Sat.May 13, 2017 - Fri.May 19, 2017

article thumbnail

C-Level Business Executives Are Playing A Bigger Role In Tech Spending, But CIOs Still Remain Dominant

Forrester IT

Tech buying in business and governments is clearly shifting from the sole or primary control of the CIO and the tech management organization and into the hands of business leaders. But how much is this happening? Anecdotal comments and surveys - including Forrester's own Business Technographics surveys - suggest that most tech purchases are now controlled by business executives.

Survey 361
article thumbnail

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Computer Weekly

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Storage 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Marty Meehan. Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. The SFN8722 OCP offers 10GbE performance, which is critical for today’s data centers where ultra scale dominates the market, supports 1000s virtual NICs and dual 10 GbE ports, and provides

Software 194
article thumbnail

NVIDIA CEO: AI Workloads Will “Flood” Data Centers

Data Center Knowledge

Data center managers in every industry have to answer some key questions to prepare for AI Read More.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Five Factors That Make Deep Learning Different - Go Deep Baby!

Forrester IT

At the highest conceptual level, deep learning is no different from supervised machine learning. Data scientists start with a labeled data set to train a model using an algorithm and, hopefully, end up with a model that is accurate enough at predicting the labels of new data that is run through the model. For example, developers can use Caffe, a popular deep-learning library, to train a model using thousands or millions of labeled images.

Training 329
article thumbnail

Brits expect driverless cars to outnumber normal cars in 15 years

Computer Weekly

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Survey 228

More Trending

article thumbnail

Report: AI Tells AWS How Many Servers to Buy and When

Data Center Knowledge

Amazon’s cloud CEO Jassy says company uses Machine Learning for data center capacity planning Read More.

article thumbnail

Product Development Must Evolve for the Internet of Things

Forrester IT

Traditional physical products and machinery are steadily being replaced by connected products and assets that shift business models and augment customer relationships with digital experiences and data. But creation of these products is a major challenge for traditional product companies. The process of building connected products is complex, requiring new software development skill sets, accelerated product release cadences, and innovative software tools and proccesses that meet the needs of IoT

Internet 323
article thumbnail

Financial services firms advised to ditch private datacentres and invest in cloud

Computer Weekly

DTCC whitepaper claims financial services firms that shun cloud are at heightened risk of running into resiliency, security and performance issues.

Financial 224
article thumbnail

Cybersecurity Executive Order Provides Agency Leadership with Opportunities and Challenges

CTOvision

Marty Meehan. President Trump’s “Presidential Executive on Strengthening US Cybersecurity and Critical Infrastructure" is significant as it discusses improvements to the Nation’s digital infrastructure, protection of the power grid, replacement of antiquated IT systems, protection against cyber threats. It also makes government leadership accountable for cyber deterrence.

Budget 158
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

ASHRAE 90.4: Why This Data Center Standard Matters

Data Center Knowledge

In September of 2016, the American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) published a new and improved standard that establishes the minimum energy efficiency requirements for data centers. ASHRAE 90.4-2016 has been in development for several years. Overall, this.

article thumbnail

Data is the perimeter, defend it that way

Forrester IT

Data is the perimeter, defend it that way. Unless you have been living under a rock or possibly hiding in the mountains of Montana with a giant beard and eating way too many government issued MRE's you probably heard about the nuclear bomb of a ransomware attack that kicked off last week. Welcome to the post apocalypse folks. For years, many of us in the cybersecurity industry have been jumping up and down on desks and trying to get the world (writ large) to pay attention to managing and patchin

Data 319
article thumbnail

Half of CIOs have no Brexit plan because of uncertainty

Computer Weekly

Uncertainty caused by the UK leaving the EU has caused a pause in activity for half of CIOs, while the others are accelerating their digital transformation

211
211
article thumbnail

Voicemail Is Dead. Get over It!

