Tue.Apr 23, 2024

article thumbnail

Why we suck at estimating software projects

InfoWorld

Okay, so I’m just going to go ahead and say it: It is impossible to accurately estimate a software project of any significance. Now, a non-trivial number of you are going to read that sentence and think I’m nuts. And maybe I am. But someone has to just say what we all know to be true but don’t want to admit. Look, there have been countless books written, innumerable conferences held, untold consulting hours purchased, and endless blog posts written on how to be better at estimating software pro

article thumbnail

CIO risk-taking 101: Playing it safe isn’t safe

CIO

As CIO, you’re in the risk business. Or rather, every part of your responsibilities entails risk, whether you’re paying attention to it or not. And in spite of the spate of books that extol risk-taking as the only smart path, it’s worth remembering that their authors don’t face what might be the biggest risk CIOs have to deal with every day: executive teams adept at preaching risk-taking without actually supporting it.

Insurance 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Preventing Ransomware Attacks at Scale

Harvard Business Review

Designing software that’s resilient against the most common cyberattacks is possible — and significantly more cost effective than dealing with the fallout of a hack.

article thumbnail

Global managed services to grow in 2024 as enterprise IT spending rises

CIO

The global market for managed services will rise in 2024 due to organizations’ IT spending surge and larger investments in managed services deals involving AI and cloud computing, according to market intelligence firm IDC. “This trend will continue over the next few years as more organizations experiment or go live with AI-enabled services. Although a significant portion of the IT spending will be AI-centric, cloud technology will continue to drive the IT market,” IDC said in a statement.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Dell Expands Manufacturing Edge Solutions with Hyundai AutoEver, Intel

Dell EMC

Dell expands edge partner ecosystem with Hyundai AutoEver and Intel to help manufacturers derive more value from edge data with AI.

Data 89

More Trending

article thumbnail

UnitedHealth Says Patient Data Exposed in Change Healthcare Cyberattack

Ooda Loop

UnitedHealth Group, the parent company for Change Healthcare, confirmed that Personally identifiable information (PII) and protected health information (PHI) was stolen in a February ransomware attack.

article thumbnail

How Burnout Became Normal — and How to Push Back Against It

Harvard Business Review

Slowly but steadily, while we’ve been preoccupied with trying to meet demands that outstrip our resources, grappling with unfair treatment, or watching our working hours encroach upon our downtime, burnout has become the new baseline in many work environments. From the 40% of Gen Z workers who believe burnout is an inevitable part of success, to executives who believe high-pressure, “trial-by-fire” assignments are a required rite of passage, to toxic hustle culture that pushes busyness as a badg

How To 70
article thumbnail

The TikTok ban was just passed by the House. Here’s what could happen next.

Ooda Loop

TikTok users could soon find that the popular social media service is either under new ownership or, although it wouldn’t happen immediately, outright banned in the U.S. On Saturday, the House passed legislation that would bar TikTok from operating in the U.S.

Media 69
article thumbnail

The State of AI in Cybersecurity: How AI will impact the cyber threat landscape in 2024

Darktrace

Part 2: This blog discusses the impact of AI on the cyber threat landscape based on data from Darktrace’s State of AI Cybersecurity Report. Get the latest insights into the evolving challenges faced by organizations, the growing demand for skilled professionals, and the need for integrated security solutions.

Report 69
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Rising Tide Rents and Robber Baron Rents

O'Reilly Media - Ideas

Why is it that Google, a company once known for its distinctive “Do no evil” guideline, is now facing the same charges of “surveillance capitalism” as Facebook, a company that never made such claims? Why is it now subject to the same kind of antitrust complaints faced by Microsoft, once the “evil empire” of the previous generation of computing? Why is it that Amazon, which has positioned itself as “the most customer-centric company on the planet,” now lards its search results with advertisements

article thumbnail

The UN Security Council Has a Role in International Cybersecurity

Ooda Loop

In early April 2024, the United Nations’ (UN) Security Council held a meeting on the “Evolving Cyber Threat Landscape and Its Implications for the Maintenance of International Peace and Security.

Meeting 64
article thumbnail

Wi-Fi 7: The Future of High Speed Wireless Networking is Here

Arista

Enterprises are under pressure to meet and exceed the challenges of rapidly increasing bandwidth requirements, including AR/VR (augmented reality/virtual reality) applications, streaming multimedia, IoT proliferation, video applications and high density deployments.

article thumbnail

AI Search Startup Perplexity Valued at $1 Billion in Funding Round

Ooda Loop

Perplexity AI, a startup using artificial intelligence to build a search engine to compete with Alphabet Inc.’s Google, has raised about $63 million in a new funding round that values the company at more than $1 billion.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Climate and Sustainability Hackathon—Meet the Judges!

Cloudera

Back in October, we announced the first-ever Cloudera Climate and Sustainability Hackathon , powered by AMD. The Hackathon was intended to provide data science experts with access to Cloudera machine learning to develop their own Accelerated Machine Learning Project (AMP) focused on solving one of the many environmental challenges facing the world today.

article thumbnail

The Ray-Ban Meta Smart Glasses have multimodal AI now

Ooda Loop

When the Ray-Ban Meta Smart Glasses launched last fall, they were a pretty neat content capture tool and a surprisingly solid pair of headphones. But they were missing a key feature: multimodal AI.

