CxO, Telco, AI, Operations, FOSS, MFA, Email, Backup, DDN, Google, Lenovo, Red Hat, Security Events (312.2.Tuesday)
CxO
Telco
AI
Operations
FOSS
MFA
Backup
DDN News
Google News
Lenovo News
Red Hat News
CxO Security Events
CxO
Selling The C-Suite On Preemptive IT Investments
Greater scrutiny on margins means earning the green light on preemptive projects that don't produce immediate ROI, such as disaster recovery, a tough sell. Here's how CIOs can make the case....more
Skills Gap Threatens New Tech Implementation, Executives Say
Technologies such as generative AI are developing faster than companies' ability to incorporate them into operations, according to an Infosys study....more
17 Potential Costs Of Shadow IT
Companies should be vigilant and consider the significant costs associated with shadow IT. Learn about these overlooked issues and how they affect the organization....more
Telco
Why The Cloud Native Telco Still Needs Work
Telcos feel they are yet to see the full benefits of cloud-native operations. TMN talks to operators, vendors and cloud platform providers about the cloud-native journey....more
Globe Telecom Activated Almost 900 5G Sites Last Year
During the first half of 2024, Globe had activated 356 new 5G sites across the Philippines...more
AI And The RAN
The AI-RAN Alliance launched during MWC. It said that it was aimed at 'integrating artificial intelligence (AI) into cellular technology to further advance radio access network (RAN) technology and mobile networks'....more
Report: 5G Roaming Is On The Rise
International roaming enabler BICS saw a big jump in 5G roaming between 2022 and 2023. Consumer and IoT device roaming on non-standalone 5G networks jumped 156%....more
AI
Tips And Tricks For AI Threat Intelligence Automation
Accurate and timely threat intelligence is critical for successful security operations centers. In simple terms, threat intelligence can be defined as evidence-based knowledge, including context, indicators, implications, mechanisms, and actionable advice that is related to current or emerging threats to assets....more
Considerations For Enterprise AI Adoption In 2024
Virtually every conversation you see about business in the media these days mentions some element of artificial intelligence....more
Operations
How To Understand Advancements In Modern Data Centers
Data center advancements are rapidly occurring with storage demand. Some advancements, like an increase in temperatures, are necessary for more sustainable data center operations....more
领英推荐
FOSS
Open Source Promises Advantages For Business Applications
Open source software may provide a cost-effective approach to building business applications, as well as ensuring transparency, but there are challenges to keep in mind...more
MFA
How To Enable Multi-Factor Authentication: Comprehensive Guide
Cyber threats are a persistent concern, and the consequences of account breaches can be severe. From financial losses to identity theft and data breaches, the risks are far too significant to ignore. Fortunately, multi-factor authentication (MFA) offers a robust solution to safeguard your online accounts, providing an additional layer of security beyond traditional passwords....more
What Is Multi-Factor Authentication (MFA): What Are Its Benefits?
In today's digital age, securing your online accounts and sensitive information is more crucial than ever. As cyber threats continue to evolve, traditional password-based authentication methods are no longer enough to safeguard your data....more
New Email Standards: What You Need To Know
Raising the Bar for Email Security...more
Backup
Market For Information Archiving Solutions
An Analysis of the Market for Information Archiving Solutions Revealing Top Players, Trail Blazers, Specialists and Mature Players....more
DDN News
Exascale? Let's Talk
We've recently seen a storage vendor trumpeting a modest installation and proudly comparing their performance favourably to a 4 year-old HDD-based system....more
Google News
4 Updates From The 2024 Google For Games Developer Summit
How we're helping developers build better gaming experiences for you....more
10 Products You Can Build With Google Gemini
In this article, we explore ten innovative products that can be created using Google Gemini...more
Browse Safely With Real-Time Protection On Chrome
Chrome will now use real-time Safe Browsing protections to show warnings on potentially dangerous sites....more
Google I/O 2024 Now Has An Official Date For When It Will Reveal WhatNext In AI, Android, And Pixel
Google's annual developer event is right around the corner. Here is what we're likely to see....more
Lenovo News
Lenovo Awarded 'Champion' Status In Canalys Titans Channel Leadership Matrix
The analyst firm's Titans Channel Leadership Matrix honors vendors that play an integral role in driving the success of their partner ecosystems across their channel and technology areas. Lenovo was named 'Champion' in both the EMEA and APAC regions, as well as in North America where Canalys unveiled its first North American Titans Channel Leadership Matrix....more
Lenovo Legion Tab Android Gaming Tablet Is Coming To EMEA And Asia
Built for gamers who navigate multiple devices daily, the Lenovo Legion Tab is an 8.8-inch QHD+ Android gaming tablet that bridges the gap between PC and mobile gaming with unmatched tablet performance....more
Red Hat News
Watch Now: 3 Top Episodes On Red Hat TV
Red Hat TV is back and better than ever! It now offers an even more comprehensive streaming platform featuring the latest technology trends from Red Hat customers, partners and solution experts to help you build skills, gain insights and get the tools you need to stay ahead of the latest technology trends....more
Friday Five - March 15, 2024
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your we ekly digest of things that caught our eye....more
Free Ansible Tutorial: An Introduction To Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform is an end-to-end IT automation platform that can be used to configure systems, deploy software, orchestrate advanced workflows and more. It includes tools and resources to automate IT processes across domains, including infrastructure, DevOps, cloud, security and networks, from data centers to edge locations....more
Integrating Enterprise Environments With Saas: A CRM Case Study With Red Hat Application Foundations
This article will guide you through the essential steps of integrating third-party SaaS applications into your organization's infrastructure....more
CxO Security Events
Cybersecurity's Hottest New Technologies: What You Need To Know (March 21st)
Join us March 21, 2024, as we discuss some of the most promising emerging cybersecurity technologies and how you can adopt them into your organizations....more
InformationWeek: The CISO's Guide to the Software Supply Chain (March 21st)
How do you get a better handle on all the code you're running so you can support developers, manage risks, and respond to change smoothly and safely? Getting it wrong can be costly for the business and for the executive....more
Blackhat: Why A G2000 Firm Implemented CDR For Its Next-Generation SOC (March 26th)
For security operations and incident response teams, multi-cloud environments (AWS, Azure, GCP, Okta, etc.) generate massive amounts of rich telemetry - but cloud detection, investigation, containment, and forensics can be challenging with traditional SOC tools. Not to mention the cost and complexity of log ingestion and enrichment...more
CSA: A Smarter Approach to Protecting your Cloud, Data, and AI (March 26th)
Join this session to learn how you can forge a modern approach that integrates best-in-class technologies from cloud-native application protection platform (CNAPP) to data security posture management (DSPM), data security platform (DSP), AI security governance, and more....more