Sat.Aug 26, 2017 - Fri.Sep 01, 2017

article thumbnail

 FBI vs Apple: History, Policy, Sovereignty and Individual Rights

CTOvision

Editor’s note: This is the third in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security. For a detailed legal analysis accompanying the article, please visit TheCyberLawTeam.com/publications-1 […].

Policies 205
article thumbnail

How to improve security against email attacks and for GDPR compliance

Computer Weekly

About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies

Security 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Is Data Backup Really That Important

IT Toolbox

So, we have technology and access to affordable, yet best backup software, but should we really use it? Let?s see if the following information can help you answer this question.

Backup 188
article thumbnail

Driving Digital in the News!

Social, Agile and Transformation

Long time readers of Social, Agile, and Transformation know that I've recommended going on vacations to help clear the mind and having fun as a key tenet of your organization's culture. So before I sign off for some end-of-summer time off, I'd like to update you on the latest news around my book, Driving Digital: The Leader's Guide to Business Transformation Through Technology.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

4 Lessons Businesses Can Learn From This Smart Lock Malfunction

CTOvision

The Internet of Things (IoT) is heavily built on the idea of connected households and associated gadgets. Many of the items we own interact with others, making our lives much more convenient. What happens when things go wrong, though? LockState, a provider of smart locks, found that out the hard way in early August when […].

Internet 152
article thumbnail

Two-thirds of UK firms hiring for GDPR

Computer Weekly

Most UK firms are planning to hire extra staff to help them meet the requirements of the EU’s new data protection regulation

Meeting 242

More Trending

article thumbnail

Four Providers’ Houston Data Centers Online, but Access Roads Flooded

Data Center Knowledge

Companies report their staff are safe and accounted for; customers cannot access most facilities Read More.

article thumbnail

Best Practices for Federal DNS Security

CTOvision

Domain Name Systems are the core of every Federal network. Malicious actors depend on DNS to maneuver within systems and steal critical information – a whopping 91.3% of cyberattacks use DNS. With advanced persistent threats a growing trend, DNS security is a fundamental mission of every Federal IT security professional. BlueCat is providing a webinar […].

Security 151
article thumbnail

Almost all UK law firms vulnerable to email fraud, study shows

Computer Weekly

Robust defence of law firms’ email systems is critical to the £26bn industry in the face of increased impersonation attacks aimed at stealing money and data, claims security firm OnDmarc

Study 190
article thumbnail

5 Innovative VoIP Features That Could Benefit Your Business

IT Toolbox

VoIP (Voice over Internet Protocol) is a technology that has been around for some time, as mass market VoIP services were first launched in 2004. Basically, VoIP allows users to make and receive free voice calls over the Internet.

VOIP 182
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Five Challenges Companies Must Overcome to Make Use of All Their Data

Data Center Knowledge

There are five big challenges that companies must overcome in order to fully exploit their data along with partner data, and other external data sources. Read More.

Company 176
article thumbnail

The Challenges Of Moving Old Applications Into A New Cloud

The Accidental Successful CIO

Moving to the cloud involves making a lot of important decisions Image Credit: Diego Di Salvo. You would think that by now, with all that has been written about the importance of information technology and the advantages of moving your IT operations into the cloud , the decision to move a company’s applications and storage into the cloud would be a no-brainer for the person with the CIO job.

article thumbnail

Content delivery innovation improves user experience for e-tailer

Computer Weekly

WorldStores Group, the owner of a number of online home and lifestyle retail brands, has transformed its customer experience with enhanced content delivery capabilities from Instart Logic

Retail 185
article thumbnail

Innovation and Disruption - How they are Different for Collaboration

IT Toolbox

As this series continues, my intention is to broaden your thinking about innovation and disruption on two levels. First and foremost is the direct connection to collaboration, where each has a specific set of implications, both positive and negative.

178
178
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Oracle Hiring 5,000 for Cloud Business in Race With Salesforce

Data Center Knowledge

Oracle joins other tech giants in promising U.S. hiring; Salesforce and Oracle are racing for enterprise cloud crown Read More.

