pricing. But there's real risk in "power by the hour" models, warns McKinsey's Mark Patel. Read More.

Internet 169
article thumbnail

Update Your Balanced Scorecard With Business Outcome And Agility Metrics

Forrester IT

We've entered the age of the customer, where powerful customers are disrupting every industry. In response, companies will have to change how they develop, market, sell, and deliver products and services directly to their customers and through their partners. CIOs and their teams are crucial to these strategic responses and will have to track transformation and performance with new metrics to go beyond their traditional IT approach to include the business technology (BT) strategy -- technology,

Agile 233
article thumbnail

Optimizing HPC Program Performance with OpenMP and Reveal

CTOvision

Marty Meehan. What do you do when the performance of the MPI program that distributes your work across many cores and nodes starts to level off? Like any good programmer, you enlist the help of your favorite performance profiler to understand what’s going on. You find that you are now network bound, or that the MPI memory footprint has grown so large that there is little room left for your program.

article thumbnail

CISOs need to be more business-focused, says Publicis CISO

Computer Weekly

Information security leadership is about politics, getting a place at the top table and showing what security can do for the business, according to Publicis CISO Thom Langford

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Player Enters Secondary Data Center Markets With Modular Design

Data Center Knowledge

New $15 million in private equity in hand, dcBlox is expanding in Atlanta suburbs and entering Chattanooga, a world leader in internet speed. Read More.

article thumbnail

Consultancies are adapting to the digital world

Forrester IT

The age of the customer is characterized by customer empowerment, digital technology, and new business models. These factors are changing who buys consulting, what they're expecting, how consultants execute on these projects, and how clients pay for them. As a result, firms including Deloitte, McKinsey, Booz Allen Hamilton, Cognizant and others are changing delivery, hiring and contracting models to: Read more.

245
245
article thumbnail

Nlyte Software is the First to Address Federal DCOI Reporting and Validation

CTOvision

Marty Meehan. As federal budgets face tighter scrutiny, government agencies at all levels have been seeking innovative ways to operate more efficiently at lower cost without compromising security. Consolidating and optimizing government data centers is an important way to shift more IT resources from back-office activities to value-added services. In March 2016, the Federal CIO at the Office of Management and Budget (OMB) issued the Data Center Optimization Initiative (DCOI), announced in March

Software 208
article thumbnail

Brexit has thrown ICO plans into flux, admits information commissioner

Computer Weekly

The ICO is working to ensure that the UK's post-Brexit data protection law is progressive, stands up to scrutiny and provides stability, says information commissioner Elizabeth Denham

Data 195
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

When Selecting a Data Center Provider, Keep an Eye on the Edge

Data Center Knowledge

As your data becomes more distributed, how do you select a data center partner who can keep up with data delivery demands? Read More.

article thumbnail

Alexa, Siri, and Cortana Voice Controls Going Mainstream

Social, Agile and Transformation

Alexa has over 3000 skills. The iPhone 7 goes wireless, a step Apple is taking to get users to leverage Siri more frequently and easily. Microsoft is broadening Cortana's AI capabilities. . We've reached an inflection point; the end of the keyboard, mouse, and touchpad and the start of voice commands as a legitimate controller. When you develop your next application, you are likely implementing.

Wireless 142
article thumbnail

Dynamic Data Centers

CTOvision

Marty Meehan. Big Data and high performance computing (HPC) are on a collision course – from machine learning to business intelligence, the combined power of clustered servers, advanced networking and massive datasets are merging, and a new Big Data reality is on the rise. To leverage all this landscape has to offer, correctly selecting, implementing and managing new technologies is critical, and we’re here to point you in the right direction.

article thumbnail

Yahoo breach underlines need for Security Serious Week

Computer Weekly

The recently disclosed Yahoo data breach shows that no business is immune, underlining the need to raise awareness and improve practices, say the organisers of Security Serious Week

Security 195
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hospital Pays $400,000 HIPAA Breach Penalty for Obsolete ‘Business Associate’ Agreement

Data Center Knowledge

The federal investigation stemmed from the loss of unencrypted backup tapes containing patient data, which were maintained by the hospital’s parent company. Read More.

Backup 165
article thumbnail

Creepy clowns cause sheriff to consult with FBI and Homeland Security

Network World

If you are going to be dressing up in a costume for Halloween, you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.

Security 131
article thumbnail

Allez, rendez-vous à Paris – An AWS Region is coming to France!

All Things Distributed

Today, I am very excited to announce our plans to open a new AWS Region in France! Based in the Paris area, the region will provide even lower latency and will allow users who want to store their content in datacenters in France to easily do so. The new region in France will be ready for customers to use in 2017. Over the past 10 years, we have seen tremendous growth at AWS.

Cloud 131
article thumbnail

Yahoo sued over data breach

Computer Weekly

Yahoo is facing a class action lawsuit that alleges that the internet firm showed a reckless disregard for the security of its users that resulted in a breach affecting half a billion people

Data 193
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Ignite: Windows Server 2016 Launches, Along With Host of Third-Party Releases

Data Center Knowledge

There's a lot of excitement for the new features and extensibility in the latest offering, but Microsoft isn't the only one making news around it. Read More.

Microsoft 169
article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

Intel 129
article thumbnail

Introducing the Alexa Prize, It’s Day One for Voice

All Things Distributed

In the past voice interfaces were seen as gimmicks, or a nuisance for driving “hands-free.” The Amazon Echo and Alexa have completely changed that perception. Voice is now seen as potentially the most important interface to interact with the digitally connected world. From home automation to commerce, from news organizations to government agencies, from financial services to healthcare, everyone is working on the best way is to interact with their services if voice is the interface.

article thumbnail

Open source storage hits the mainstream

Computer Weekly

Open source storage has gained mainstream acceptance in high performance computing, analytics, object storage, cloud (OpenStack) and NAS use, but can it crack the enterprise?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.