Sat.May 27, 2017 - Fri.Jun 02, 2017

article thumbnail

IBM & Cisco Join Security Forces To Fight Cybercrime And The Competition

Forrester IT

I was lucky enough to be invited to IBM's 3rd annual Security Summit in NYC for about 300 of its customers. IBM used the event to showcase a new IBM and Cisco joint security initiative whereby the two will work to integrate their security solutions to better combat advanced threats. The philosophy of the partnership represents the idea that cyber defenders need to collaborate as well as cybercriminals seem to when it comes to sharing techniques and intelligence.

IBM 408
article thumbnail

In the World of Digitized Business, the Data Center Reigns Supreme

Data Center Knowledge

Skill-based certification and training enables IT practitioners to optimally plan, implement, and run IT data center network infrastructure in support of agile and innovative business initiatives. Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top UK firms’ websites violate key GDPR principle

Computer Weekly

Just over one-third of all the public web pages of leading UK companies that collect personal information violate a key principle of new European data protection regulations

Data 210
article thumbnail

What You Need To Know About Mary Meeker’s 2017 State of the Internet Report

CTOvision

Bob Gourley. We should all collectively thank Mary Meeker for her continued efforts in helping capture key trends in our interconnected technology. Her yearly report on the state of the Internet (available at Internet Trends Report and embedded below) provides context relevant to just about every enterprise decision-maker. Here are key takeaways: Global smartphone growth is slowing.

Internet 175
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

RPA and the Future of Work, Dystopian Views

Forrester IT

In the last several months, I've given ten talks on Robotic Process Automation (RPA), it's relationship to AI and future affect on jobs. These were mostly at tech conferences where the audience is a mix of corporate and government technology and business leaders. The industries represented are diverse, as is the process focus and expertise. But participants are similar in important ways.

article thumbnail

Big Data Experts in Big Demand

Data Center Knowledge

While tech companies employ the most data scientists, these professionals are also in demand in non-tech sectors. Read More.

Big Data 260

More Trending

article thumbnail

CTOvision Assessment On The Megatrend of Artificial Intelligence

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for C loud Computing , A rtificial Intelligence , M obility , B ig Data , R obotics , I nternet of Things , C yberSecurity. In this post we dive deeper into Artificial Intelligence. Artificial Intelligence (AI) is the discipline of thinking machines.

article thumbnail

Uber's Unicorn Ponzi Scheme

Forrester IT

Sure, I use Uber. Sometimes its the only option, and sometimes the price justifies riding with a guy who knows less about his city than I do, and whose car cleanliness raises concerns about fungal infections. And sometimes its a huge win as it was recently for me after a nightmare business trip late at night, when I needed to get out to the distant northern burbs at 1am.

Hotels 307
article thumbnail

DCK Investor Edge: Florida is Now Courting Hyperscale Data Centers

Data Center Knowledge

Florida has officially entered the data center derby with elimination of sales tax and use tax for wholesale data centers Read More.

article thumbnail

Financial malware more than twice as prevalent as ransomware

Computer Weekly

While ransomware continues to make the headlines, particularly in the wake of WannaCry, research has revealed that financial threats are 2.

Financial 228
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Global Connected Aircraft Summit: Airlines, operators, integrators, and technology providers

CTOvision

Bob Gourley. The Global Connected Aircraft Summit (7-9 June 2017) provides airlines, operators, integrators, and technology vendors with a venue for advancing the state of the entire aviation community. This fourth annual event connects business, technology, and industry perspectives and goes beyond just in-flight entertainment, to include operations, communications and technologies that impacts the aircraft and the traveling public.

Airlines 157
article thumbnail

How is serverless computing changing our world.

IT Toolbox

Serverless computing in a way has been there for long. In an Infrastructure As A Service setup the end users are not physically managing servers, but serverless computing takes this paradigm a step ahead. It enables developers execute function using exact amount of computing resources needed.

Resources 174
article thumbnail

Morgan Stanley’s 16,000 Human Brokers Get Algorithmic Makeover

Data Center Knowledge

Bank expects humans with algorithmic assistants to be a better solution for wealthy families than the software allocating assets for the masses Read More.

