Sat.Jul 15, 2017 - Fri.Jul 21, 2017

article thumbnail

10 Things Every CIO Must Know about Their Data Centers

Data Center Knowledge

While data centers aren’t necessarily something CIOs think about on a daily basis, there are some essential things every executive in this role must know about their organization’s data center operations. Read More.

article thumbnail

Lords to probe ethics of artificial intelligence

Computer Weekly

The House of Lords Select Committee on artificial intelligence has issued a call for evidence as it looks into the ethical, social and economic impact of the technology

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

INSA and AFCEA Fourth Annual Intel Summit 7-8 Sep: Registration now open!

CTOvision

Editor’s note: We are proud to spread the word of this fantastic event coordinated by friends and associates at AFCEA and INSA. – bg Innovation is essential to the Intelligence Community’s strategic advantage, a key theme of the Summit on September 6-7 at the Walter E. Washington Convention Center, Washington, D.C. AFCEA International and the […].

Intel 197
article thumbnail

What Can VoIP Do for Your Business?

IT Toolbox

Voice over Internet Protocol, or VoIP as it's better known, allows computer users and enterprises to make and receive calls over the internet. This technology has many benefits. Here are some of them. Easy to Install.

VOIP 179
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

You Can Now Earn a Bachelors in Data Center Facilities Engineering

Data Center Knowledge

Degree program in Irish university developed after lengthy consultations with Google, Facebook, Microsoft Read More.

article thumbnail

Devil’s Ivy a call to action on IoT security

Computer Weekly

The discovery of a security flaw in an open source third-party code library that could allow attackers to access and hijack devices underlines the need for a greater focus IoT security, say experts

Security 188

More Trending

article thumbnail

Tips on How to Protect your Internet of Things Devices against Malware

IT Toolbox

Here, we are going to discuss how to protect our Internet of Things devices against malware, as a large number of them is already infected, generally speaking.

Malware 183
article thumbnail

One Click and Voilà, Your Entire Data Center is Encrypted

Data Center Knowledge

IBM says its new encryption engine will allow users to encrypt all data in their databases, applications, and cloud services with no performance hit. Read More.

article thumbnail

Data takes to the road - the technology behind the Tour de France

Computer Weekly

The world's greatest cycle race is transforming its relationship with fans thanks to internet of things, data analytics and machine learning technologies

Data 204
article thumbnail

Worried about ransomware? Here are 3 things IT leaders need to know before the next big outbreak

Tech Republic Security

It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.

147
147
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Makes Some IP Phones Better Than Others?

IT Toolbox

All IP phones aren’t created equal. Vendors and resellers that sell IP phones may overuse this cliché, but it’s still a true statement. As time passes and cloud-based voice over IP (VoIP)/unified communications (UC) services continue to grow, IP phones have become easier to use, more application friendly, and more cost-effective.

article thumbnail

Quantum Computing Could Make Today’s Encryption Obsolete

Data Center Knowledge

Private cyber criminals won't get their hands on quantum computing tools any time soon, but governments will. Read More.

article thumbnail

The challenge of our era - digital transformation at Allianz

Computer Weekly

The insurance firm wants to become "digital by default" and its CIO explains the vital role DevOps and cloud play in its change programme

Devops 215
article thumbnail

The 3 most in-demand cybersecurity jobs of 2017

Tech Republic Security

Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.

Company 145
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

7 Reasons On-Premises Solutions Are Losing to the Cloud

IT Toolbox

It’s clear: The cloud is winning. You could disagree with me, but this post explores the top seven reasons the cloud is beginning to separate itself from on-premises private branch exchange (PBX) solutions. Much has been written about the topic, and many vendors, resellers, and even end users have strong opinions on one side or the other.

Cloud 170
article thumbnail

Google’s Quantum Computing Push Opens New Front in Cloud Battle

Data Center Knowledge

Company offers early access to its machines over the internet; IBM began quantum computing cloud service earlier this year Read More.

Cloud 203
article thumbnail

Blockchain no longer held to ransom as business adoption increases

Computer Weekly

The blockchain digital ledger technology that came to prominence with bitcoin is beginning to find uses in and beyond finance, including for urban cycling scheme Buzzbike

179
179
article thumbnail

What’s The Best Device For Your Workplace: Laptop, Tablet, Or Mobile Phone?

The Accidental Successful CIO

There are many choices, which device should a CIO choose? Image Credit: thrivingmom. You know, it really was not all that long ago that when we got ready for work we just grabbed our lunch and headed out the door. We knew that when we got to work our desktop computer would be sitting there ready for us to start to use it. Over time things have changed.

Mobile 124
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Can Unstructured Data Boost Public Policy?

IT Toolbox

In recent years, researchers have begun to understand the enormous potential this information holds for helping governments make important policy decisions.

Policies 179
article thumbnail

Making Security a Priority in Connected Cars

Data Center Knowledge

The threats to connected cars have been made clear, but the Herculean task now at hand is implementing top-level security practices under time-sensitive and high-pressure conditions. Read More.

Security 170
article thumbnail

WannaCry has changed attitudes to cyber security, surveys show

Computer Weekly

Attitudes to cyber security have changed in the boardroom and among staff in the wake of the recent WannaCry attack, two surveys have revealed

Survey 193
article thumbnail

How blockchain could revolutionize IoT security

Tech Republic Security

There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.

Security 166
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

VoIP and the Future of the Service Desk

IT Toolbox

Voice over IP (VoIP) technology is part of the future of the corporate service desk as more of these platforms head to the cloud and the centralized call centers of old give way to more remote workers answering service desk calls. You may know the service desk as the help desk or call center depending on your organization. These platforms benefit from VoIP because of its efficiency and flexibility.

VOIP 162
article thumbnail

Cyberattack on Medical Software Shows Industry Vulnerability

Data Center Knowledge

Hospitals are among most frequently targeted, KPMG says; Nuance’s transcription service still affected weeks later Read More.

Industry 203
article thumbnail

Research from Ponemon Institute highlights lack of confidence in public sector IT

Computer Weekly

IT decision makers in the public sector say they struggle with IT operations, reveals study by the Ponemon Institute

Research 214
article thumbnail

Google says AI will help run datacenters in the near future

Tech Republic Data Center

Machine-learning systems will rapidly become part and parcel of running large datacenters says Google's VP of engineering.

Google 162
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Timing for CRM

IT Toolbox

Timing is important to getting your message out. You need to be aware of how receptive your prospect will be and to what kinds of messages. It’s a fact of life that prospects are more willing to accept various approaches depending on time of day, day of the week, the kind of device they are using and other factors.

158
158
article thumbnail

Big Data Technology: In-House vs Outsource

Data Center Knowledge

Eldar Sadikov is the Co-founder and CEO of Jetlore. For retailers, the specter of big data is one that is constantly looming. Companies are working hard delving into the omni-channel arms race as they try to fend off behemoths like Amazon.

Big Data 166
article thumbnail

Higher education and healthcare use specialist CRM in all but name

Computer Weekly

Customer relationship management software may be targeted at businesses, but the healthcare and higher education industries have redefined it to gain better insight into their users

article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backup 130
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.