Sat.Aug 19, 2017 - Fri.Aug 25, 2017

article thumbnail

Big Data Management: A Few Pointers First-Timers Should Remember

CTOvision

There is no doubt about it, data is becoming vital for small and large companies. One of the major reasons data is becoming more important probably deals with its power to save money and optimize performance. Still, to many, using big data is pretty new, so it might be a good idea to consider the following tips […].

Big Data 227
article thumbnail

Security professionals name top causes of breaches

Computer Weekly

Security professionals have named the top reasons for successful cyber attacks, which are affecting more than half of organisations

Security 253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is DeOS?

IT Toolbox

In these days of organized cyber attacks, you need security companies to be thinking one step ahead of the hackers, and now Cisco has come out with a new acronym to keep us awake at nights. No longer is DDoS (Distributed Denial of Service) our only worry, Cisco suggests that we need to think about Destruction Of Service (DeOS) attacks.

Security 173
article thumbnail

This is Europe’s Hottest Emerging Data Center Market

Data Center Knowledge

Cloud and content giants look south, as new submarine cables come online and demand for digital content spikes in Africa, Middle East, and Asia Read More.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […].

Malware 167
article thumbnail

Most firms don’t test, but rely on supplier to spec storage, finds survey

Computer Weekly

Most customers simply trust storage suppliers and resellers to recommend the right product for their workloads, while a small minority test their needs and involve application owners

Storage 201

More Trending

article thumbnail

Harvey: Hurricane Preparation Tips for Data Center Managers

Data Center Knowledge

Here are some essential steps data center crews should take before, during, and after an extreme-weather event Read More.

article thumbnail

FBI vs Apple: Policy Analysis

CTOvision

Editor’s note: This is the second in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg Despite foreboding tales of doom associated with the potential outcome on each […].

Analysis 152
article thumbnail

How AI can aid, not replace, humans in recruitment

Computer Weekly

Artificial intelligence is gaining prominence in a number of industries and brings advantages and disadvantages in the field of recruitment

article thumbnail

Seven Tricks for Better ERP Automation

IT Toolbox

ERP serves as a critical nerve center for most businesses that use them. This means that efficiency with an ERP system often directly translates into business efficiency. And that, in turn, drives competitiveness. One place where businesses frequently cede competitiveness to their nimble rivals is around the area of ERP automation.

System 157
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Uptime in Space and Under the Sea

Data Center Knowledge

How computers deployed in space and on the ocean floor may end up improving your bank's server farm. Read More.

Banking 186
article thumbnail

How to improve IoT security

Network World

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks. Proof comes from a recent meta-study titled The Internet of Hackable Things (pdf) from researchers at the Technical University of Denmark, Denmark; Orebro University, Sweden; and Innopolis University, Russian Federation—compiled from industry and academic research reports—that finds smart devices used in healthcare and s

Security 163
article thumbnail

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Malware 221
article thumbnail

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. To help them achieve this goal, software emerged on the market called mobile device management (MDM).

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

DCK Investor Edge: Why CoreSite is REIT Royalty

Data Center Knowledge

A new research report crowns CoreSite Realty the top REIT for total returns for the past three and five-year periods. Read More.

Research 161
article thumbnail

Musk, tech leaders urge UN to ban AI-powered lethal autonomous weapons

Tech Republic Security

A group of 116 tech executives recently penned an open letter urging the UN to double its efforts protecting against autonomous weapons, which some have called 'killer robots.

Groups 142
article thumbnail

Top UK directors lack training to deal with cyber attacks

Computer Weekly

The UK’s top firms and charities urgently need to do more to protect themselves from online threats, according to a government-backed audit

Training 218
article thumbnail

The LAN: A History of Network Operating Systems Part 3

IT Toolbox

Even though the earliest LANs were of this genre, by 1989 it appeared that they were on the way out. By 1992, however, new life had been breathed into peer-to-peer networking by both Novell and Microsoft, along with the popularity of Artisoft's LANtastic. We will take a close look at peer-to-peer LANs at a deeper level in some future posts.

LAN 151
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Investing in Women Literally Pays Off for Tech Companies

Data Center Knowledge

We're launching a series on women in the data center industry. Read More.

article thumbnail

Building an Awesome CLI App in Go Oscon 2017

SPF13

A workshop written and delivered by Steve Francia and Ashley McNamara at OSCON 2017. outlining the techniques, principles, and libraries you need to create user-friendly command-line interfaces and command suites before walking you through building your own app. Along the way, you’ll cover everything from how to design and build commands to working with and parsing flags, config files and remote config systems, and how to work with environment variables and 12-factor apps.

How To 113
article thumbnail

Cyber criminals hack Enigma to steal $500,000 in Ethereum

Computer Weekly

Hackers have reportedly used stolen contact details to trick investors into sending funds to a fake trading platform digital wallet, but some allege poor password security is to blame

Report 162
article thumbnail

Five ERP Tasks You Should Automate

IT Toolbox

Forget about artificial intelligence and the future of business for a minute, and let’s focus on where the machines can help businesses today with manual tasks via better ERP automation. Every department and specialization within the enterprise has routine, manual, and cumbersome tasks that can be transformed for greater efficiency through automation.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Apple Said to Be Mulling Iowa Data Center

Data Center Knowledge

Company would join Google, Facebook, Microsoft, who have data centers in Iowa Read More.

article thumbnail

This Linux tool could improve the security of IoT devices

Network World

The first rule of building a secure and feature-rich ecosystem is software management — push and pull software updates and software discovery through an app store mechanism from a trusted source. In the go-to-market IoT race, though, that often doesn’t happen. Many Internet of Things (IoT) product developers have ignored the traumatic early history of Microsoft Windows, Android and web platforms, and expoits of IoT devices — because software updates have not been designed in — are regularly repo

Linux 144
article thumbnail

Business confidence in managing digital threats low, survey shows

Computer Weekly

Business digital transformation and cyber threats have outpaced enterprise security capacity, a survey has revealed

Survey 205
article thumbnail

How Autonomous Chat Bots Work with CRM Data for Superior Customer Experiences

IT Toolbox

Artificial intelligence is all the rage. Trendy articles appear in technical and business journals alike touting the potential and promise of artificial intelligence in virtually every aspect of business operations. Some proposed uses are not going to become operationalized for at least a few years, but many are potentially doable today.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Survey: On-Prem Data Centers Lowest Investment Priority for IT Shops

Data Center Knowledge

Surprise, surprise: Public cloud sucking money away from in-house enterprise data centers Read More.

article thumbnail

What do macOS and Android have in common? Both are booming malware markets

Tech Republic Security

A new report from Malwarebytes reveals Android ransomware rose 137.8% from Q1 to Q2 2017, and macOS malware is at its highest levels ever. Here are the threats the two platforms face.

Malware 124
article thumbnail

Russian hackers expose allegedly doping footballers

Computer Weekly

Russian hacking group Fancy Bear has exposed 150 footballers worldwide for allegedly taking banned substances, underlining the importance of protecting personal data

Groups 159
article thumbnail

The Technological Era and the New Breed of Scammers

IT Toolbox

In this article, we will take a glance at some of the biggest cyber scams out there and how you can protect yourself from being tricked by these rascals.

154
154
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.