Sat.Jul 16, 2016 - Fri.Jul 22, 2016

article thumbnail

Forrester's 2016 ECM Panel Survey Is Open - Call for Participation

Forrester IT

Forrester's survey for ECM decision-makers is open, and we're looking for your participation! Take this opportunity to provide your perspectives on the key vendors, the challenges, and the opportunities you see in this technology market. This survey is intended for ECM decision-makers or influencers in end user organizations. This is not for ECM vendors or systems integrators. but vendors and consultants -- we would love it if you could share this survey invitation with your customers.

Survey 227
article thumbnail

The State of Digital Currency: A discussion with Ed Scheidt

CTOvision

Roger Hockenberry. A few weeks ago I had the pleasure of sitting down for a regular breakfast with Ed Scheidt , former head of CIA’s Cryptographic Center and the designer of the cyrpto systems used in the Kryptos Sculpture at the Agency. He and I get together and typically it’s a free-ranging discussion that covers a lot of topics, math, current events, technology and life in general.

Insurance 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Your VoIP System from Security Threats

IT Toolbox

In today's technology-driven world, a major concern for many IT departments is securing confidential and important business data. Breaches are common and can be a disaster for companies, and securing VoIP lines is no exception. Let's take a look at some of the common issues that arise with cloud-based phone systems and how you can protect your VoIP system from security threats.

VOIP 178
article thumbnail

Data Analytics – Prescriptive vs Descriptive

Eric D. Brown

You’ve collected tons of data. You’ve got terabytes and terabytes of data. You are happy because you’ve got data. But, what are you going to do with that data?You’ll analyze it of course. But how are you going to analyze it and what are you going to do with that analysis? How does data analytics come into play? Will you use your data to predict service outages or will you use your data to describe those service outages?

Data 149
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Unilever Buys Dollar Shave Club To Become Digital Direct

Forrester IT

Unilever is the latest in a long string of enterprise giants to acquire digital. It acquired the digital-native startup, Dollar Shave Club, for $1 billion. I've been telling the Dollar Shave story lately as a way to describe the disruption possible when a company uses digital technology to establish a direct relationship with a customer. Dollar Shave Club is in its customers' daily shower and conscienciousness.

Research 190
article thumbnail

How to choose between Native Apps or the Responsive Web?

CTOvision

Sunil Thomas. In the second article of how CTO’s can create a framework for enterprises to adopt mobile for growth we look at one of the early decisions to be made - that is choosing to build native apps or adopt the responsive web. In case you missed it, the previous article in the series discusses why a CTO makes or breaks your enterprise mobile strategy and discusses briefly the decisions that need to be taken within an enterprise to embrace mobile as a key part of its growth.

How To 168

More Trending

article thumbnail

Women in IT 2016: Panel session – what young women want from IT careers

Computer Weekly

In this video Sophie Deen of Bright Little Labs, Annabel Sunnucks from CA Technologies, and Elissa Morris from the Isle of Man Department of Economic Development, discussed their journey into the IT industry.

Video 140
article thumbnail

Valuable services lurk behind confused marketing of 'managed cloud'

Forrester IT

(Confusing messages. Image by Wikimedia Commons user 'Melburnian'). Again and again, we hear examples of companies struggling as they try to realise the benefits of moving to cloud. They know what they want to achieve as a business, they know that cloud can help, but they cannot translate that understanding into the way they specify, procure, and run the technology.

Cloud 174
article thumbnail

Thinking About “Data Program Governance”

CTOvision

Dennis D. McDonald. Elevator pitch. One phrase in regular rotation in my elevator pitch is “data program governance." What does that mean? The individual words are straightforward: Data includes any kind of data such as numeric, financial, textual, image, or meta. Program means an organized set of activities designed to accomplish a defined set of objectives.

article thumbnail

Three Ways IoT Impacts your Employees for Unified Communications

IT Toolbox

My last post examined the implications of IoT for IT, and that provides a good foundation for the business to fully leverage the opportunity, especially for Unified Communications. Even for IT, IoT will be difficult to understand, let alone apply to your business.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tech firms tackle IoT security with management protocol

Computer Weekly

A group of tech firms have joined forces to develop a management protocol for IoT devices that could pave the way to an open, interoperable standard to address security and privacy risks

Security 140
article thumbnail

Equinix Data Center Outage in London Blamed on Faulty UPS

Data Center Knowledge

Outage causes disruptions for London Internet Exchange, connectivity problems for BT customers Read More.

article thumbnail

Succeeding at Artificial Intelligence Requires a Commitment to Agile Experimentation

Social, Agile and Transformation

I went to graduate school and got my Masters in Electrical Engineering, but that's not what I studied. The University of Arizona had a strong program in optical sciences, medical imaging, information theory, and something called "machine learning" and I opted to take classes and ultimately complete a thesis on these topics. I remember learning the math and computing of neural networks, the.

article thumbnail

Navigating CRM in a Social Media Climate

IT Toolbox

Navigating customer relationship management (CRM) in the current social media climate means making changes and adapting to what today's customer wants, while still employing the time-tested strategies that have worked in the past. What Is CRM? CRM is a term that refers to the different tools companies employ to understand and analyze their customer interactions.

