-
Is there a widespread backlash to cloud computing that sees organizations moving their IT operations back to on-premises datacenters? That longstanding debate was fueled by recent comments from AWS about cloud repatriation among its customer base.
-
Cloud misconfigurations, specifically the blind acceptance of default resource settings, continue to cause cybersecurity issues in the cloud, with AI systems being a new factor.
-
Connectivity cloud specialist Cloudflare announced a new AI Audit tool that monitors and controls how AI bots interact with site content, part of the back-and-forth between content owners and AI scrapers, with the former wanting to get paid by the latter.
-
"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.
-
Corporate strategies, worker productivity, the value of in-person collaborations, the value of happy employees and other factors were debated after the announcement, but one social media post brings home how such decisions can affect individual workers.
-
While Linux is the OS of choice for many AI researchers and practitioners, Windows has been getting a lot more Gen AI functionality thanks to Microsoft's huge investment into OpenAI, but there are signs of an AI surge in the open-source OS space.
-
A twisty, years-long brouhaha centered around open-source licensing has taken another turn, with an Amazon Web Services (AWS) project based on Elasticsearch being turned over to a new group under the direction of the Linux Foundation.
-
"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."
-
This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.
-
By Tom Fenton
Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.
-
Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.
-
By Tom Fenton
Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.
-
"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."
-
GitHub data released same day cloud giant CEO predicts a possible future where "most developers are not coding."
-
By Tom Fenton
Tom Fenton previews upcoming conference exploring the future of digital employee experience (DEX) and the role of technology in enhancing workplace productivity and end-user satisfaction.
-
"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."
-
Effectively, Azure OpenAI is catching up to AI offerings from the other cloud giants, AWS and Google Cloud.
-
By Tom Fenton
Tom Fenton explains why Digital Employee Experience is important, the components that make up DEX, some of the key players in this field, and where it is headed.
-
I was hoping for an all-around new super-tool, but the temporary prototype for this impressive search tool is for functionality to be added to ChatGPT. When that happens, Goodbye Google.
-
By Tom Fenton
World of EUC (WEUC) is a new organization for End User Computing (EUC) professionals dedicated to "creating an inclusive and vendor-agnostic platform that advances collective expertise and enhances the power of knowledge in the world of end-user computing."
-
"We believe every developer can be an AI engineer with the right tools and training."
-
A new tool called the IAM Access Analyzer can help you to find IAM resources with unused permissions, IAM settings that allow for external access, and more.
-
In quickly changing market, Veeam leads the execution axis and Rubrik leads the vision axis.
-
Adversarial testing with red/black teams is nothing new in cybersecurity, but a new paper examines how advanced AI can help and provides recommendations for organizations to do just that.
-
By Tom Fenton
Former resident Tom Fenton shares some of the fun and exciting things he found there to try to convince you to spend a few days after or before the conference exploring attractions outside Salt Lake City.