Sat.May 20, 2017 - Fri.May 26, 2017

article thumbnail

DevOps Has Reached “Escape Velocity”, CIO’s Need To Get Onboard!

Forrester IT

In an era where velocity and agility are driving technology management organizations over simple cost reduction, every business must constantly evolve to drive business differentiation. Leveraging practices such as Lean and Agile, smaller changes, automated pipelines and product centric teams, DevOps is transitioning from unicorns and small projects to company-wide initiatives.

Devops 366
article thumbnail

People can be strongest link in cyber security, says NCSC

Computer Weekly

People are often seen as the weakest link when it comes to cyber security, but that must change, says the National Cyber Security Centre

Security 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Latest CTOvision Assessments on Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things and Cybersecurity

CTOvision

Bob Gourley. One of the enjoyable things about estimating the future is there is always a new consideration. It is a dynamic task that is never done. This is especially true in analyzing the future of enterprise technology, where things are always moving fast. We try to find balance in tracking the future of technology by focusing on the metatrends, those very powerful forces that sweep over us all (whether we want them to or not).

article thumbnail

How BI is Changing in ERP Systems

IT Toolbox

As Silicon Valley increasingly looks like the center of the business world, so too are businesses the world over starting to resemble the technology firms that dot the Valley. Business has never been more driven by information technology, and competitive advantage now often rests more on effective technology than on any other factor.

System 170
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Where Is Artificial Intelligence In Forrester's Tech Market Numbers? It's Hiding

Forrester IT

I have gotten some inquiries about where spending on artificial intelligence and cognitive technologies occur in our tech market numbers (see, for example, " US Tech Market Outlook For 2017 And 2018: Mostly Sunny, With Clouds And Chance Of Rain "). The short answer is that we include them in our data on business intelligence and analytics, though so far spending on these technologies is still small -- probably than a billion dollars for 2017.

article thumbnail

Security Think Tank: 10 control areas to mitigate against malware attacks

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

Malware 205

More Trending

article thumbnail

Switch Plans Gigantic Atlanta Data Center Campus

Data Center Knowledge

Fourth dot on US map completes list of US markets company can reach with low-latency connectivity Read More.

article thumbnail

Dear IT Operations: It’s Time To Get Serious About Security

Forrester IT

Okay, I'll apologize right away to the IT ops teams that are already security-savvy. Hats off to you. But I suspect there are still a few that leave security to the CISO's team. On Friday, May 12, 2017, evil forces launched a ransomware pandemic, like a defibrillator blasting security into the heart of IT operations. What protected some systems? It wasn't an esoteric fancy-pants security tool that made some organizations safe; it was simple e-hygiene: Keep your operating systems current.

Security 324
article thumbnail

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Computer Weekly

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Agile 194
article thumbnail

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach

CTOvision

Bob Gourley. The dynamic nature of today’s IT Operations has eroded the network perimeter in ways we have all been watching and even cheering on! This is a new world of mobility, cloud computing and rapid partnering for success. But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either.

Software 171
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Dell Technologies: Apple, or Just Bananas? 

Data Center Knowledge

Why on earth did Michael Dell and team take on an eye-watering, terrifying mountain of debt to transform and enlarge his company, when others have the reverse strategy? Read More.

Dell 158
article thumbnail

Prepare for Increasing Frequency of “Nation-State” Cyberattacks with Strategy, not Technology

Forrester IT

Let me pose a question: "Is it a bad thing to give the average person a hand grenade with the pin pulled?" I think most of us would respond to that question with an emphatic "YES!" No one in their right mind would think it's a good idea in any possible reality to allow anyone without extensive military or professional training to access an explosive--especially not one that is live and has no safety device in use.

Strategy 276
article thumbnail

Security Think Tank: Employees are one of the greatest defences

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

Malware 182
article thumbnail

Tips for Mitigating IoT Device and Insider Risk

CTOvision

Crystal Lister. Organizations today are increasingly adopting Internet of Things (IoT) devices lacking sufficient security protocols which creates unique insider risks that IT teams must address. These organizations were already facing enduring risks from malicious and non-malicious insiders and the intersection with IoT devices further complicates the attack surface that IT teams must defend.