Media 157
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Jihadists’ digital tools revealed

Computer Weekly

A report by dark web intelligence firm Flashpoint reveals how jihadist groups use common security and other tools to hide their digital communications from national security forces

Tools 139
article thumbnail

Data Center Customers Want More Clean Energy Options

Data Center Knowledge

First annual survey of data center end users by Data Center Knowledge shows the market for clean colo is growing Read More.

article thumbnail

Netflix Closed Their Last Data Center – Should You Do The Same?

The Accidental Successful CIO

Netflix now runs everything in the cloud, should you be doing this? Image Credit: Televisione Streaming. The Netflix announcement back in August of 2015 wasn’t a very big deal. In fact it probably went unnoticed by most people. However, from the point of view of those of us with the CIO job, it was sorta like a bomb had gone off. The company sent an email out that announced that in a month they planned on shutting down their very last operational data center.

article thumbnail

VoIP wholesaler offers intermediaries and end-users easier service management

IT Toolbox

VoIP Innovations, a Pittsburgh-based wholesale VoIP carrier, has created a brandable end-user portal to provide more control over the management of VoIP services for resellers, internet telephony providers and their end-users. The End User Portal aims to enable users to order direct inward dialing numbers, update their caller ID, or alter E911 emergency location information on their own.

VOIP 136
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 144
article thumbnail

Singapore Data Center Startup to Challenge Asia Pacific Players

Data Center Knowledge

Founded by former NextDC exec, AirTrunk plans to build in Australia, Singapore, Hong Kong Read More.

article thumbnail

Data Analytics – Prescriptive vs Descriptive

Eric D. Brown

You’ve collected tons of data. You’ve got terabytes and terabytes of data. You are happy because you’ve got data. But, what are you going to do with that data? You’ll analyze it of course. But how are you going to analyze it and what are you going to do with that analysis? Will you use your data to predict service outages or will you use your data to describe those service outages?

Data 100
article thumbnail

The Twisted Pair Ethernet Physical Channel

IT Toolbox

Because of the great interest among users and vendors in the twisted pair Ethernet concept, many vendors developed and began marketing products prior to the finalization of the 10BASE-T standard. As a result, some interoperability problems may occur if hardware from different vendors (all claiming some degree of compliance to 10BASE-T) is used.

Hardware 145
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CW@50: Women in technology – the shifting gender landscape

Computer Weekly

As Computer Weekly celebrates its 50th anniversary, we look back on the great women who have made technology as well as the IT industry possible

Industry 145
article thumbnail

Five Key Emerging Trends Impacting Data Centers in 2016

Data Center Knowledge

Change has always been the cornerstone of technology, and that has never been more apparent than today Read More.

article thumbnail

PowerShell: MSI Function that Installs, Uninstalls, and Repairs with Verification

Mick's IT Blog

With the enormous help of Sapien's PowerShell Studio , I wrote this is an all encompassing MSI update to the MSI-By-Name Uninstaller I published. This function will install, uninstall, uninstall-by-application-name, and repair an MSI. It has the ability to write logs to the %TEMP% directory, or a directory of your choice. The switches are set by default to /qb- /norestart, but can be changed by using the -Switches parameter when calling the script.

article thumbnail

5 Ways ERP Works with Your Big Data

IT Toolbox

Do you know how much data your organization creates every day? Customer interactions, payment transactions, internal messages and more contribute to the daily rate of 2.5 quintillion bytes generated worldwide. Your enterprise resource planning system forms the backbone of many essential business functions, from human resources to accounting.

Big Data 140
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Facebook completes first flight of UK internet drone

Computer Weekly

Facebook has completed the first test flight in a year-long programme for its UK-developed Aquila drone designed to enable internet connections in remote areas, using high-speed laser communications

Internet 132
article thumbnail

Five Best Practices for Outsourcing Cybersecurity

Data Center Knowledge

There are many benefits to outsourcing information security but there are issues that organizations should consider when choosing a cybersecurity vendor Read More.

article thumbnail

The Only Email System The NSA Can’t Access

Galido

When the NSA surveillance news broke last year it sent shock waves through CERN, the particle physics laboratory in Switzerland. Andy Yen a PhD student took to the Young at CERN Facebook group with a simple message: “I am very concerned about the privacy issue, and I was wondering what I could do about it.”. There was a massive response, and of the 40 or so active in the discussion, six started meeting at CERN’s Restaurant Number 1, pooling their deep knowledge of computing and physics to found

System 90
article thumbnail

Ransomware

IT Toolbox

Let?s suppose that after all your years working on mainframes, you?ve decided to take early retirement. But you don?t want to give up work completely ? after all, there?s only so much time you can spend with your grandchildren ? and your head is full of knowledge about how mainframes work and the applications that run at your old company and the dependencies linking them.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.