"There will be more tokenization of assets, and increasingly mainstream use of blockchain technology."
After wowing the world way back in 2011 by defeating humans at the TV game show "Jeopardy!" with early-stage AI tech, IBM's Watson is making a bit of a comeback.
One of the most popular parts of Stack Overflow's huge annual developer report is an examination of what tech devs love, dread and want the most.
Davos is seen by some as the place where global elites gather annually to chart how things here on earth will work in the future.
Setting up a peering connection between VPCs in two different regions can help to simplify your disaster recovery efforts.
Tom examines different ways to store persistent data such as volume and bind mounts (or host volumes).
Research firm Gartner's "Magic Quadrant" series of reports on cloud database management systems has long seen a crowded "Leaders" field populated with the usual cast of cloud giants and wannabes, but this year AWS has slightly edged ahead of the pack.
Tom Fenton explains how networking works with containers.
"Fully 75 percent of respondents say that cloud computing represents the single greatest expansion of the enterprise attack surface in the last 20 years!"
After introducing the basics, Tom Fenton looks at the ephemeral nature of container instances and how to use networking and persistent storage with them.
A new survey-based Kubernetes backup and data protection report shows Kasten by Veeam was identified as a leader in the field, though many respondents couldn't name any organization as a leader.
Tom Fenton begins a series on how to install Docker containers on a Linux system while discussing images, performance hits and how to use network/storage with containers.
Tom Fenton looks at specs, design and build quality before discussing how well this low-priced device performs as a thin client, KVM server, Docker server and repository for edge device data.
From Microsoft's "sustainability cloud" to multiple Microsoft 365 emissions dashboards, there are plenty of tools available to businesses to start measuring -- and reducing -- their carbon footprints.
- By Paul Schnackenburg
Microsoft has been busy removing internet domains identified as being criminally used by bad actors, including those sponsored by nations.
The longstanding IT balance between usability and security was tipped in favor of the former during the pandemic-driven remote work wave in many organizations, new research indicates.
"The efforts to colonize enterprises are at odds with most enterprise prerogatives to 'be multicloud' with respect to sourcing strategies."
"Blockchain technologies have the opportunity to become a foundational technology on which our digital experience sits."
Generally, cybersecurity experts advise stricken enterprises to not pay off the ransom to get their IT systems and data back. Now, one country is considering making that advice actual law.
"If a company is to have a viable future, the network needs to be multicloud-enabled, ubiquitous, reliable, secure, and agile."