Tools 59
article thumbnail

CVE-2024-4040: CrushFTP Virtual File System (VFS) Sandbox Escape Vulnerability Exploited

Tenable

A zero-day vulnerability in CrushFTP was exploited in the wild against multiple U.S. entities prior to fixed versions becoming available as the vendor recommends customers upgrade as soon as possible. Background On April 19, CrushFTP published an advisory for a zero-day vulnerability in its file transfer tool which bears the same name. CVE Description CVSSv3 Severity CVE-2024-4040 CrushFTP VFS Sandbox Escape Vulnerability 7.7 High No CVE identifier was initially assigned for this vulnerability.

article thumbnail

Biologically Engineered DNA Data Storage will be a Layer of the Convergent Exponential Tech Stack

Ooda Loop

We argue that the bioeconomy will lead all industry sectors into a fascinating (and anything but fear-inducing) future filled with abundance and promise - including DNA-based data storage capabilities. DNA Data Storage? Yes. Let's start there.

Storage 59
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Perplexity Looks To Raise $250M-Plus At Valuation Of $2.5B Or More — Report

Crunchbase News

The same day Perplexity AI announced a $62.7 million round, it was reported the AI startup is looking to raise another $250 million-plus at a valuation between $2.5 billion and $3 billion. The newly announced round was first reported last month and was led by Daniel Gross. It also included investors such as Nvidia , IVP , NEA , Jeff Bezos and Garry Tan among others.

Report 55
article thumbnail

US Gov Slaps Visa Restrictions on Spyware Honchos

Ooda Loop

The US State Department is going to impose visa restrictions on 13 people involved in the development and sale of commercial spyware. The restrictions will also be imposed on their spouses and children. This is the first implementation on a spyware-related visa-restriction program announced in February.

Spyware 59
article thumbnail

The cloud is not a slam dunk platform for generative AI

InfoWorld

As I’ve been saying for the past year or so, cloud conferences have become generative AI conferences , as have data center conferences, databases conferences, and you name it. It’s clearly more than just a trend—it’s a game-changing push. But we’ve seen this happen enough times in the past 30 years to know nothing is guaranteed to be a true trend. Remember “push technology?

article thumbnail

Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations

Ooda Loop

According to a Microsoft report, Russian-linked cybercrime group APT28 has been exploiting Windows Print Spooler vulnerabilities to deploy an exploitation tool against organizations across Western Europe, in Ukraine, and in the US.

Malware 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Feeling Unmotivated? Here’s How to Get Out of the Rut

Harvard Business Review

A conversation Harvard Business School’s Boris Groysberg and Robin Abrahams on shifting your mindset and energy at work.

Energy 66
article thumbnail

German Far-right party aide held in China spy probe

Ooda Loop

Prosecutors have arrested a man working for a far-right politician in Germany on suspicion of spying for China. The man as an assistant to AfD MEP and European election candidate Maximilian Krah. He was arrested in the eastern city of Dresden.

59
article thumbnail

The dawn of intelligent and automated data orchestration

InfoWorld

The exponential growth of data, and in particular unstructured data, is a problem enterprises have been wrestling with for decades. IT organizations are in a constant battle between ensuring that data is accessible to users, one the one hand, and that the data is globally protected and in compliance with data governance policies, on the other. Added to this is the need to ensure that files are stored in the most cost-effective manner possible, on whichever storage is best at that point in time.

Data 54
article thumbnail

Ukraine cuts consular services for potential conscripts lodged overseas

Ooda Loop

Ukraine is set to suspend consular services for military-age men abroad. Foreign Minister Dmytro Kuleba said he had ordered services cut for all such men, except for those returning to Ukraine. The move comes as Ukraine pushes to boost conscription in a bid to halt Russian movement on the battlefield.

59
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AWS moves Amazon Bedrock’s AI guardrails, and other features to general availability

InfoWorld

Amazon Web Services (AWS) is moving some features of its generative AI application-building service, Amazon Bedrock , to general availability, the company said on Tuesday. These features include guardrails for AI , a model evaluation tool, and new large language models (LLMs).

AWS 52
article thumbnail

Microsoft launches lightweight AI model

Ooda Loop

Microsoft, opens new tab on Tuesday launched a lightweight artificial intelligence model, as it looks to attract a wider client base with cost-effective options.

article thumbnail

Oracle JDK Mission Control 9 adds dark theme, configurable JVM browser

InfoWorld

Oracle has released JDK Mission Control (JMC) 9, an update to the tool kit for monitoring, managing, profiling, and troubleshooting Java applications that adds a dark theme and makes the frequency of JVM checks configurable. The most significant change is that JMC now must use JDK 17 or later to run. JMC 9 was unveiled on April 21. Binaries can be downloaded from oracle.com.