September, 2016

article thumbnail

How To Unlock Tech Industry Digital Transformation

Forrester IT

It's no surprise that tech companies are vested in the digital transformation of their customers. But many tech companies find it difficult to leave their product-centric models behind and focus on customer outcomes. That's just one of the findings from the research published on digital transformation in the tech sector. True customer obsession demands an outside-in perspective.

Industry 315
article thumbnail

A Timeline of Big Data Analytics

CTOvision

Rick Delgado. The world seems to run on big data nowadays. In fact, it’s sometimes difficult to remember a time when businesses weren’t intensely focused on big data analytics. It’s equally difficult to forget that big data is still relatively new to the mainstream. The amount of data being generated in the world today is immense, and it’s only getting bigger.

Big Data 295
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I’m joining the Go team at Google

SPF13

I am honored to share that I have joined Google as a member of the Go team and will be primarily based in NYC. Why I joined. My passion has always been building great products, ecosystems and experiences through open source. The desire to create transformative experiences has led me down some wonderful and life changing roads. I’ve been fortunate enough to combine that passion with employment for most of the last decade.

Google 220
article thumbnail

Apple, Amazon Unveil Major Renewable Energy Deals to Power Cloud Data Centers

Data Center Knowledge

The current surge of data center construction projects by internet and cloud giants is accompanied by a surge in investment in renewable energy generation capacity. Read More.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Italian bottle maker deploys 88TB of Syneto hyper-converged storage

Computer Weekly

Serioplast gets reliable disaster recovery as it replaces NetApp plus remote physical servers with Syneto hyper-converged infrastructure at factories across Europe, Africa and Asia

article thumbnail

Modern Software Development - Why Less Code is More

Social, Agile and Transformation

Last week I participated in a panel, "The Future of Software" at the Northeast Javascript conference and was asked a question about code quality. "Are you seeing better or worse code coming from developers today?" "I am seeing less code today." I'm not just talking about low code platforms that can enable software developers and citizen developers to build entire applications with relatively.

More Trending

article thumbnail

Cognitio and ThreatBrief in People Magazine: Security tips for the general public

CTOvision

Bob Gourley. One of the key lines of business at Cognitio is our cybersecurity practice. We help enterprises build action plans to mitigate risks and improve their security posture. Increasingly we are also asked to provide tips and techniques for employees to consider in their personal lives. Every person with a computer or phone has information at risk and should take personal responsibility for improving their security posture.

Security 286
article thumbnail

Creepy clowns cause sheriff to consult with FBI and Homeland Security

Network World

If you are going to be dressing up in a costume for Halloween, you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.

Security 132
article thumbnail

Latest Microsoft Data Center Design Gets Close to Unity PUE

Data Center Knowledge

Innovation in data center design by cloud giants has widespread implications for their users as well as for the data center industry in general. Read More.

article thumbnail

Investigatory Powers Bill – the case for mass surveillance

Computer Weekly

As the Investigatory Powers Bill goes through its final stages in Parliament, a former GCHQ intelligence officer puts the case for the bulk surveillance powers contained in the legislation

206
206
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

article thumbnail

Bosch And SAP Agree A Strategic Internet Of Things (IoT) Partnership To Facilitate Data Orchestration

Forrester IT

I recently attended an event at which Bosch and SAP announced a major partnership to more closely align their respective cloud and software expertise around the industrial internet of things. This partnership underlines the fact that SAP and Bosch are prepared to significantly transform their respective business models to generate new value for their customers.

SAP 280
article thumbnail

6 tips to get the most out of Google Apps for Education

Tech Republic Cloud

More and more educational organizations are moving to Google Apps for Education. Tim Burke of BetterCloud suggests a few best practices for Google Apps admins in the space.

Education 123
article thumbnail

IDG Contributor Network: Passwords will be wirelessly transmitted through bodies

Network World

Low-frequency transmissions created by off-the-shelf biometric devices, such as fingerprint sensors, can be diverted through the body and can securely transmit password-like authentication. The off-the-shelf biometric sensors, such as touchpads, are “re-purposed to send out information,” says Shyam Gollakota, University of Washington assistant professor of computer science and engineering and senior author on the research paper, in a University of Washington article.

