Most popular articles of current edition:
|
- State Of Data Privacy Laws In 2023
- Digital Transformation: 4 Tips To Keep IT Human-Centered
- Top Three DevOps Tools for Cloud Infrastructure
- Oracle VM VirtualBox 7.0.6 now available
- Gartner Forecasts Worldwide IT Spending To Grow 2.4% In 2023
- Toshiba Exec Says SSDs Can Never Replace HDDs
- Fibre Channel vs. iSCSI: What Are The Differences?
- SSDs Not Expected to Completely Replace HDDs at Any Point
- Top 5 Use Cases For Graph Databases
- 8 'Future Of Work' Mistakes IT Leaders Must Avoid
- Gartner: CIOs Will Struggle To Retain And Attract IT Talent
- IT Hiring: How To Find The Right Match
- How CISOs Can Manage The Cybersecurity Of High-Level Executives
- Taking the Reins on IT Interoperability
- A Comprehensive Guide To IoT Security
- What Is Business Intelligence? Transforming Data Into Business Insights
- New IT Boss Decided To 'Audit Everything You Guys Are Doing Wrong'. Which Went Wrong
- 4 Moves CIOs Should Make To Achieve A More Efficient IT Organization
- Goodbye Dashboards: How Modern BI Tools Are Being Used To Analyze Data
- 5 Top IoT Sustainability Trends For 2023
- NIST to release AI Risk Management Framework
- Don't Risk Falling Behind On ESG
- Basecamp Details 'Obscene' $3.2 Million Bill That Caused It To Quit The Cloud
- The Reason Many AI And Analytics Projects Fail - And How To Make Sure Yours Doesn't
- 2023 Predictions For Cloud, As A Service And Cost Optimization
- 4 Top ChatGPT Alternatives That Are Refurbishing the AI Conversational World
- Top 10 Practices For Secure Software Development
- How Microsoft Can Become The Biggest Winner Of Generative AI
- The Anticipation Game: Spotlight On Data Backups
- Cybersecurity Crisis Management And Business Continuity
Most Popular Articles in Vol 298 Issue 3, Grouped into Sections
Successful digital transformation strategies focus on people, not technology. Use this expert advice to keep your plan human-centric
Inflation Throttles Consumer Purchasing Power, But Enterprise IT Spending Remains Strong
C-suite executives and board members are targeted through their personal devices as cybercriminals look to penetrate corporate systems and access sensitive and proprietary information. Protecting them requires a holistic approach.
Organizations with a better grip on it recognize that interoperability isn't a final destination, it's an ongoing process that requires a constant examination of OT, IT and business needs.
Last year brought more than its share of disruption, and there's no sign of any let up as 2023 gains momentum. Here are ways CIOs should prepare to face any eventuality, and come out the other side even stronger.
Post pandemic, automation has been making big waves across the globe in transforming businesses and making significant impact on the organization's growth and development cycle.
The technology landscape is rapidly evolving - so too is the way IT chiefs should lead their organizations. Here's which old rules of IT leadership are no longer relevant and what has replaced them.
What can the new-look CIO do to construct a successful IT function that goes hand-in-hand with the rest of the business?
The hybrid workforce is one of several trends reshaping how work gets done, now and in the future. To facilitate a productive, innovative future, CIOs must heed these common missteps.
While the latest spending forecast from Gartner shows continued growth in enterprise IT spending, how budgets are invested is set to change
The most successful organizations know how to hire the right people. Here's why employee mission alignment is key to business success
HR professionals are working outside their comfort zones to deal with the effects of post-Covid on the labour market as firms get ready to start a new year of operations.
A Toshiba exec has argued that hard disk drives are essential to store data in several market areas because SSDs are ill-suited to the job, costing more and with limited manufacturing capacity.
Discover how Fibre Channel and iSCSI compare when it comes to meeting SAN performance, ease of use, manageability, total package and TCO requirements.
Since the introduction of flash memory, the end of HDD has been predicted again and again - but the classic storage device persists and remains the standard in many application areas.
Get your eyepatch out: Cyber attacks on the high seas are trending
In today's increasingly connected world, cybersecurity is more important than ever before. Organizations of all sizes, and across all industries, are at risk of cyber threats that can damage their reputation, hit their bottom line and leave them falling foul of data privacy laws.
From continued supply chain concerns to challenges related to edge and AI/ML adoption, here are the top security trends to watch in the coming year
I believe it's exponentially easier to defend when you can anticipate the offense. So what will cyber offense start doing this year, and how can you prepare?
CISOs are navigating an ever-more challenging and complex world as the level of cyber risk heightens. Taking control of this difficult situation means being sure of priorities. Here Christine Bejerasco explores the issues that should be high on every CISO's list of strategic priorities.
The U.S. National Institute of Standards and Technology will publish the first iteration of its Artificial Intelligence Risk Management Framework Jan. 26.
As the pace of innovation in these areas accelerates, now is the time for technology leaders to take stock of everything they need to successfully leverage AI and analytics.
If you have been ardently following the exciting developments and innovations happening in the AI conversational world, it is likely that you would have noticed the growing enthusiasm around OpenAi's ChatGPT in the last couple of months.
Since the release of ChatGPT in November, there has been much speculation about the possible killer application of advanced large language models (LLM).
