Sat.Feb 25, 2017 - Fri.Mar 03, 2017

article thumbnail

The Cloud Is Disrupting Hadoop

Forrester IT

Forrester has seen unprecedented adoption of Hadoop in the last three years. We estimate that firms will spend $800 billion in Hadoop software and related services in 2017. Not surprisingly, Hadoop vendors have capitalized on this -- Cloudera, Hortonworks, and MapR have gone from a "Who?" to "household" brands in the same period of time. But like any good run, times change.

Cloud 291
article thumbnail

Citizen Love: the story of an ordinary family's fight with the US government

Computer Weekly

Finnish documentary makers Raimo Uunila and Lauri Danska tell the behind-the-scenes story of activist Lauri Love’s battle with the US government – and the impact of the case on his family

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AWS Outage that Broke the Internet Caused by Mistyped Command

Data Center Knowledge

Amazon says Tuesday’s mayhem resulted from mistake during a routine debugging exercise. Read More.

Internet 218
article thumbnail

Eric Schmidt Provides Insights Into The Future of Artificial Intelligence and Machine Learning at RSAC2017

CTOvision

Bob Gourley. There are many great ways to learn about Artificial Intelligence. An important one is to listen to those strategic thinkers who are helping drive real advancements into applications. As a long term student of AI, I have other videos I will recommend to you to better learn the history of AI and its many AI winters and bursts of advancements.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Introducing The New NTT DATA

Forrester IT

This week, NTT DATA brought together a select community of industry and financial analysts to introduce the new NTT DATA, following the recent acquisition of Dell Services. Though not a well-known brand to most, NTT DATA wants to change that and has launched a series of new campaigns to run on TV and in major publications such as The Economist. This $4.3B+ services firm is a rollup of many acquisitions including Keane, Carlisle and Gallagher Consulting Group, Optimal, Intelligroup, Centerstance,

Data 280
article thumbnail

CloudPets’ data breach underlines need for secure cloud apps

Computer Weekly

More than two million voice recordings and e-mail addresses and password data for more than 800,000 accounts linked to an internet-connected toy have been leaked online

Data 190

More Trending

article thumbnail

5 Technologies That Will Help You Increase Sales

IT Toolbox

Some technological solutions designed to help and increase sales are tailored to meet the needs of small and medium businesses, while others are more suitable for big enterprises.

Meeting 153
article thumbnail

Yes, Cloud Is Still Safe Despite The AWS Outage If You Learn From Failure.

Forrester IT

On February 28, 2017, many internet sites and business services suffered disruptions. Some early speculation that it was another hack like the October DDOS attack on Dyn. The reality was less nefarious but nonetheless far-reaching. Amazon's AWS unit soon revealed a failure in its S3 storage service in a particular region (Eastern US). Just about anyone who uses AWS has a dependency tied to S3.

Cloud 249
article thumbnail

Cyber attack on Barts NHS trust exploited zero-day vulnerability

Computer Weekly

A cyber attack that forced parts of Barts NHS trust offline in January 2017 has been blamed on previously unknown malware that was able to bypass the antivirus systems, highlighting a common weakness in cyber defences

Malware 184
article thumbnail

Here are the Submarine Cables Funded by Cloud Giants

Data Center Knowledge

Microsoft, Google, Facebook, and Amazon are fueling a submarine cable construction boom (illustrated) Read More.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5 Important CRM Trends for 2017

IT Toolbox

In an age of accelerating change, agile customer relationship management (CRM) systems are increasingly important. Both startups and successful, established enterprises must anticipate and prepare for the exciting possibility of rapid growth.

Trends 154
article thumbnail

macOS malware on the rise as Apple silently patches a mysterious new threat called Proton

Tech Republic Security

No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.

Malware 129
article thumbnail

DevOps done right: Why work-life balance matters to digital transformation success

Computer Weekly

DevOps practitioners warn enterprises off neglecting the health and well-being of the IT staff responsible for delivering their digital transformation projects

Devops 187
article thumbnail

IT Automation: What to Automate and When?

