Sat.Jul 29, 2017 - Fri.Aug 04, 2017

article thumbnail

Merck Cyber Attack Will Cause Loss Of Innocent Life

CTOvision

For years we have heard warnings of cyber attacks against manufacturing processes and against infrastructure, and for years we have seen these attacks grow from theoretical to real. We have also seen many who do not know how connected these systems are say that all is well and the threat is being over stated. We […].

System 263
article thumbnail

ICO highlights challenge Slack-like tools pose to public sector FOI request compliance

Computer Weekly

The Information Commissioner’s Office outlines how the growing use of cloud-based communication channels could complicate how public sector organisations respond to Freedom of Information requests

Tools 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Are You Ready for a Multi-Cloud Future?

Data Center Knowledge

Sponsored by: Dell EMC and Intel There are so many conversations around cloud, moving to various types of cloud services, and how to leverage the power of hybrid. But, it’s important to note just how much cloud services – and hybrid, in particular, have been growing and where they are.

Cloud 206
article thumbnail

Five Questions Transformational Leaders and PMOs Should Address When Driving Digital

Social, Agile and Transformation

Let's consider the modern Project Management Office or PMO and what transformational leaders need from this function when driving digital transformation programs. The Role of the PMO Before Transformation In many organizations, the PMO is synonymous with bureaucracy and administration since many focus on tracking projects, managing budgets, defining project management standards, and.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Artificial intelligence: the megatrend that’s first among equals

CTOvision

Artificial intelligence (AI) isn’t business as usual. Because of complementary advances in natural language processing, machine learning, and image recognition, the range of tasks for which AI is well-suited is growing daily. And when a critical level of AI saturation is reached, we anticipate profound disruption in the world of work. Imagine a barrel perched […].

article thumbnail

Businesses failing to understand GDPR compliance status

Computer Weekly

With less than a year to go before the General Data Protection Regulation compliance deadline, many businesses are floundering, while others are embracing data-centric security to fast-track compliance

Security 205

More Trending

article thumbnail

Six CRM Tips for Better Data Management

IT Toolbox

Garbage in, garbage out. That’s one of the first lessons you learn in Comp Sci 101, and it definitely holds true for CRM. A CRM populated with outdated or inaccurate contact information does little for a company, and often it slows down operations. Sales staff call the wrong numbers. Marketing emails reach old addresses for a lower response rate.

Data 175
article thumbnail

Voting Machines Hacked at DEF CON in Las Vegas

CTOvision

Just how secure are the nation's voting machines, and how much should you worry about a hacker changing voting results? Based on what a group of hackers in Las Vegas, the machines are easily hacked, and voting results are not secure. Every year, there is a conference held in Las Vegas, called DEF CON, where ethical hackers […].

article thumbnail

Cyber criminals make it difficult to follow the money

Computer Weekly

Following the money is a classic technique used by law enforcement to link criminals to crimes by tracing associated financial exchanges, but that may not be easy in the case of the WannaCry attacks

Financial 201
article thumbnail

Sink or Swim? Five Steps to Big Data ROI

Data Center Knowledge

Whether we consider technologies that allow us to maximize computation, or algorithmic accuracy, analysis or even deeper knowledge, the question remains - how can we leverage big data? Read More.

Big Data 167
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Mist Systems is the Cloud WLAN Vendor With a (not so) Secret Weapon

IT Toolbox

Now that we’re years into cloud-enabled networking, it may not be all that exciting to hear from yet another cloud WLAN company. You might see Mist Networks as just another WLAN vendor trying to leverage the cloud to make their pitch, but there’s more here than meets the eye.

Cloud 167
article thumbnail

Bringing the Best Data Computing to Mobile

CTOvision

With each passing year, leading smartphone manufacturers unveil a wave of new mobile devices. Each new generation of smartphones is more powerful and capable than its predecessors. We are at the level of technological advancement where anyone with a smart device — smartphone or tablet — has enough computing power to complete most of their […].

Mobile 174
article thumbnail

Security Think Tank: Five security controls to keep employees out of cyber firing line

Computer Weekly

What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence?

