Sat.May 13, 2017 - Fri.May 19, 2017

article thumbnail

C-Level Business Executives Are Playing A Bigger Role In Tech Spending, But CIOs Still Remain Dominant

Forrester IT

Tech buying in business and governments is clearly shifting from the sole or primary control of the CIO and the tech management organization and into the hands of business leaders. But how much is this happening? Anecdotal comments and surveys - including Forrester's own Business Technographics surveys - suggest that most tech purchases are now controlled by business executives.

Survey 362
article thumbnail

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Computer Weekly

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Storage 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Marty Meehan. Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra scale dominates the market, supports 1000s virtual NICs and dual 10 GbE ports, and provides

Software 194
article thumbnail

NVIDIA CEO: AI Workloads Will “Flood” Data Centers

Data Center Knowledge

Data center managers in every industry have to answer some key questions to prepare for AI Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data is the perimeter, defend it that way

Forrester IT

Data is the perimeter, defend it that way. Unless you have been living under a rock or possibly hiding in the mountains of Montana with a giant beard and eating way too many government issued MRE's you probably heard about the nuclear bomb of a ransomware attack that kicked off last week. Welcome to the post apocalypse folks. For years, many of us in the cybersecurity industry have been jumping up and down on desks and trying to get the world (writ large) to pay attention to managing and patchin

Data 319
article thumbnail

Brits expect driverless cars to outnumber normal cars in 15 years

Computer Weekly

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Survey 228

More Trending

article thumbnail

Report: AI Tells AWS How Many Servers to Buy and When

Data Center Knowledge

Amazon’s cloud CEO Jassy says company uses Machine Learning for data center capacity planning Read More.

article thumbnail

Five Factors That Make Deep Learning Different - Go Deep Baby!

Forrester IT

At the highest conceptual level, deep learning is no different from supervised machine learning. Data scientists start with a labeled data set to train a model using an algorithm and, hopefully, end up with a model that is accurate enough at predicting the labels of new data that is run through the model. For example, developers can use Caffe, a popular deep-learning library, to train a model using thousands or millions of labeled images.

Training 332
article thumbnail

Financial services firms advised to ditch private datacentres and invest in cloud

Computer Weekly

DTCC whitepaper claims financial services firms that shun cloud are at heightened risk of running into resiliency, security and performance issues.

Financial 224
article thumbnail

Cybersecurity Executive Order Provides Agency Leadership with Opportunities and Challenges

CTOvision

Marty Meehan. President Trump’s “Presidential Executive on Strengthening US Cybersecurity and Critical Infrastructure" is significant as it discusses improvements to the Nation’s digital infrastructure, protection of the power grid, replacement of antiquated IT systems, protection against cyber threats. It also makes government leadership accountable for cyber deterrence.

Budget 158
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

ASHRAE 90.4: Why This Data Center Standard Matters

Data Center Knowledge

In September of 2016, the American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) published a new and improved standard that establishes the minimum energy efficiency requirements for data centers. ASHRAE 90.4-2016 has been in development for several years. Overall, this.

article thumbnail

Product Development Must Evolve for the Internet of Things

Forrester IT

Traditional physical products and machinery are steadily being replaced by connected products and assets that shift business models and augment customer relationships with digital experiences and data. But creation of these products is a major challenge for traditional product companies. The process of building connected products is complex, requiring new software development skill sets, accelerated product release cadences, and innovative software tools and proccesses that meet the needs of IoT

Internet 327
article thumbnail

Half of CIOs have no Brexit plan because of uncertainty

Computer Weekly

Uncertainty caused by the UK leaving the EU has caused a pause in activity for half of CIOs, while the others are accelerating their digital transformation

211
211
article thumbnail

Voicemail Is Dead. Get over It!

IT Toolbox

Over the past 10 years or so, many authors have written about the death of voicemail, but it lingers, barely surviving. I’m here to tell you that despite apparent survival, it really is dead and it’s about time to just get over it.

