Latest Blogs from SYS-CON MEDIA
You create a video and you want it the way Picasso or Monet would have visualized it. Can it be done? The answers appears to be answered by Facebook's Caffe2Go. It was easy with stills as many programs do it, but with a video it is another thing.Caffe2Go is supposed to be third iterati...
Join us at MongoDB World for fundamental and advanced technical sessions, one-on-one consultations with experts, and the opportunity to network with over 2,300 tech professionals. MongoDB World is less than a month away, but we can’t wait any longer to introduce our exciting keynote s...
When John Donahoe, ServiceNow’s new CEO, delivered his opening keynote at Knowledge17, he announced the Intelligent Automation Engine — the company’s new machine learning layer that […]
Code Coverage is a measurement of how many lines, statements, or blocks of your code are tested using your suite of automated tests. It’s an essential metric to understand the quality of your QA efforts. Code coverage shows you how much of your application is not covered by automated t...
Now that cloud computing has turned a corner, most enterprises have implemented a ‘cloud first’ strategy. With such a strategy, the default assumption is that any […]
There are billions of smart devices in our world today, but what if these devices were interconnected? What if these devices can interact with each other just like how their owners do and form a kind of global nervous system? This essentially describes what people call the Internet of ...
Logging runtime information in your Java application is critically useful for understanding the behavior of any app, especially in cases when you encounter unexpected scenarios, errors or just need track certain application events. In a real-world production environment, you usually do...
The next BriefingsDirect Voice of the Customer cloud adoption patterns discussion explores how integration of the latest cloud tools and methods help smooth out the difficult task of creating and maintaining cloud-infrastructure services contracts. The results are more flexible digital...
Is your Android phone infected with Judy malware? Shelly Palmer talks about how you tell if Judy is on your device and what you can do about it - with Teresa Priolo and Antwan Lewis on Fox 5. Original Airdate: May 30, 2017 The post Is the Judy Virus on Your Android? | Shelly Palmer on ...
The age-old bottleneck has plagued IT since the first wired connections were made. Network bottlenecks happen when the communication between network endpoints doesn’t have enough capacity to transfer data without overflowing network buffers. The problem could lie on the internal networ...
Kommunal Landspensjonskasse (KLP) is Norway’s largest insurance company, delivering safe and competitive financial and insurance services to the public sector, enterprises associated with the public sector and their employees. KLP’s completely manual deployment processes demanded a ...
Bob Gourley There are seven key megatrends driving the future of enterprise IT. You can remember them all with the mnemonic acronym CAMBRIC, which stands for Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things, CyberSecurity. In this post we dive ...
For some of us, the above title triggers nostalgia to a late-night MADtv comedy skit from the ’90s, but for others it will trigger that minor PTSD of getting excited about a new relationship, a new restaurant, a new job, only to have all of our expectations brought to a screechin...
A full-text catalog is a logical container where a group of full-text indexes are stored. A full-text catalog is needed before you can create a full-text index. Full-text catalog is a virtual object and does not belong to the file group.In order to text search a full-text index will be...
Welcome to the final installment of our 4-part blog series. In part 1, we looked at the history of AI, and why it is taking off now In part 2, we discussed the differences between AI, Machine Learning, and Deep Learning In part 3, we dived deeper into deep learning and evaluated key ...
During a conversation I recently had regarding diversity in the workplace with Danielle James, one of MongoDB’s most passionate team members and advocates, she stated, “Diversity has become such a buzzword.” Danielle was recently recognized by Code/Interactive’s Diversity in Tech Award...
An Intellyx Brain Candy Brief The idea of using chatbots — or bots, more broadly — is not a new idea. Enterprise organizations have been using […]
An Intellyx Brain Candy Brief As I wrote about recently in NetworkWorld, SAP has set forth an ambitious agenda to become the digital transformation platform for […]
Every modern organization depends on software, and where there is software there are metrics and logs and, one would hope, monitoring of these two critically important types of data. Operations teams have traditionally used two separate sets of tools – […]
In calculus, the second derivative is the measure of instantaneous acceleration or velocity of a function of a function f. For example, the second derivative of the position of a vehicle with respect to time is the instantaneous acceleration of the vehicle, or the rate at which the vel...