Data Center Knowledge

We cannot replace humans in the data center and intelligent decision-making by experienced engineers will continue to be a highly valuable asset for CIOs and CTOs. The trick is to balance humans and machines, with a goal toward extreme efficiency and supporting business objectives. Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Six Big Data Skills Every IT Manager Should Know

IT Toolbox

The Microsoft Office suite and basic coding once were prerequisites for every IT manager. Basic digital literacy has ushered in a new set of core competencies, however. One of those modern competencies is proficiency with big data. Colleges are training on better data literacy, and businesses are demanding it.

Big Data 148
article thumbnail

Yahoo confirms 32M accounts breached in 2015-2016 forged cookies attack

Tech Republic Security

In a recent annual report filed with the SEC, Yahoo confirmed that forged cookies were used to hack 32 million accounts. Here's what it means and why your company should be aware of such attacks.

Report 128
article thumbnail

MWC 2017: Barcelona trial uses IoT and big data to manage tourists

Computer Weekly

Barcelona, the host city for Mobile World Congress, has been demonstrating its use of the internet of things and big data to help manage visitors to Antoni Gaudi’s Sagrada Familia

Big Data 176
article thumbnail

Tech Primer: Clarity on Containers

Data Center Knowledge

Expect for IT departments to finally come to a greater understanding of container technology and how it can realistically and appropriately be used for IT operations alongside virtual infrastructure. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Six Tips for Mixing Legacy Data with IoT

IT Toolbox

The data coming off those shiny new internet-of-things devices is unquestionably useful for business. But the utility of IoT data is greatly augmented when it is combined with legacy data sources. Consider the case of low-cost mobile weather sensors mounted on taxis.

Data 143
article thumbnail

Should the latest AWS outage scare you away from the public cloud?

Tech Republic Data Center

Amazon's S3 recently experienced widespread downtime, impacting multiple customers in its US-East region. Is this an indicator that you should rethink your cloud plans?

Cloud 119
article thumbnail

More than 60% of girls want encouragement from women in technical roles

Computer Weekly

Girls have admitted there are role models available to them from the science, technology, engineering and maths industries, but they want to hear from coders and developers

article thumbnail

Snap IPO Makes VC Firm Behind Nutanix, AppDynamics Valley Elite

Data Center Knowledge

Performance of Lightspeed funds over the last year is unprecedented in recent memory, analyst says. Read More.

169
169
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 VoIP Trends That Will Render Business Landlines Obsolete

IT Toolbox

Voice over Internet Protocol, or VoIP, is increasing in popularity as businesses realize the convenience and potential cost savings over traditional landline services. The increased demand is creating trends that will force rapid improvement in available technologies, making VoIP the new standard in voice communications. The following are five such trends that will render business landlines obsolete.

VOIP 142
article thumbnail

How to use OverSight to track when hackers access your webcam

Tech Republic Security

Certain Mac malware can access a user's webcam to spy on them undetected. Here's how you can use the free tool OverSight to protect yourself.

Malware 128
article thumbnail

DevOps done right: Why work-life balance matters to digital transformation success

Computer Weekly

DevOps practitioners warn enterprises off neglecting the health and well-being of the IT staff responsible for delivering their digital transformation projects

Devops 172
article thumbnail

Microsoft Said to Cut Purchases of HPE Servers for Cloud Service

Data Center Knowledge

New cloud server design forces HPE to compete with commodity hardware suppliers, lower server prices. Read More.

Cloud 166
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

When hacked home computers become business problems

IT Toolbox

Have you checked the security of your users’ home computers lately? Of course not. In a world where you struggle to keep up with critical servers, applications, and the like, there’s no way to reasonably evaluate the security of everyone’s home-based systems.

Course 142
article thumbnail

Enterprise IoT adoption to hit critical mass by 2019, but security remains a top concern

Tech Republic Security

Security breaches have impacted the vast majority of companies that have implemented IoT, according to a new study from HPE's Aruba.

Security 130
article thumbnail

Three-quarters of women in tech think workplace flexibility is key to retention

Computer Weekly

Women in the UK technology industry believe flexible working and career development opportunities are the key to retaining workers

Industry 167
article thumbnail

How to Get a Data Center Job at Facebook

Data Center Knowledge

Here’s what one of the world’s most cutting-edge data center teams is looking for. Read More.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.