-
By Tom Fenton
Tom Fenton looks at companies he found especially interesting this year.
-
"The SIEM market is maturing at a rapid pace and continues to be extremely competitive. The reality of what SIEM was just five years ago is starting to detach from what SIEM is and provides today."
-
Brien Posey details several reasons why a container image should not be dynamically updated.
-
Global technologists see the nascent metaverse playing a big role in the coming years as it affects everyday life in a variety of ways, including helping to mitigate climate change and becoming the venue for interactions of all kinds.
-
Amid a crippling cloud-native talent dearth, backup/disaster recovery specialist Veeam is positioning its new Kubernetes data management update as a bridge of the skills gap.
-
New research indicates the next few years will be crucial for organizations seeking to operationalize machine learning technology, with automated anomaly detection predicted to figure prominently in that effort.
-
As if organizations didn't have enough workforce worries amid a crippling digital skills gap, a new study indicates they also have to deal with acquiring talent for emerging technologies that they expect to become industry standards.
-
Today is Wasm Day, marked by the Cloud Native Computing Foundation publishing a microsurvey about WebAssembly, a transformative web development technology that after five years is still leaving users wanting more.
-
Open source software in the enterprise has basically fulfilled its promise, a new report says, but its usage might be curtailed by worries about management, support and trust.
-
By Tom Fenton
Tom pushes the low-cost Raspberry Pi competitor beyond its intended limits to see what happens.
-
You don't need to have the strongest security posture out there, you just need to NOT have the weakest.
-
By Tom Fenton
Tom looks at the hardware, extends storage and performs basic storage/network tests on the $29 Raspberry Pi alternative.
-
The inability to find IT pros with requisite cloud skills is persistently identified as a major challenge to organizations moving to cloud computing.
-
By Tom Fenton
Tom finds it won't do 720p video streaming but is still impressed with the value of the $29 Raspberry Pi alternative.
-
At this week's big Ignite 2022 tech conference, Microsoft announced multiple efforts to bolster security for Azure DevOps, including a limited private preview of GitHub tech.
-
By Tom Fenton
The $29 Raspberry Pi competitor continues to impress Tom, though he suffers a couple hangs while testing various applications.
-
A new cloud study from IBM tells a familiar story: Organizations are choosing the hybrid model to drive digital transformations but are hindered by factors including a lack of skilled technologists, security concerns and overwhelming compliance/regulatory burdens.
-
By Tom Fenton
Tom has thought about investigating Pi alternatives but was put off by sketchy companies and long delivery times -- and then he found the Inovato Quadra.
-
When it comes to workloads, artifacts and OS choices, AI, containers and Linux all rank highly.
-
In cloud hardening beyond Next, Next, Finish configurations, orgs have to choose two of three security posture characteristics: easy, cheap or secure.
-
By Tom Fenton
From big announcements to small-vendor scoops to after-hours fun, Tom makes the case for attending the Barcelona event.
-
By Tom Fenton
At KubeCon you can learn and get a vibe for the direction that K8s is headed and discover how you need to position yourself and your company for these changes.
-
Unlike Amazon's web interface, AWS does not automatically update command-line tools such as the AWS Tools for PowerShell.
-
Paul Schnackenburg, the one-man Security Operations Center, talks about the MITRE ATT&CK framework, the cybersecurity kill chain, modern security threats and why an integrated suite of security tools is crucial for defense today.
-
Veteran cybersecurity experts working on the front lines are left shaking their heads when they have to deal with organizations whose security postures are still wide open to well-known, longtime vulnerabilities.