Il existe encore de nombreuses, trop nombreuses DSI, Direction des Systèmes d’Information, rattachées à une Direction financière. Il est temps que, à l’image de la chenille qui se transforme en papillon pour prendre son envol, les DSI s’émancipent du carcan...
In The Evolving Role of a Cloud Architect Gunnar Menzel, Vice President & Chief Architect @ Cloud Infra, Cap Gemini Global states that "a cloud architect is responsible for making sure a cloud solution is structurally sound and fit for purpose"   continuing...
The cloud as we know it is going through a massive transformation. What started as an on-demand subscription service for consuming compute, storage, and the network is no more the same. The compute component of the cloud has become table stakes for the vendors in the infrastructure bus...
As enterprise cloud becomes the norm, businesses and government programs must address compounded regulatory compliance related to data privacy and information protection. The most recent, Controlled Unclassified Information and the EU’s GDPR have board level implications and companies ...
Updates are necessary, but annoying. Which is why your Mac, by default, installs them automatically. System updates protect your Mac from malware and other threats, and occasionally add new features. The The post How to Control When macOS Updates Are Installed appeared first on Te...
Spotlight search on iOS 10 now remembers your previous searches. If you tap the Spotlight search bar on your iPhone or iPad, you’ll see a list of searches you’ve performed. The post How to Disable iOS 10’s Spotlight Search History appeared first on Technology News and Reviews | A2Z Sup...
You encrypt your Mac’s system drive like you should: if your computer is stolen, your data is safe from prying eyes. But on your desk, right next to your Mac, is The post How to Encrypt Your Mac’s Time Machine Backup appeared first on Technology News and Reviews | A2Z Support.
Just for fun, here is a list of buzzwords, biz speak, and hipster droppings that should be banned from every business meeting forevermore. The post My Banned Words for 2017 originally appeared here on Shelly Palmer
This is the classic example of getting out of one problem and getting into another.I had the virus problem (probably the ransomeware except that I did not click on any link and the threatening page did not go away after a reboot, etc.) on my Toshiba tablet with Windows 10 and decided t...
An Intellyx Brain Candy Brief Big data environments require specialized performance management tooling. Pepperdata recently announced its code analyzer for Apache Spark, adding it to its […]
Specsavers CIO Phil Pavitt has worked for 18 companies in a stellar 35-year career in technology, across organisations as varied as Transport for London, Centrica, Aviva, and HMRC, the UK government department responsible for revenue and customs. Phil was a star speaker at the recent A...
When you’re making a cloud move, ask the right questions before you spend the money. This list is a good rundown of what to ask internally, including business function priorities, which applications to move to the cloud and when, and what type of integrations you might choose. Plus, as...
This is a collection of marketing unicorn resources curated from sources across the web. Why Marketing Unicorns Are Such a Big Deal | Earnworthy earnworthy.com/marketing-unicorns/ Jun 29, 2015 – Let’s face it. Marketing is changing in a big way. The days of Don Draper ...
B2B marketing is no easy task. There’s a constant battle between: do I target my exact buyer with account-based marketing or do I go after the larger audience in the hope that my end buyer finds me? The reality is that generating demand for your B2B service or product has become a jugg...
FROM THE TRIBLIO WEBSITE A collection of 40 beautiful content hub examples. Multiple case studies have already proven that optimized content hubs help increase awareness, time spent on the website and lead conversions…and what marketer doesn’t want that? FROM ACROSS THE WEB A variety o...
The Challenge: In the networking industry, change is driven by the applications that run on top of IT infrastructure. To keep up with industry demands, the applications themselves are shifting to be increasingly efficient while simultaneously processing vastly larger amounts of data, o...
VisualVM is a Java profiler, one of the several types of Java performance tools (to see more of our favorite Java performance tools, check out this post). In today’s post, we’ll take a look at VisualVM, how it works, and some integrations and alternatives. A Definition of V...
Are your traditional ERPs and core business applications struggling to keep up new digital technology? It’s a challenge facing all organizations undergoing radical transformation as part […]