Sat.Mar 25, 2017 - Fri.Mar 31, 2017

article thumbnail

Bosch Connected World 2017 – Lessons From IoT Practitioners

Forrester IT

With Paul Miller. In March 2017, Bosch hosted its annual internet-of-things (IoT) conference, Bosch Connected World (BCW), in Berlin. Since last year, the event has doubled in size, attracting 2,500 attendees from businesses and vendors. This jump reflects the growing interest in IoT. The number of attendees, however, also highlights the relative immaturity of IoT compared with bigger technology themes.

Internet 395
article thumbnail

First cyber security startups graduate from GCHQ accelerator

Computer Weekly

The first group of companies has completed a government-led cyber accelerator programme aimed at helping UK startups take the lead in producing the next generation of cyber security systems, with another round to be announced in 2017

Security 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Risk of Data Increases When Employees Leave

CTOvision

Crystal Lister. Employee turnover can potentially have serious effects on an organization’s productivity, morale, profit, financial resources, and increase an organization's digital risk posture. The data that employees work with and have access to becomes more vulnerable and susceptible to leaks as employees prepare for departure. Current research shows that employees are increasingly taking sensitive or proprietary information with them when they depart an organization, whether intentionally o

Data 174
article thumbnail

5 Data Integration Benefits of Hosted VoIP Service

IT Toolbox

Making the switch to hosted voice over IP telephony (VoIP) service can enable your organization to unlock crystal-clear business communications at a fraction of the cost of plain old telephone services (POTS). However, you'll also be in a position to unlock massive benefits to your internal productivity and customer satisfaction. The secret?

VOIP 163
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Technology Management - 5 to 7 years from now

Forrester IT

Technology organizations will get smaller, faster and more specialized. [link]. There have been many "this will end IT as we know it" events. The PC, client/server, the web, and outsourcing have all changed tech organizations, but not fundamentally. This time things are different. Five to seven years from now, these organizations will resemble current ones, just as the first cell phones resemble the iPhone.

Agile 265
article thumbnail

Dads aren't the problem: we need mums onside to get girls into Stem

Computer Weekly

Fathers are rarely a barrier for girls trying to pursue careers in science, technology, engineering and maths, but we need to get mothers on board, according to an expert panel

More Trending

article thumbnail

6 Ways to Improve VoIP Call Quality

IT Toolbox

A VoIP system facilitates telephone calls over the Internet, which delivers increased functionality for business communications. But the quality of audio achieved is subject to several variables, and just one wrong choice of hardware or software can result in a disappointing connection. Here are six steps you can take to maximize the VoIP call quality within your business. 1.

VOIP 161
article thumbnail

Trust Must Be The Foundation Of Your B2B Digital Ecosystem

Forrester IT

Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. Trust is one of the most vital elements of any business relationship. But the shift away from linear value chains focused on internal relationships toward more open networks of relationships in the context of digital ecosystems has made trust a critical driver of new revenue opportunities and more efficient operations.

B2B 265
article thumbnail

UK leading in using red team cyber security testing

Computer Weekly

Red teaming is set to become a key approach to ensuring cyber security controls and processes are fit for purpose and compliant with regulations, and the UK is leading the way

Security 191
article thumbnail

Seven Big Reasons to Move Backup to the Cloud

Data Center Knowledge

If your organization is growing, processes large volumes of data, or is required to comply with regional data privacy laws, it may pay to take the pledge to move your backup to the cloud on World Backup Day this year. Read More.

Backup 148
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Five Ransomware Defenses to Consider

IT Toolbox

Ransomware is like electrical surges. We all know electrical surges can and do affect computer equipment, and most computers are tethered to surge protectors at some point. Our actual effort at protecting against surges and brownouts is minimal, however, unless we’ve had an incident and learned the importance of power protection the hard way. The same goes for ransomware.

141
141
article thumbnail

Release management strategies for agile development teams

Social, Agile and Transformation

Is release management part of your agile practice? Are you able to tell stakeholders target dates for your next application releases? Are you tracking how often your teams hit these targets and which releases hit the targeted scope and quality? I’ve asked this question of many teams and hear various answers. Some are practicing continuous delivery, others attempt to formalize release plans.