176
176
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft to Open Africa Data Centers to Seek Edge in Cloud Push

Data Center Knowledge

Software maker vies with Amazon to target African customers; customers including Standard Bank to benefit from new hubs Read More.

article thumbnail

IBM to retire Emptoris and work with SAP Ariba on next generation digital procurement

Forrester IT

SAP Ariba & IBM today announced a partnership that had been a rumour for a few days now. Part of the deal includes IBM gradually retiring Emptoris and encouraging its customers to migrate to SAP Ariba. [link]. It's an ambitious move by SAP Ariba. IBM Emptoris's leadership had an exciting vision of next gen digital procurement but decided they couldn't deliver it without a cost prohibitive replatforming of its various products.

SAP 247
article thumbnail

Interview: Mark Potter, CTO, HPE

Computer Weekly

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

CTO 218
article thumbnail

4 Strategies for Staying Within Your ERP Budget

IT Toolbox

Even if your company is taking advantage of the latest, most cost-effective enterprise resource planning (ERP) software available, it’s still possible—even probable—that it will spend outside its ERP budget. Various factors come into play to explain this cost overrun, including hidden fees and poor planning.

Budget 166
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Should You Go With AWS or Azure? That May Be the Wrong Question

Data Center Knowledge

RightScale’s “2017 State of the Cloud” report also indicates that 85 percent of enterprises have multi-cloud strategies, a three-point rise over the previous year. This is as it should be. Read More.

Cloud 164
article thumbnail

Five DevOps Lessons from a CIO Getting in the Weeds on AWS

Social, Agile and Transformation

I always advise CIOs and technologists to get into the weeds to figure out what's going on. So last week I spent some time getting a number of AWS services up and running. Nothing too crazy, but successful. My first project was to set up a new domain, Driving-Digital.com on AWS Route 53 to enable landing pages and vanity URLs for my upcoming book, Driving-Digital: The Leader's Guide to.

Devops 161
article thumbnail

Strong cyber security posture reduces impact of breaches

Computer Weekly

There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed

Security 195
article thumbnail

5 Must Have PC Peripherals That Will Improve the Quality of Your Life

IT Toolbox

If you were wondering which upgrade or add-on to get for your PC, you are at the right place. Here are 5 must have PC peripherals that will completely change how you perceive and use your computer.

162
162
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google to Sell New AI `Supercomputer’ Chip Via Cloud Business

Data Center Knowledge

Move may test Nvidia’s grip on high-end semiconductor market and help Google catch cloud leaders Amazon, Microsoft Read More.

Google 189
article thumbnail

Just Exactly How Legal Is It To Track Your Employees?

The Accidental Successful CIO

Just because you can, does not mean that you should track employees Image Credit: Gabriel Garcia Marengo. As the person with the CIO job, you have a great deal of power that comes with your assignment dealing with importance of information technology. The big question that you always need to be dealing with is just exactly how should you go about using this power?

Insurance 140
article thumbnail

Neustar launches international security council

Computer Weekly

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Security 185
article thumbnail

Where Business is Getting IoT Security Wrong

IT Toolbox

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices.

Security 140
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More.

article thumbnail

United flight attendant accidentally leaked cockpit security codes to public website

Tech Republic Security

United Airlines recently alerted staff that cockpit access codes has been posted online, raising concerns about the chain of ownership for sensitive data.

Airlines 166
article thumbnail

How AI will enhance user experience and boost productivity

Computer Weekly

We meet the head of Microsoft’s Fuse Labs, Lili Cheng, to find out how artificial intelligence holds the promise to extend computing beyond graphical user interfaces

article thumbnail

Organizations Will Never Realize the Benefits of Agile and DevOps by Reading the Internet

IT Toolbox

What I find worse is that when you at least attempt to coach teams along this path, they sometimes will say bizarre things like: ?Um. I think there is enough stuff written about continuous integration out there on the web that we can probably figure it out for ourselves.?

Agile 136
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.