November, 2016

article thumbnail

Micro Explanations For Nine Essential AI Technologies

Forrester IT

Artificial Intelligence (AI) is not one big, specific technology. Rather, it is comprised of one or more building block technologies. So, to understand AI, you have to understand each of these nine building block technologies. Now, you could argue that there are more technologies than the ones listed here, but any additional technology can fit under one of these building blocks.

article thumbnail

Cognitio’s Bob Flores, Ex-CIA CTO, Featured in IDG TechWorld Providing Context On the Cyber Threat

CTOvision

Bob Gourley. Cognitio's Bob Flores, former CTO of the CIA, was just featured in IDG TechWorld providing context on the state of the cyber threat. From the article: The former CTO of America's Central Intelligence Agency , Bob Flores, has said the gravest cyber security threat facing the world is the lack of protection for critical infrastructure and the internet of things – and that it's worth challenging narratives about attacks from nation states that get repeated without criticism.

CTO 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Moncton Colo Becomes the Hottest IPv6 Submarine Cable Port

Data Center Knowledge

With a population under 70,000, Moncton, New Brunswick was originally known for its wine and food festivals as a tourist destination, and its location just a few miles from the beaches. But geographic positioning smack in the center of Canada’s Maritime Provinces and close to the Northumberland.

IPv6 219
article thumbnail

Cyber security image putting women and girls off, says panel

Computer Weekly

There is still a lot of work to be done to change the perception of cyber security and corporate culture to attract more women to the profession, according to a panel of security professionals

Security 216
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

Data 131
article thumbnail

IoT security camera infected within 98 seconds of plugging it in

Network World

One and a half minutes is all it took after plugging in an internet-connected security camera for the camera be infected with malware. Unlike the average Jane or Joe Doe who would not want their security camera to be immediately infected with malware, Rob Graham, CEO of Errata Security, called it “ fun ” to watch the infection happen. He tweet-documented his experience.

Security 132

More Trending

article thumbnail

MXNet - Deep Learning Framework of Choice at AWS

All Things Distributed

Machine learning is playing an increasingly important role in many areas of our businesses and our lives and is being employed in a range of computing tasks where programming explicit algorithms is infeasible. At Amazon, machine learning has been key to many of our business processes, from recommendations to fraud detection, from inventory levels to book classification to abusive review detection.

article thumbnail

54-Terabit Submarine Cable Linking Asian Nations Goes Live

Data Center Knowledge

There would be a ribbon-cutting ceremony, except you’d need scuba divers: One of the world’s most ambitious optical network connection projects is now officially complete, and beginning the process of opening itself up for business. Japan’s NTT Communications, representing a partnership of major.

Network 219
article thumbnail

HyperGrid launches HyperCloud containerised hybrid cloud platform

Computer Weekly

Hyper-converged appliance maker HyperGrid promises full two-way workload portability between on-premise hardware, private cloud and public cloud services in HyperCloud launch

Cloud 215
article thumbnail

Don't let yourself be targeted by cybercriminals: Here are 6 tips for safe holiday shopping

Tech Republic Security

Online shopping is easy and convenient, and more people are doing it than ever before. The rise in e-commerce also gives cybercriminals more opportunities to rob you blind. Here's how to stay safe.

How To 131
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

There’s a war on for cybersecurity talent

Network World

Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions, experts say. That means redefining jobs, training human resources departments to screen resumes differently, seeking latent talent already inside the organization, and hiring bright, motivated people who can grow into critical roles, according to an expert panel speaking at the recent Advanced Cyber Security Center conference in Boston.

article thumbnail

Artificial Intelligence: Fact, Fiction. How Enterprises Can Crush It

Forrester IT

Forrester surveyed business and technology professionals and found that 58% of them are researching AI, but only 12% are using AI systems. This gap reflects growing interest in AI, but little actual use at this time. We expect enterprise interest in, and use of, AI to increase as software vendors roll out AI platforms and build AI capabilities into applications.

article thumbnail

Why digital transformation is forcing IT to evolve

Tech Republic Data Center

The Facebook 100Gbps data center switch is a indicator of how traditional enterprise vendors no longer drive innovation. This is forcing IT to change the way they operate.

article thumbnail

Equinix Begins Trials of Facebook’s White Box Transponders

Data Center Knowledge

The first tests of a promising new technology in the U.S. based on Facebook’s open source switches, gets under way with the colocation leader in charge. In a sign of how far the Open Compute Project’s communications offshoot, the Telecom Infra Project (TIP), has evolved since its formation just.