IT Toolbox

Over the past 10 years or so, many authors have written about the death of voicemail, but it lingers, barely surviving. I’m here to tell you that despite apparent survival, it really is dead and it’s about time to just get over it.

176
176
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Microsoft to Open Africa Data Centers to Seek Edge in Cloud Push

Data Center Knowledge

Software maker vies with Amazon to target African customers; customers including Standard Bank to benefit from new hubs Read More.

article thumbnail

IBM to retire Emptoris and work with SAP Ariba on next generation digital procurement

Forrester IT

SAP Ariba & IBM today announced a partnership that had been a rumour for a few days now. Part of the deal includes IBM gradually retiring Emptoris and encouraging its customers to migrate to SAP Ariba. [link]. It's an ambitious move by SAP Ariba. IBM Emptoris's leadership had an exciting vision of next gen digital procurement but decided they couldn't deliver it without a cost prohibitive replatforming of its various products.

SAP 239
article thumbnail

Interview: Mark Potter, CTO, HPE

Computer Weekly

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

CTO 218
article thumbnail

5 Must Have PC Peripherals That Will Improve the Quality of Your Life

IT Toolbox

If you were wondering which upgrade or add-on to get for your PC, you are at the right place. Here are 5 must have PC peripherals that will completely change how you perceive and use your computer.

162
162
article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Should You Go With AWS or Azure? That May Be the Wrong Question

Data Center Knowledge

RightScale’s “2017 State of the Cloud” report also indicates that 85 percent of enterprises have multi-cloud strategies, a three-point rise over the previous year. This is as it should be. Read More.

Cloud 164
article thumbnail

Five DevOps Lessons from a CIO Getting in the Weeds on AWS

Social, Agile and Transformation

I always advise CIOs and technologists to get into the weeds to figure out what's going on. So last week I spent some time getting a number of AWS services up and running. Nothing too crazy, but successful. My first project was to set up a new domain, Driving-Digital.com on AWS Route 53 to enable landing pages and vanity URLs for my upcoming book, Driving-Digital: The Leader's Guide to.

Devops 160
article thumbnail

Strong cyber security posture reduces impact of breaches

Computer Weekly

There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed

Security 195
article thumbnail

4 Strategies for Staying Within Your ERP Budget

IT Toolbox

Even if your company is taking advantage of the latest, most cost-effective enterprise resource planning (ERP) software available, it’s still possible—even probable—that it will spend outside its ERP budget. Various factors come into play to explain this cost overrun, including hidden fees and poor planning.

Budget 157
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google to Sell New AI `Supercomputer’ Chip Via Cloud Business

Data Center Knowledge

Move may test Nvidia’s grip on high-end semiconductor market and help Google catch cloud leaders Amazon, Microsoft Read More.

Google 189
article thumbnail

Just Exactly How Legal Is It To Track Your Employees?

The Accidental Successful CIO

Just because you can, does not mean that you should track employees Image Credit: Gabriel Garcia Marengo. As the person with the CIO job, you have a great deal of power that comes with your assignment dealing with importance of information technology. The big question that you always need to be dealing with is just exactly how should you go about using this power?

Insurance 140
article thumbnail

Neustar launches international security council

Computer Weekly

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Security 185
article thumbnail

Where Business is Getting IoT Security Wrong

IT Toolbox

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices.

Security 140
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More.

article thumbnail

United flight attendant accidentally leaked cockpit security codes to public website

Tech Republic Security

United Airlines recently alerted staff that cockpit access codes has been posted online, raising concerns about the chain of ownership for sensitive data.

Airlines 165
article thumbnail

How AI will enhance user experience and boost productivity

Computer Weekly

We meet the head of Microsoft’s Fuse Labs, Lili Cheng, to find out how artificial intelligence holds the promise to extend computing beyond graphical user interfaces

article thumbnail

WannaCry shouldn't have made you weep.

IT Toolbox

Again, we have the means to protect against ransomware and vicious worms. We must get better at using them.

180
180
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.