CxO, Security, Realtime Analytics, Edge, AI, BI, Database, Cloud, Encryption, DDN, PeopleTek, Salesforce, HP, Dell, Fortinet, DevOps Events (318.4.1)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
CxO
Security
Realtime Analytics
Edge
AI
BI
Database
Cloud
Encryption
DDN News
PeopleTek News
Salesforce News
HP News
Dell News
Fortinet News
DevOps Events
If you're overprovisioning to ensure availability, if developer resource requests are out of control, or if you simply don't have the time or tools to stay on top of infrastructure optimization, join us on October 15th to learn how you can ensure you're always getting maximum value from EKS. Register
CxO
5 Things Your Board Needs To Know About Innovation And Thought Leadership
Today's boards are under increasing pressure to navigate their organizations through tumultuous times. Getting a clearer sense of the big picture, and the means to deliver it, can be a guiding, stabilizing, and accelerating force....more
Most Mainframe Application Rewrites Fail The First Time
'Almost everyone in the mainframe space recognizes that these are not toy workloads,' Rocket Software executive Phil Buckellew said....more
CISOs: The One Question Your Board Will NEVER Ask You
When was the last time your board asked, "How many vulnerabilities were patched last week?" They didn't - and they won't....more
The Surge In Cyber Insurance And What It Means For Your Business
The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This surge in demand reflects a broader shift in how businesses approach risk management, viewing cyber insurance not just as an option but as a necessity....more
The Role Of The CISO Must Change
The world of cybersecurity is rapidly evolving, and with it, the role of the Chief Information Security Officer (CISO) must also change. As businesses face an unprecedented shortage of qualified cybersecurity professionals, the pressure on CISOs to protect their organizations while enabling business growth has never been greater....more
Security
SANs Institute: Top 5 Dangerous Cyberattack Techniques In 2024
The SANS Institute - a leading authority in cybersecurity research, education and certification - released its annual Top Attacks and Threats Report....more
The Cybersecurity Maturity Model Certification (CMMC) Rule is Final!
Last week, the CMMC Final Rule (known as CFR 32) was released from OIRA, meaning no more changes can be made....more
Realtime Analytics
What Does Real-Time Mean In Today's World?
Today, decisions need to be made in milliseconds and need to be made as soon as an event has occurred. Increasingly, there is a need for real-time analytics of data at its source, as it is being generated....more
Explore how synthetic data boosts efficiency and cuts costs by mimicking real-world data and learn its benefits and applications. Register
Edge
Data Confidence Begins At The Edge
Data-driven strategies require a holistic approach to data governance such as classification, and access control, but also trust in the data being processed....more
Transforming E-Commerce With Edge Computing And AI-Enhanced Cloud Services
The emergence of cloud computing, edge computing and artificial intelligence (AI) has 'cloudified' the e-commerce transaction process....more
AI
Garbage In - Garbage Out! Still Applies With Gen AI
Integreon's Diane Homolak offers insight on why the phrase 'garbage in, garbage out' still applies in the GenAI era....more
From LLMs to SLMs to SAMs, How Agents Are Redefining AI
We believe the AI center of gravity for enterprise value creation is shifting from LLMs to SLMs. Where the S not only stands for small but encompasses a system of small, specialized, secure and sovereign models....more
AI Leadership Insights: Cybersecurity And AI Threats
In this Techstrong AI Leadership Insights interview, Amanda Razani, speaks with Pukar Hamal, CEO and founder of SecurityPal, about cybersecurity and what concerns business leaders have in regard to AI threats....more
领英推荐
Gartner: Mitigating Security Threats In AI Agents
Agents represent a step-change in the use of artificial intelligence in the enterprise - as attendees at Salesforce's annual conference saw first hand this month - but do not come without their risks...more
BI
Game-Changing Impact of AI on Modern Business Intelligence
'By 2026, more than 80% of enterprises are expected to use generative AI APIs, or deploy AI-enabled applications in production environments,' says Gartner....more
This webinar will explore the critical role of leadership in fostering an environment where developers can thrive amidst the move to cloud native. Register
Database
SQL Best Practices For Data Engineers
From using robust SQL editor to using subqueries and CTEs, here are some the essential SQL practices for data engineers...more
PostgreSQL 17 Extends Further Extends Capabilities Of Open Source Database
The latest update to the PostgreSQL database adds incremental backup capabilities that eliminate the need to rely on third-party tools along with a pg_createsubscriber tool that makes logical replication a more viable option for large databases by speeding up the initial data copy process....more
Cloud
Is Cloud Repatriation The Only Answer?