Banking 203
article thumbnail

Shadow Brokers prepares zero-day subscription service

Computer Weekly

Businesses may face an onslaught of zero-day attacks soon as the group that leaked the NSA exploits used in the WannaCry ransomware attacks prepares to release more stolen code

Groups 194
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Understanding the Basics of Deep Learning and Neural Networks

Social, Agile and Transformation

Last week I had the opportunity to visit my graduate school alma mater, The University of Arizona where I studied artificial intelligence and image processing many years ago. I remember signing up for my first semester classes and electing to challenge myself with Professor Neifeld's neural network class. It already had the reputation of being one of the toughest classes requiring students to.

Network 162
article thumbnail

Why Stick to One SEO Tool When There are Plenty More to Try Out?

IT Toolbox

SEO is a tricky game. Especially now, in the post-Penguin era. The rules of the game have significantly changed, which means that business people now have to work twice as hard to grab those top positions in search for their desired keywords.

Tools 164
article thumbnail

Data Center Optimization: How to Do More Without More Money

Data Center Knowledge

Operating efficiently and effectively in the land of "more" without more money means optimization at all levels: hardware, software, and even policies and procedures. Read More.

article thumbnail

DevOps practitioners open up about enterprise adoption challenges

Computer Weekly

Ahead of next week’s DevOps Enterprise Summit in London, practitioners have warned enterprises to stop thinking of DevOps as something only Silicon Valley firms and startups can do successfully

Devops 195
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

Mobile 161
article thumbnail

How IT professionals undermine their own email phishing campaigns

IT Toolbox

Email phishing has become one of the most important tests of enterprise security. It not only highlights flaws in the way your users think and act but also uncovers technical weaknesses in your email and web content filtering as well as malware protection and similar endpoint controls.

Malware 150
article thumbnail

The Right Questions to Ask About Data Center Strategy

Data Center Knowledge

Data center customers often don’t ask some of the most important questions. Here's what they are. Read More.

article thumbnail

Business applications embrace IoT, blockchain to face future

Computer Weekly

Next-generation ERP systems could intersect with IoT, blockchain and smart contracts to drive a new wave of automation aimed at operational efficiency

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas

Tech Republic Security

Cyberwarfare has begun. Unlike nuclear weapons, cyberweapons can be proliferated more quickly and the threat from accidentally setting them off is even greater.

164
164
article thumbnail

Why Blockchain Technology And Big Data Are A Perfect Match

IT Toolbox

Some people absolutely love Bitcoin, whereas others detest it more than anything. The rest of the population have heard the name even though they have no idea how it works. It was built on blockchain technology, which you'll be hearing a lot more about in the near future.

Big Data 150
article thumbnail

Private cloud 3x cheaper than public cloud; you're kidding, right?

Tech Republic Cloud

A new study from ServerPronto University makes silly claims about the cost of the public cloud, but figuring out just why they're so silly is worth exploring.

Cloud 163
article thumbnail

Why and how men in the technology industry have helped women progress

Computer Weekly

Many have argued gender parity will not happen in the technology industry without help from the top.

Industry 255
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloudflare Hires Ex-Symantec Finance Chief in Move Toward IPO

Data Center Knowledge

Network security company aiming to be ready for IPO next year Read More.

Symantec 203
article thumbnail

Top ERP Security Challenges in 2017

IT Toolbox

There’s more opportunity in hacking business. Whether for mayhem or financial gain, cybercriminals are switching from attacking unsuspecting individuals to more organized cyber crime that targets businesses large and small. ERP, in particular, is a prime target.

Security 145
article thumbnail

IBM, Cisco partner to help customers in fight against cybercrime

Tech Republic Security

Cisco and IBM have announced a partnership that will see integrations across their products and services as they aim to help customers improve their security posture.

IBM 152
article thumbnail

Doug Cutting, ‘father’ of Hadoop, talks about big data tech evolution

Computer Weekly

In a Q&A interview, the “father” of Hadoop, Doug Cutting, talks about the cyber-security applications of the stack, as well as Hadoop’s evolution

Big Data 191
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.