Security 195
article thumbnail

What Europe’s New Data Protection Law Means for Data Center Operators

Data Center Knowledge

GDPR will have a wide impact, but few operators are ready. Read More.

article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

3 ERP Trends in 2017 That Will Define the Years to Come

IT Toolbox

Enterprise resource planning (ERP) technology has expanded in leaps and bounds over the last few years. As technology continues to evolve, ERP solutions typically experience the same evolution. If companies hope to remain competitive, they must be at the forefront of these new innovations.

Trends 162
article thumbnail

4 Tips to Develop an Automated Feedback System

CTOvision

Businesses need to put up feedback systems that will not only attract customers but retain them. Customers determine everything, from sales to product enhancement and delivery. Putting up an automated feedback system that collects information about customer reactions and desires is useful for decision-making, solving customer issues, and influencing product roadmap.

System 152
article thumbnail

Security audits reveal poor state of corporate cyber defences

Computer Weekly

Critical vulnerabilities detected in 47% of corporate systems investigated in security audits by Positive Technologies

Security 220
article thumbnail

What’s Behind AT&T’s Big Bet on Edge Computing

Data Center Knowledge

The telco wants to turn its sprawling network into infrastructure for the next generation of applications. Read More.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Emergence of ERP

IT Toolbox

Enterprise resource planning (ERP) solutions have revolutionized the way businesses operate, because one integrated system can manage several functions. It hasn't always been this sophisticated, though. The earlier models could only handle a limited number of business processes, but over time ERP emerged into the multifaceted technology that enterprises rely on today.

article thumbnail

O’Reilly Security Conference NY Oct 29-30 2017

CTOvision

The O'Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. It covers interesting successes (and failures), provocative ideas, practical how-tos, proven best practices, and effective new approaches that can benefit all defenders.

article thumbnail

Security Think Tank: Are employees cyber pawns or cyber heroes?

Computer Weekly

What are the best security controls to ensure a safe working environment where employees do not have the unfair pressure of being the first line of cyber defence?

Security 184
article thumbnail

Microsoft’s Cloud Market Share Grew More than Anyone Else’s Last Quarter — Analysts

Data Center Knowledge

Synergy says global cloud and SaaS market size on track to surpass $200B by 2020 Read More.

Cloud 192
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Omnichannel Brings to Collaboration and Customer Care

IT Toolbox

My last few posts have focused on customer care, mainly to show an evolution unfolding around what drives value in the contact center, and how collaboration plays a central role.

146
146
article thumbnail

Register Now For Data Event Of The Year: Strata Data New York 25-28 Sep 2017

CTOvision

The yearly Strata Data conference (formerly known as Hadoop World) will be 25-28 Sep 2017. This is the place to be to network with peers, learn lessons from others in the field, and track the status of the greatest technological solutions in the Big Data field. Topics include: AI, Big data & the Cloud, Data […].

Data 151
article thumbnail

BT makes firm offer to meet USO broadband commitment

Computer Weekly

BT has made a firm offer to become the designated provider of the 10Mbps Universal Service Obligation broadband service

Meeting 214
article thumbnail

The Rise of the Open Software Platform

Data Center Knowledge

In today’s fast-paced business environment, innovation gives organizations a serious competitive advantage and an open system is the only way to fully take advantage of it. Read More.

Software 133
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Important Things to Consider When Developing a New App

IT Toolbox

Developing apps can be a complex job, given the fact that there many factors you need to consider before you even start working on a brand new app.

article thumbnail

Russia VPN ban: What tech pros and business travelers need to know

Tech Republic Security

Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.

Travel 149
article thumbnail

FBI arrests UK WannaCry hero on malware charges

Computer Weekly

The Briton credited with stopping the WannaCry global malware attacks in their tracks in May has been arrested in the US on malware charges

Malware 194
article thumbnail

Data Center Trends Shift Staff Workloads

Data Center Knowledge

Achieving the promise of new technologies requires changing work assignments and updating skill sets. Read More.

article thumbnail

Next-Gen Procurement: Transforming Processes with the Power of Generative AI

Generative AI goes beyond just automating tasks and providing real-time answers. Did you know that implementing generative AI reduces sourcing cycle times and allows for faster decision-making across procurement operations? In this whitepaper — Next-Gen Procurement: Transforming Processes With the Power of Generative AI — experts reveal how the strategic application of generative AI within procurement processes is paving the way for groundbreaking improvements.