article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Dutch bank ING to spend millions ‘disrupting’ its own business

Computer Weekly

Dutch bank ING used digital technology to reinvent itself following the financial crash, and is about to reinvent itself again, says its global CTO, Brendan Donovan

Banking 219
article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Security 131
article thumbnail

5 things you need to know about virtual private networks

Network World

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks.

article thumbnail

Forrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017

Forrester IT

I'm pleased to announce that Forrester's cloud computing predictions for 2017 published this morning! Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 -- and what you should do about them today. Cloud computing has been the most exciting and disruptive force in the tech market in the last decade, and it will continue to disrupt traditional computing

Industry 310
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

How to install VirtualBox Guest Additions on a GUI-less Ubuntu server host

Tech Republic Data Center

The VirtualBox Guest Additions gives a performance boost and extra features to your hosts. Follow these steps to install this package on a GUI-less Ubuntu server guest.

How To 130
article thumbnail

Not Really a Bro-mance: Broadcom Wanted Brocade’s FC Storage

Data Center Knowledge

When Brocade Communications completed its acquisition of municipal Wi-Fi provider Ruckus Wireless last May, it informed investors that the deal would create a new kind of pure-play networking company. That seemed to be what the networking technology market wanted… up until this morning, when.

Storage 201
article thumbnail

Cern to track job applicants ‘at the speed of light’

Computer Weekly

The nuclear research laboratory in Geneva, famous for tracking sub-atomic particles, is developing a cloud service to track of thousands of people who apply for jobs each year

article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

Study 130
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

IBM: Many companies still ill-prepared for cyber attacks

Network World

When it comes to responding to cyber-attacks it seems many companies are severely lacking. A study out this week conducted by the Ponemon Institute and sponsored by Resilient an IBM company said that 66% of the 2,400 security and IT professionals they interviewed said their organization is not prepared to recover from cyberattacks. +More on Network World: Cisco: Potent ransomware is targeting the enterprise at a scary rate + According to Ponemon, for the second straight year the Cyber Resilient

IBM 130
article thumbnail

2017 Predictions: Big Data, Digital, and Virtual Care Key to Engage Healthcare’s Empowered Consumer

Forrester IT

The healthcare industry is changing rapidly as its consumers begin to demand more of the organizations from whom they receive care and insurance. Not only are healthcare consumers sharing more financial risk for the insurance and care they receive, but they are increasingly purchasing insurance outside of group contracts via exchanges or Medicare and Medicaid programs.

Big Data 307
article thumbnail

In the future of the data center, IBM is betting big on cognitive computing

Tech Republic Data Center

IBM's Mac Devine spoke at the 2016 Structure Conference on how IoT, big data, and cognitive computing are changing the way that enterprises are approaching their infrastructure.

IBM 163
article thumbnail

Microsoft to Build Out, Probably Upgrade, Boydton Data Center

Data Center Knowledge

The timing of the company’s move points to the likelihood that it may be upgrading its facility near Richmond and Raleigh for its “Generation 5” DC platform. Read More.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Software-defined storage: The pros and cons, and what is available

Computer Weekly

Software-defined storage is a rapidly rising trend in the datacentre, but what are the advantages and disadvantages of building your own storage, and is it suitable for all organisations?

Storage 255
article thumbnail

?Is the cloud really just someone else's computer?

Tech Republic Cloud

A popular meme is that the cloud is just "someone else's computer." Jack Wallen explains why the cloud is so much more complex than the meme would have you believe.

Cloud 131
article thumbnail

Google security expert says antivirus apps don’t work

Network World

A senior security engineer at Google told a hacker conference that traditional antivirus apps that use intrusion detection are useless and companies should switch to meaningful methods such as whitelisting applications. At Kiwicon X , the New Zealand equivalent of the Black Hat conference held in the United States, Darren Bilby called many existing tools ineffective "magic" that engineers are forced to install for the sake of compliance but at the expense of real security.

Google 131
article thumbnail

Forrester Predictions: Ten Key Developments In Cloud Computing Shape The Industry In 2017

Forrester IT

I'm pleased to announce that Forrester's cloud computing predictions for 2017 published this morning! Check out Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade. Our cloud team has gathered ten key developments in cloud computing that will shape this industry in 2017 -- and what you should do about them today. Cloud computing has been the most exciting and disruptive force in the tech market in the last decade, and it will continue to disrupt traditional computing

Industry 298
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.