Internet 152
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

3 Ways UC Integration Can Deliver Added Value to Your Business

IT Toolbox

As the market for unified communications (UC) matures and grows stronger, many businesses are turning their attention to UC integration and how it can deliver increased value for them. This recent trend is taking several intriguing forms; here are three integrations that are especially noteworthy because of their significant potential to boost business productivity and, in turn, the bottom line.

article thumbnail

Microsoft Wants Clean Energy for South African Data Centers

Data Center Knowledge

Sometimes it's hard to know whether the power a utility provides really comes from renewables. Read More.

article thumbnail

Mobile C-level executives are major risk to business security

Computer Weekly

C-suite executives logging on to unsecured public Wi-Fi hotspots seem to present one of the biggest security risks to enterprise networks

Security 199
article thumbnail

How Cybersecurity Benefits from Hackers

CTOvision

Carol M. Evenson. With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word. Private individuals who are worried their identities will be stolen—or who have already had their identities stolen before—get sick to their stomach at the thought.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How UC's Shift to the Cloud Will Benefit Businesses

IT Toolbox

As the cloud becomes increasingly fundamental to how business services are delivered and deployed, it’s no surprise to see that unified communications (UC) are tilting toward a cloud future, as well. Many flavors of UC implementation are available today, including hybrid and entirely on-premises versions, but the trend is clearly heading toward a cloud-centric model.

article thumbnail

A Match Made in the Data Center – AI and Robotics

Data Center Knowledge

AI will “drive faster business decisions in marketing, e-commerce, product management, and other areas of the business by helping close the gap from insights to action.” Read More.

article thumbnail

Dutch railway uses IoT to reduce people jams

Computer Weekly

Railway stations in The Netherlands are monitoring the movement of travellers to manage traffic flow and reduce people jams

Travel 200
article thumbnail

What to Do When Big Data Doesn’t Deliver

CTOvision

Rick Delgado. In a world so powered by technology, the ability to analyze data and use its results to help direct business plans for marketing and innovation becomes imperative. Unfortunately, collected data can be corrupted through malfunction of machine or simple human error, and when that happens, it can mean huge roadblocks for the business that needed that information in the first place.

Big Data 151
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

5 Game-changing Technology Trends That Will Help Upgrade Your Business This Year

IT Toolbox

Technology has definitely improved our lives and, no doubt about it, our businesses. It also rewrites the rules of conducting successful businesses, so any dedicated business owner should take the necessary measures in order to keep up with the latest trends and to be aware which ones are the best for his or her business.

Trends 157
article thumbnail

Implementing Your Company’s Cybersecurity, Military Style

The Accidental Successful CIO

You can never have too much cybersecurity Image Credit: Randen Pederson. Implementing a cyber-defense system for your company sure sounds like a good thing for the person with the CIO job to do. Just exactly what does that mean? I guess you purchase and install tools that will allow you to detect if the bad guys are able to get in, you create policies for what various people are supposed to do if this happens, and you make sure that your most precious assets are safely hidden away even if the ba

Training 150
article thumbnail

ChefConf 2017: How DevOps sets enterprises on course for digital transformation success

Computer Weekly

To mark the start of the ChefConf 2017 user summit in Austin, Texas, Chef CTO Adam Jacob shares his thoughts on how early DevOps adopters are now on course to become “high-velocity” technology companies

Devops 160
article thumbnail

Facebook Building Own Fiber Network to Link Data Centers

Data Center Knowledge

Claims 200-mile underground fiber cable will be 50 percent more efficient than most other cables in existence Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Machine learning automates Unit4 ERP system

IT Toolbox

A new digital assistant adds machine learning technology to the spring release of Unit4’s ERP system for professional services organizations, universities and charities. Called “Wanda,” the natural language digital assistant acts as a gateway to data to simplify the user experience within the Business World On!

System 157
article thumbnail

Why public cloud R&D is making lock-in worse, not better

Tech Republic Cloud

Each of the major cloud vendors wants to distinguish itself with innovative features, the adoption of which threaten to leave CIOs and developers dependent on them.

Cloud 157
article thumbnail

IT firm gets Scality object storage to boost S3-based offerings

Computer Weekly

Blue Chip deploys Scality Ring object storage on commodity hardware with S3 connectivity to enable new cloud, backup and archiving product offerings at “a few pence a gigabyte”

Storage 159
article thumbnail

LinkedIn’s Data Center Standard Aims to Do What OCP Hasn’t Done

Data Center Knowledge

Open19 aims to make new breed of data center hardware easy to source for smaller IT shops Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.