Sat.Aug 06, 2016 - Fri.Aug 12, 2016

article thumbnail

Want The Government To Do Something About Cybersecurity? Advocate Congress establish a permanent joint committee on information technology

CTOvision

Bob Gourley. The United States Congress Permanent Joint Committee on Information Technology does not exist, yet. But with attack after attack against our nation's IT systems the time has come to consider the idea. First, some background on what a Joint Committee of Congress can be. Congress has great leeway in how it executes its constitutionally mandated responsibilities to legislate and fund.

article thumbnail

Tame The Beast: Forrester's Insight Platform Vendor Landscape

Forrester IT

The mix of analysts who showed up to a recent Cambridge Semantics briefing illustrates a big problem data and analytics technology buyers have - too many data and analytics solutions and a ton of overlap. For example, of the five analysts who came: One saw Cambridge Semantics as a text analytics tool -- and that is true. Another saw it as a search tool -- and that too is true.

Tools 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

900 million Android devices vulnerable to attackers

Computer Weekly

Enterprises and individuals need to install security updates for all devices with vulnerable Qualcomm chip drivers if they want to ensure attackers can‘t take control of them, warns Check Point

article thumbnail

Data Analytics – Data Modeling, a Necessary first step

Eric D. Brown

What do you think of when you hear the term ‘data modeling’? Just typing ‘data modeling’ almost made me go to sleep. Who am I kidding…I’m a data geek and this stuff is interesting…but some folks aren’t quite as excited by this stuff as I am. Data modeling has many different definitions and connotations.

Data 152
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tracking The Megatrend of CloudComputing

CTOvision

Bob Gourley. There are seven key MegaTrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the first of these trends, Cloud Computing.

article thumbnail

How VoIP Impacts the way Businesses Think about UC

IT Toolbox

This series began by examining the evolution of telephony to VoIP, and as it progresses, I’ll explain how our thinking around this impacts how we adopt other technologies. In this post, I’ll address the impact specifically on UC, and then will connect that to the contact center in the subsequent post.

VOIP 151

More Trending

article thumbnail

Delta System Failure Marks Wake-Up Call for Airline Industry

Data Center Knowledge

Each major US carrier sustained disruptions during the last year due to outdated information systems Read More.

Airlines 181
article thumbnail

Back to the future – Moonlight Maze

CTOvision

Michael Johnson. Thomas Rid of King's College London presents the previously untold story of MOONLIGHT MAZE, the first known state-on-state computer espionage campaign in history (really the first "advanced persistent threat or APT). A detailed account is in the last chapter of his book Rise of the Machines.

CTO 163
article thumbnail

New Ways to Look at UC and the Contact Center

IT Toolbox

Change is a constant with technology, and we’re well past the point of being able to keep up with everything. Just when you’ve reached a high level of domain expertise – whether via continuous learning or simple osmosis – something new comes along where you have to re-think everything.

Internet 138
article thumbnail

It’s not too late to turn the tide on Investigatory Powers Bill

Computer Weekly

The government has set David Anderson QC an almost impossible task in his review of the sweeping bulk powers proposed in the Investigatory Powers Bill – but it is not too late to make a difference

article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Google Gives Facebook’s Open Rack a 48V Makeover

Data Center Knowledge

Releases first draft of shallow 48V data center rack design for Open Compute Project Read More.

article thumbnail

Tracking The Megatrend of Artificial Intelligence

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence is the discipline of thinking machines.

article thumbnail

Twisted Pair Ethernet Physical Channel

IT Toolbox

The transmission media distance limitations are primarily governed by the minimum propagation velocity of the cable, expressed as a percentage of the speed of light, c = 300,000 km/sec.

Media 130
article thumbnail

Security pros split on government access to cloud data, survey shows

Computer Weekly

Despite rapid cloud services adoption, security and compliance concerns revolving around inappropriate use or access of sensitive cloud data continue to loom large, a survey has revealed

Survey 142
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HPE Buying Supercomputer Specialist SGI for $275M

Data Center Knowledge

CEO Meg Whitman is investing in products that help customers crunch growing reams of data Read More.

Data 155
article thumbnail

Suspected Russian hack of DNC emails

CTOvision

Michael Johnson. This video captures context on the DNC Hacks provided by Co-Founder of Cognitio and CTOvision publisher Bob Gourley. In it, Bob underscores for CBC News Network's Michael Serapio that both forensics and motivation suggested Russian involvement. "The techniques look Russian. The tools look Russian.".