While Data Science practitioners, aspirants, and enthusiasts often get caught up in the business benefits of Data Science, it is equally important to keep a close watch on the common pitfalls that need to be avoided to launch a successful Data Science project.
In this article, I will explain the four data-driven technologies, from a macro to micro level, that will drive change over the next 12 months and beyond. They will enable every business to make greater use of their data, improve business efficiency and serve their end customers better and faster than ever before.
The team here at insideBIGDATA is deeply entrenched in keeping the pulse of the big data ecosystem of companies from around the globe.
You can't have a successful data migration if you don't map it out from the start. Learn what data mapping is and why it's an important early step in data migration and transformation projects.
If a few cores are good, then a lot of cores ought to be better. But when it comes to HPC this isn't always the case, despite what the Top500 ranking - which is stacked with 64-core Epycs - would lead you to believe.
Because of the increasing number of cyberattacks, security has become an integral element of SDLC (Software Development Lifecycle). Secure software development is a requirement to protect software from cybercriminals and hackers, minimize any vulnerabilities, and maintain users' privacy.
During the pandemic, artificial intelligence (AI), powered by high-performance computing (HPC), was behind many of the crucial breakthroughs in the battle against COVID-19, from rapidly sequencing the genomes of new virus strains to designing drugs and vaccines.
In the first episode of 2023, Shahin and Doug discuss the recent chip announcements and their implications for HPC. Also covered are industry predictions for the year to come that were featured in the InsideHPC article, An AI-Flavored Set of HPC Predictions for 2023, AI for public use, and a promise to invite Prof. Matsuoka to discuss his recent paper on common myths in HPC.
Concern about how personal data is processed and stored is leading to the passage of new regulations that govern how companies handle consumer data.
Because of the increasing number of cyberattacks, security has become an integral element of SDLC (Software Development Lifecycle). Secure software development is a requirement to protect software from cybercriminals and hackers, minimize any vulnerabilities, and maintain users' privacy.
2022 was a banner year for innovation, but not only in the traditional 'churning out new features' way. Many organizations started thinking about their processes and how to amplify them to maximize efficiency and employee retention.
Gartner has said that API attacks would be the most common attack vector in 2022, resulting in data breaches for enterprise web applications. Gartner also predicts that by 2024, API abuses and related data breaches will double.
This article shines a spotlight on data backups, exploring how this vital practice has evolved over the years, and how ever-more sophisticated data loss threats drive the continual push for innovative new capabilities and procedures to keep organisations ahead of the game.
What can you do to prevent data backup failure? Learn how using the 3-2-1 rule, turning to cloud backup and following other practical steps can help protect your data.
Cloud backup vs. traditional backup is an important discussion. Although the cloud backup market is soaring, traditional backup players also have much to offer your organization.
The first post of this series on the software-related risks organizations are facing looked at vulnerabilities introduced in development. In this post we look at the risks of open source vulnerabilities.
Users are urged to update to this maintenance release as soon as possible for better stability and reliability.
In the face of economic headwinds and a worsening problem with code vulnerabilities, 2022 was still a successful year for open source and The Linux Foundation (LF).
As digital transformation fuels the proliferation of IoT devices across industrial environments, having a strong IoT security program in place has become vital to protect critical infrastructure from cyberattacks.
How IoT can help solve the crises in 2023 and beyond
Business intelligence (BI) is a set of strategies and technologies for analyzing business information and transforming it into actionable insights that inform strategic and tactical business decisions.
Not all that long ago, the only way for businesses to readily access their data was through dashboards.
Reckons Dell kit could have stretched that dollar further
Given the highly uncertain state of the economy, this should be the year that brings an end to dinosaur thinking about enterprise IT and costs.
Environmental Social Governance (ESG) is increasingly being regarded as the standard way to measure a firm's sustainability.
Data-center IT teams must balance the need to consume less electrical power with the need to use power-hungry next-gen silicon, Uptime Institute says.
Available today, maintenance release 7.0.6 includes improvements and bug fixes for Oracle VM VirtualBox 7.0.
A survey of 326 IT executives conducted by the market research firm Omdia on behalf of Canonical found the most widely employed DevOps tool for managing cloud infrastructure is the Bash shell and command language (53%), followed by the Ansible automation platform (47%) and Terraform (40%). Another 27% reported they used tools they developed themselves.
The graph database stands as one of the biggest innovations to emerge from the NoSQL database boom that shook the industry over a decade ago.
Pet consultant took down the datacenter in attempt to find other people's errors
The massive increase in cyberattacks and the rapid evolution of advanced criminal techniques requires every single business in any sector to take protective measures to strengthen its cyber perimeter and minimize risk.
The quality of protected communications matters - a lot. If the sent material is highly sensitive and the legislation and/or policy demands high security, opportunistic encryption might not be enough.
With the release of 6.1, Oracle is the top contributor to the Linux kernel, responsible for the most lines of code changed in the kernel.
Robust networking takes center stage in 2023 in providing the vital roadmap for your transformation journey.
Ludicrous speed, go!
Scale-out is the primary focus of most hyperconverged infrastructures (HCI), but scale-out HCI is not enough to deliver a more cost-effective and easier-to-operate data center. |
|
|
|