CxO, Security, CxO Security Events, AI, Linux, HPC, IoT, Big Data, Cisco, Datacore, Dell, IBM, Red Hat (298.4.Monday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
Security
CxO Security Events
AI
Linux
HPC
IoT
Big Data
Cisco News
Datacore News
Dell News
IBM News
Red Hat News
CxO
Cloud and Conversational AI increase the complexity of IVRs. Using AI to test is the way forward.
This is a time to focus on professional self-improvement.
CIOs face a complex juggling act between operational responsibilities and strategic opportunities. So keeping the lights on and finding time for big-picture thinking requires a perspective that parallels how the role is expanding.
New survey results from International Data Corporation (IDC) show that data sovereignty and compliance are now an important factor in shaping IT selection and design decisions.
The pressure is on for CIOs in 2023, experts say, as chief information officers are called upon to drive growth and transformation, not just keep the data center humming and enterprise software running.
Security
Common security threats range from insider threats to advanced persistent threats, and they can bring an organization to its knees unless its in-house security team is aware of them and ready to respond.
A cybersecurity framework is a group of documents outlining guidelines, security-related standards, and best practices to help organizations manage and protect their assets from cybersecurity threats.
The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived.
A boom in privacy-focused tech, coupled with new regulations coming into force, is likely to spell a shift toward greater transparency and safeguarding of personal data in the year ahead.
CxO Security Events
With 'shift everywhere,' existing DevSecOps implementations have to evolve to manage AppSec risk without impeding the agility and frequency of software delivery. The good news is, it can be done.
This webinar for software and security leaders will explore: The industry landscape of software supply chain security; New requirements such as attestations for open source artifacts: "Self-vendoring" open source dependencies vs. having a single automated toolchain and Pros and cons of existing solutions such as artifact repositories
A full-day virtual event exploring the latest technologies that can help strengthen your cybersecurity defenses, and the best path for deploying them. You'll hear about state-of-the-art techniques for stopping ransomware in its tracks. You'll learn how to secure your critical data from threats in the cloud.
AI
AI writing tools can help lighten your workload by writing emails and essays and even doing math. They use artificial intelligence to generate text or answer queries based on user input. ChatGPT is one popular example, but there are other noteworthy AI writers.
The U.S. took a big step in the development of a national artificial intelligence strategy with the release of the U.S. Department of Commerce National Institute of Standards and Technology's Artificial Intelligence Risk Management Framework 1.0, Jan. 26.
Mitigating risks from generative AI tools such as ChatGPT means involving humans in final decision-making and establishing guardrails.
AI has phenomenally conquered our lives, our platforms, and our businesses, and leaders, and business owners are enthusiastically cheering for this humongous technological revolution.
Linux
The number of Linux malware strains grew by 50% year-on-year
HPC
Join us for an insightful discussion with Dr. Handel Jones, author of the recent book When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet, and CEO of International Business Strategies, Inc.
The benefits of moving high performance computing to the cloud can go beyond speeding up access to the right hardware but you still need to think about skills and cost control.
IoT
Huge shift towards 5G IoT devices is coming fast
The fourth industrial revolution, better known as Industry 4.0, is happening now - and the Industrial Internet of Things (IIoT) and edge computing are at the epicenter of this transition.
Big Data
Over the past few years, enterprise data architectures have evolved significantly to accommodate the changing data requirements of modern businesses.
Learn how to optimize data migration projects for unstructured data movement and transformation. This guide can help you maintain data quality while reducing the time and effort it takes to manage unstructured data.
The Semiannual Big Data and Analytics Software Tracker published by International Data Corporation (IDC) expects current geopolitical developments to have a mild impact on market growth, with a positive outlook for the future.
Cisco News
Cisco's 2023 Data Privacy Benchmark Study reveals that to build trust, organizations focus primarily on compliance, whereas consumers value transparency most. 92% of respondents say their organization needs to do more to reassure customers about how their data is used in AI.
Datacore News
Acquisition Positions DataCore to Expand in High-Growth Edge Markets
Dell News
With the latest PowerEdge servers, organizations can improve operations and sustainability gains to reduce energy consumption.
In honor of Data Privacy Week, learn how Dell Technologies views privacy from Vice President and Chief Privacy Officer Sommer Coutu.
For today's businesses, Dell APEX Private Cloud for VDI supports workforce transformation and higher employee productivity.
IBM News
Revenue Growth in All Key Segments; Expanded Margins; Solid Cash Generation
Red Hat News
Did you know that Red Hat Insights for Red Hat Enterprise Linux (RHEL) can be used to help detect the presence of malware? This makes it more likely that you'll know when a RHEL system has sustained a malware attack.
Learn how a cloud-native application platform provides the necessary scalability and flexibility needed for open RANLearn how a cloud-native application platform provides the necessary scalability and flexibility needed for open RAN