Video 157
article thumbnail

Survey Says: Telecommuting Is the New Dream Job

IT Toolbox

A new survey says 99 out of 100 working parents could be happier. What would cure their blues? FlexJobs CEO Sara Sutton Fell says the answer is a home office.

Survey 133
article thumbnail

Nimble adds to all-flash arrays with entry-level AF1000

Computer Weekly

Nimble made its debut in all-flash in February 2016, but now adds an entry-level array, the AF1000, plus upgrades to its hybrid flash array products that up performance and capacity

130
130
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

CIOs Need To Make Sure They Don’t Do Outsourcing The Wrong Way

The Accidental Successful CIO

When an IT department does outsourcing, it has to be done right Image Credit: Vitor Lima. Here we are at the start of the 21st Century and although we all know about the importance of information technology, are we still talking about outsourcing? The answer is yes. Outsourcing is a difficult task for anyone with the CIO job to take on. There are a lot of different variable involved, every company is different, and it is all too easy to go about doing this stuff the wrong way.

article thumbnail

Never Waste Another Minute: Take The CTOvision Mobile App With You And Stay In The Loop

CTOvision

Bob Gourley. An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. Please download your app today by visiting your favorite iOS or Android app store and searching for CTOvision. This upgrade addresses stability issues in the old app plus brings in new data sources. Here is a bit more on the app and pointers to download sites: The application focuses on content we create for technologists, so you will find our blog content and tech write-ups featured p

Mobile 156
article thumbnail

How to Use Email Marketing to Strengthen Business Relationships

IT Toolbox

Our modern marketing columnist offers rules on using email marketing to improve customer perception of your company, drive sales, and foster better business relationships.

How To 126
article thumbnail

Half of vehicle cyber vulnerabilities could give hackers control, study shows

Computer Weekly

Half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle and 71% are easy to exploit, according to a three-year study by IOActive

Study 134
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Digital Leaders Must Embrace the Lion

Social, Agile and Transformation

What does this picture make you think about? My first thoughts veer to a post I made last year, Agile Culture - Are You Developing Solutions or Solving for Business Opportunities? In that post, I suggested that agile product owners first must study the market and understand what problems that they can solve for customer and sell profitably. However, here's what I hear from less experienced.

Agile 122
article thumbnail

Registration Open For The 4 Oct 2016 Synergy Forum: CTOvision readers can save 10%

CTOvision

Bob Gourley. The Second Annual Synergy Forum will be held 4 October 2016 at the Renaissance Washington, DC Downtown Hotel. Cognitio organizes this event with a focus on helping decision-makers share lessons learned and best practices. With this post we are asking that you block the day to join us there. Government attendees can register free. Industry attendees can register for a discounted price till 4 September ( CTOvision readers can take an additional 10% off using the code below).

Hotels 155
article thumbnail

Things You Need to Be a Good Game Designer

IT Toolbox

Being a game designer is extremely hard, and it?s also very stressful, plus being a guy with an idea is not going to do you much good.

140
140
article thumbnail

IPT fines Police Scotland for communications breach of privacy

Computer Weekly

The case comes as the UK government prepares to introduce the Investigatory Powers Bill, which will give sweeping powers for suspicion-less surveillance of telephone, web and email communications

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Renewable Energy is Changing the Data Center Market

Data Center Knowledge

More customers want data center services powered by renewables, but options are limited Read More.

article thumbnail

Now Available: ThreatConnect Powered by SAP HANA™

CTOvision

Bob Gourley. Editor's note: We love seeing good friends and associates in the press, especially when they are combining strengths to build something most every enterprise needs. -bg. ThreatConnect + SAP HANA: Intelligence-Driven Defense Supercharged with In-Memory Computing. ARLINGTON, Va.--(BUSINESS WIRE)--ThreatConnect, provider of the leading intelligence-driven defense platform and SAP NS2, a U.S. subsidiary of the global enterprise software company SAP, announce the availability of the Thre

SAP 154
article thumbnail

VoIP vulnerable to hackers, security consultant warns

IT Toolbox

IT and security testing teams are struggling to keep pace with the risk VoIP systems face from hacking and the growing number of other known threats, according to Fatih Ozavci, a managing consultant at Context Information Security.

VOIP 122
article thumbnail

Brexit data flow confusion prompts datacentre project slowdown

Computer Weekly

TechUK has said it is working with government to ensure the datacentre community will continue to benefit from the free flow of data between the UK and EU after Brexit

Data 130
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.