Wireless 131
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

Microsoft, Google Downtime Offers Reminder That Cloud Isn’t Perfect

Data Center Knowledge

A pair of massive service outages involving two of the largest cloud players this month comes at a time when the industry is arguably on the verge of eradicating any lingering concerns about the security or reliability of public cloud. Read More.

Cloud 189
article thumbnail

NGOs challenge UK and US mass surveillance in human rights court

Computer Weekly

Privacy International, Liberty and the American Civil Liberties Union are among 10 human rights groups backing a landmark challenge to mass surveillance in the European Court of Human Rights

Groups 205
article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

Internet 167
article thumbnail

Enterprise Architecture Awards 2016 — Enterprise Architecture As A Verb, Not A Noun

Forrester IT

Forrester and InfoWorld set the theme for this year's awards as 'Speed and Responsiveness - And EA". The underlying premise is that business leaders are demanding that their business moves faster - everything from updating digital capabilities to bringing more agility in how firms work with customers and suppliers. In theory, enterprise architecture is a key capability to moving faster.

article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Why data centers fail to bring new jobs to small towns

Tech Republic Data Center

Apple, Amazon, Google, and Microsoft continue building large data centers in rural areas, but most do not create jobs for local residents. Here's what you need to know.

article thumbnail

Researchers remotely hack Tesla Model S while it is being driven

Network World

Chinese researchers from Keen Security Lab of Tencent announced that they could chain multiple vulnerabilities together which allowed them to remotely hack the Tesla Model S P85 and 75D from as far as 12 miles away. The researchers said: As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars.

Research 131
article thumbnail

Microsoft Data Center to Guard Utility Grid from Blackouts

Data Center Knowledge

As the power requirements of its data center in Cheyenne, Wyoming, approach 35MW, Microsoft and its energy provider in the area are laying the groundwork to ensure the site can continue to grow. Read More.

article thumbnail

Trust issues stifling digital economy growth, study shows

Computer Weekly

Businesses that have products and services based on trust have a significant opportunity to future-proof their business, but those who do not risk being side-lined, a study shows

Study 197
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Blockchain: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about the blockchain, the innovative technology that powers Bitcoin, Litecoin, and other cryptocurrencies.

130
130
article thumbnail

The Documentum Shoe Finally Drops.As ECM Undergoes a Changing of the Guard

Forrester IT

My colleague Craig Le Clair did a nice wrap-up of the long-anticipated news of the divestiture of the Enterprise Content Division (ECD) from the newly merged Dell-EMC entity. The move to spin off the Documentum, InfoArchive and Leap platform was expected, it wasn't entirely clear over the last few months who the lucky buyer would be. Step up OpenText!

HP 278
article thumbnail

GE and Intel 'superbrain' turns trains into mobile data centers

Tech Republic Data Center

The new platform will eventually provide GE's 21,000 trains worldwide with processing, wireless communication, data storage, and video capabilities.

Training 129
article thumbnail

Cisco Talos: Spam at levels not seen since 2010

Network World

Spam is back in a big way – levels that have not been seen since 201o in fact. That’s according to a blog post today form Cisco Talos that stated the main culprit of the increase is largely the handiwork of the Necurs botnet, stated the blog’s author Jaeson Schultz. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!

Network 131
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Average Security Incident Costs SMBs More Than $85,000: Report

Data Center Knowledge

Roughly half of businesses in the U.S. (49 percent) and globally (52 percent) assume that their IT security will be breached sooner or later. Read More.

Security 194
article thumbnail

Finance consultancy puts blockchain apps in the cloud

Computer Weekly

US fintech services provider Synechron makes a number of its blockchain applications available in the cloud to help financial services firms get to grips with the emerging technology

Cloud 198
article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

Intel 126
article thumbnail

Tech Vendors Must Evolve Or Crumble: The Report You Must Read

Forrester IT

Which companies do you feel are the dominant players in the technology industry? Are they the names that have dominated for years, like Cisco, the newly merged Dell (plus EMC), the recently split HP, Inc. and HPE, IBM, Microsoft, or Oracle? Is it one of the newer cloud titans like AWS, Google, IBM, or Microsoft ? Will cloud demolish the tech industry as we know it?

Report 272
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.