Agile 137
article thumbnail

More than a quarter of SME staff lack cyber threat training

Computer Weekly

Data from cyber insurance provider CFC Underwriting shows that 38% of its claims in 2016 could have been avoided through better staff education and training on cyber risks

Training 160
article thumbnail

Hybrid IT is Today’s Reality, Not the Future

Data Center Knowledge

IT professionals should not assume that providing more cloud resources, larger instances, and faster databases will be the right answer to all performance questions—that’s often how sticker shock and technical issues arise. Read More.

Resources 147
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Do Service Companies Use Customer-Generated IoT Data?

IT Toolbox

The Internet of Things (IoT) is about “things.” How these “things” are used in service businesses varies widely, and companies don’t often think of it when they examine their service delivery processes. In many service companies, “things” tend to be of less importance than customer service, on-time performance, quality metrics, and so on.

Company 130
article thumbnail

Social Media Secrets That All CIOs Need To Know

The Accidental Successful CIO

Getting the most out of social media can require help from the CIO Image Credit: Sean MacEntee. I’m thinking that by now we can all agree that social media is important. However, how to go about using it correctly is a bit of a mystery. Every company wants to make the most of the free service that each of the different social media channels offers, but the challenge is that they are not 100% exactly how to go about doing this.

Media 126
article thumbnail

Non-malware attacks pose bigger threat than malicious software

Computer Weekly

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

Malware 145
article thumbnail

Let’s Talk about Women in the Data Center

Data Center Knowledge

As the male-dominated industry struggles with an aging workforce, an effort to encourage women to get involved is long overdue. Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

6 Lesson Learned from ERP Case Studies

IT Toolbox

There are a thousand different sayings highlighting how much you can learn by looking at the past experiences of similar people. This is especially true when it comes to evaluating whether ERP is right for your company and what to expect once it’s implemented.

article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

Company 126
article thumbnail

Nearly half of UK businesses lack a cyber security strategy

Computer Weekly

Commentators call on security industry to do more to help businesses understand the value of data and how best to protect it

Security 167
article thumbnail

Microsoft Opens Its First European Lab for Internet of Things

Data Center Knowledge

Moves to grab piece of spending as Europe’s industrial companies modernize with sensors and software Read More.

Internet 158
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Report: 95% of businesses have migrated critical applications to the cloud

Tech Republic Cloud

SolarWinds recently released its 2017 IT trends report, examining the effects of increasing cloud adoption on IT and the shift to a hybrid infrastructure.

Report 130
article thumbnail

10 practical privacy tips for the post-privacy internet

Network World

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves. You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you.

Internet 122
article thumbnail

Association of Recruitment Consultancies asks MPs to delay roll-out of IR35 reforms

Computer Weekly

The chairman of Association of Recruitment Consultancies calls for introduction of IR35 reforms to be put on hold until numerous issues pertaining to the legislation are resolved

136
136
article thumbnail

European Data Center Startup Etix Bets on R&D, Edge Markets

Data Center Knowledge

The company is quickly building out a global network of lights-out data centers. Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Writing Your Cloud PBX Shopping List

IT Toolbox

When you go with a cloud private branch exchange (PBX), you’re exchanging expensive on-premises equipment and maintenance for a virtual PBX run by a cloud voice over IP (VoIP) provider.

Cloud 122
article thumbnail

New IBM security tool uses machine learning to help businesses detect phishing

Tech Republic Security

A new solution from IBM Trusteer automates website classification and can help label phishing websites 250% faster than traditional methods.

IBM 131
article thumbnail

Blockchain starts to prove its value outside of finance

Computer Weekly

Technology behind bitcoin is being adopted in supply chains, power networks and even to support independent musicians

Network 162
article thumbnail

Digital Bridge Buys Vantage, Silicon Valley’s Largest Wholesale Data Center Firm

Data Center Knowledge

Santa Clara company becomes new US data center market consolidator's wholesale platform Read More.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.