Oracle 189
article thumbnail

30 ways to improve IoT privacy

Network World

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s

article thumbnail

UK critical infrastructure skipping security checks

Computer Weekly

Almost two-fifths of the UK’s national infrastructure providers have not completed basic cyber security steps recommended by the UK government, an FOI response shows

Security 190
article thumbnail

Where CRM is Heading in 2018

IT Toolbox

While buzzwords such as artificial intelligence and IoT will be invading your CRM soon, most businesses won’t be substantively mixing their customer data with such tech in the next few months. These technologies are certainly on the way, but today’s CRM evolution is the rollout of a slightly older trend: the delivery of good customer experience.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Does AI Mean More Jobs?

Data Center Knowledge

AI has contributed to many industries, specifically customer care, and it is possible that it will be able to create more jobs, not less. Read More.

Industry 164
article thumbnail

Hot products at VMworld 2017

Network World

VMworld 2017 Image by Thinkstock/VMware VMworld 2017 is underway in Las Vegas, where IT pros are converging to learn about the latest in enterprise cloud, virtualization, security, and software-defined data center technologies. Here are some of the product highlights on display at the show.

Vmware 131
article thumbnail

Business warned of massive ransomware campaign

Computer Weekly

Security researchers are urging businesses to prepare for ransomware attacks after the discovery of a massive attack campaign

Research 214
article thumbnail

5 Ways ERP Can Benefit Small Businesses

IT Toolbox

If you're a small business owner, you've likely been through your share of software headaches. The problem is that every business has its own needs, and there is no cookie-cutter solution. As they evolve, most small businesses end up cobbling together a variety of software services and apps to create a software potpourri that delivers most of what they want but is far from ideal.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hurricane Harvey: Delivering Managed IT Services During a Catastrophe

Data Center Knowledge

It’s being described as a “500-year storm,” and Houston, Texas-based Elevated Technologies is among the MSPs who find themselves smack in the middle of it. Read More.

144
144
article thumbnail

IoT privacy: 30 ways to build a security culture

Network World

Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The sheer volume of data that will be collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s

article thumbnail

US Open tennis uses IBM AI to create video highlights

Computer Weekly

Fans of the US Open are able to access match highlights provided by IBM's Watson artificial intelligence system

IBM 225
article thumbnail

Five CRM Innovations You'll See in 2018

IT Toolbox

Business is moving faster and getting more demanding by the minute thanks to the increased competition and consumer expectations that come from an online, mobile-centered economy. Meeting these demands requires managing a solid customer experience at every touch point, and that is putting added emphasis on automation, artificial intelligence, big data and analytics.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

You Can Now Spin Up VMware Servers in Amazon Data Centers

Data Center Knowledge

Battle for enterprise data center dollars heats up as two giants launch hybrid cloud capability Read More.

article thumbnail

Juniper to buy advanced threat protection security startup Cyphort

Network World

Juniper today announced intentions to acquire Cyphort, a Santa Clara-based startup that offers an advanced threat detection, analytics and mitigation platform. Juniper says it will integrate Cyphort’s technology with its Sky Advanced Threat Protection (ATP) product line. + MORE AT NETWORK WORLD : DEEP-DIVE REVIEW: How Cyphort makes advanced threat protection easier than ever + Cyphort’s software platform detects advanced threats, evasion techniques and zero-day vulnerabilities using a combinatio

article thumbnail

Google removes Play Store apps used in WireX DDoS botnet

Computer Weekly

Google has axed around 300 Play Store apps after security researchers revealed the apps were hijacking Android devices to carry out DDoS attacks

Google 194
article thumbnail

5 Technologies Ready To Take The Financial World By Storm

IT Toolbox

When the financial industry changes it sends shockwaves around the world. We're just hoping the next time anything significant occurs it's fairly positive. There is a good chance it will be and it's all thanks to new technology. Although these technologies aren't brand new they've not quite hit the mainstream yet. Fortunately, it won't be the case much longer.

Financial 172
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.