Cloud repatriation should be a last resort, not a repudiation of the cloud. Do you know how to fully optimize cloud workloads to avoid costly in-house investment?...more
Top 6 Cloud Security Threats To Watch Out For
As your business continues moving critical data and workloads into public, private and hybrid cloud environments, it becomes crucial to understand the key security threats you need to watch out for. With increased reliance on the cloud comes increased risk if the necessary precautions aren't taken....more
Best Practices For Defining A Cloud Monitoring Strategy
Uptime. Downtime. Security protections. There are so many things to watch out for. An effective cloud monitoring strategy requires an organization to set some clear priorities....more
Encryption
Post-Quantum Cryptography: Sorting Fact From Fiction
Quantum computing, often touted as the 'next big revolution,' is a widely discussed topic in the tech world today. As breakthroughs in quantum research bring us closer to the reality of commercially viable quantum computers, discussions around their potential impact on current cryptography are intensifying....more
Exploring The Foundations Of Lattice-Based Cryptography
Lattice-based cryptography is a quantum-resistant encryption method that uses complex mathematical lattices, offering security against quantum computing attacks....more
For many teams, security analytics were restricted to out-of-the-box reporting templates from specific vendor tools. Register
DDN News
DDN Achieves Unprecedented Performance In MLPerf Benchmarking, Empowering Transformative AI Business Outcomes
DDN proudly announces a groundbreaking achievement in the MLPerf Storage Benchmark, setting new standards for performance and efficiency. DDN's A3I (Accelerated Any-scale AI) systems demonstrated unmatched capabilities in multi-node configurations, solidifying its role as essential drivers for high-demand machine learning (ML) workloads and transformative business outcomes....more
PeopleTek News
Mastering Active Listening: Enhancing Communication In Business
Listening is a skill that requires effort and impacts relationships. Any disagreement with that statement?...more
Salesforce News
Salesforce CEO: Get Ready For Agents - The Third Wave Of AI
Marc Benioff outlines Salesforce's AI future - with agents taking the fore...more
HP News
Introducing HP Print AI, Industry's First Intelligent Print Experiences For Home, Office, And Large Format Printing
Sets New Standard for Personalized Printing with Secure AI Solutions to Help People Effortlessly Create, Work, and Collaborate...more
HP Strengthens Workforce Experience Platform With Acquisition Of Vyopta
HP and Vyopta to give customers more advanced insights and recommendations to improve employee experience...more
In a world of surging data demands, how can we reduce the environmental toll of storage solutions? Discover the power of the circular economy to reshape the storage industry for a greener tomorrow Register
Dell News
Dell Technologies Propels Telecommunications Into The AI Era
Dell AI for Telecom program simplifies and accelerates AI deployments for communications service providers...more
Dell InnovateFest 2024: Hackathon Tackles Social Isolation for Seniors and PWIDs
Dell Technologies successfully concluded its second edition of InnovateFest in Singapore, bringing together young innovative minds to harness technology in addressing pressing societal issues....more
Join our conversation to learn and discuss how to integrate DevOps seamlessly into your business strategy and across all development workflows, ensuring your processes are efficient, secure, and productive. Register
Fortinet News
SASE Meets AI: Transform A Secure Hybrid World (Oct. 10th)
As organizations continue to adopt hybrid work models, integrating and converging security and networking becomes paramount. Hybrid networks, comprising both on-premises, and cloud-based resources, require unified, flexible, and intelligent security solutions that traditional security architectures cannot provide....more
Fortinet Announces Progress Toward Its Mission To Tackle The Cybersecurity Skills Shortage
At the halfway mark of its 5-year pledge to train 1 million individuals in cybersecurity by the end of 2026, Fortinet is on track to reach this milestone, having trained more than half a million people to address the skills gap...more
Extend AI-Powered Security To Remote OT Sites
Organizations that specialize in operational technology (OT) are under increasing pressure to secure their attack surfaces....more
DevOps Events
DevOps.com: DevOps Done Right: Best Practices to Accelerate Your Software Delivery (Oct. 24th)
Join our conversation to learn and discuss how to integrate DevOps seamlessly into your business strategy and across all development workflows, ensuring your processes are efficient, secure, and productive....more
DevOps.com: Strengthening Your Organization's Security Lifecycle Management (Oct. 31st)
In today's digital landscape, managing sensitive information and securing access to critical systems is more challenging than ever. Organizations must invest in robust security lifecycle management to protect against evolving threats and ensure compliance....more
DevOps.com: Why You Need SCA and SBOM (Oct. 31st)
Through three in-depth sessions, our panelists will discuss why these tools are essential, how to manage them effectively, and how to navigate the complex landscape of regulatory compliance....more
DevOps.com: Ensuring the AppSec and API Security Strategy Meets the Moment (Nov. 6th)
During this webinar, you'll learn about best practices for mitigating application risks and gain insights on how companies prioritize their application security initiatives and budgets compared to other risk management areas....more
In this webinar, we'll explore how Tailscale empowers DevOps teams to overcome networking challenges in AWS environments, enabling them to focus on innovation instead of infrastructure. Register