Articles about Q&A

Why serverless platforms will unlock a new era of low-code development [Q&A]

As developers look for ways to improve productivity they're moving away from 'no-code' offerings and have their sights set on serverless platforms to help bolster their 'low-code' solutions.

Serverless platforms take tasks like managing application resilience, performance, security and compliance away from developers, allowing them to focus on functionality and innovation. We spoke to Briana Frank, VP of product at IBM Cloud to find out more about how serverless will unlock the next era of low-code.

Continue reading

Why UK-based companies are at a crossroads with GDPR [Q&A]

GDPR graphic

Data privacy regulation, GDPR, has been in force for five years but it will soon be superseded by UK GDPR. The Data Protection and Digital Information Bill, now wending its way through parliament, will see organisations move to a UK equivalent following the country's withdrawal from the EU. But what will the change mean in practice?

We spoke to Jon Fielding, managing director of EMEA at Apricorn, to find out how UK GDPR will affect businesses and how they handle and protect data.

Continue reading

How document automation can take the pressure off IT teams [Q&A]

The shift to remote work, the Great Resignation and high staff turnover have meant that many IT teams have seen a big increase in their workloads over the last few years.

Automation is often seen as a way of addressing the problem, but can it really help to reduce workloads and get IT departments back on track? We spoke to Shawn Herring, CMO of document workflow specialist airSlate, to find out.

Continue reading

A holistic approach to closing the container security gap [Q&A]

Cybersecurity-blocks

Among cloud developers, Kubernetes is now a widely used platform. It's not immune to security incidents, however, and these can lead to loss of revenue or customers.

So, what's the best way to secure Kubernetes systems? Alex Jones, engineering director Kubernetes at Canonical, suggests a need to look beyond containers with a holistic approach to security that spans all layers of the system. We talked to him to discover more.

Continue reading

How AI and vector search are transforming analytics [Q&A]

Data analytics

Organizations have more data than ever, but unlocking the information it contains in order to make decisions can be a challenge.

The marriage of of real-time analytics and AI with vector search is a potential game changer for any business that has large amounts of data to crunch. We spoke to Rockset CEO and co-founder Venkat Venkataramani to find out more.

Continue reading

The evolution of cyber threat tactics [Q&A]

Data breaches and cyberattacks are seldom far from the news, and it's an area that seldom stands still for long.

We spoke to founder and CEO of White Knight Labs, Greg Hatcher, to discuss how threat tactics are evolving and what organizations can do to protect themselves.

Continue reading

The importance of data privacy in healthcare [Q&A]

Healthcare data

Data is one of the biggest drivers of innovation in healthcare today. Almost everything in healthcare relies on having access to the right data from developing new drugs and medical equipment to allocating resources.

Making use of this data often requires sharing with other organizations and that presents challenges when it comes to keeping it secure. We spoke to Riddhiman Das, co-founder and CEO at TripleBlind, to learn how healthcare organizations are securing their data while still making it accessible.

Continue reading

Storage challenges in a world of high-volume, unstructured data [Q&A]

Storage

The amount of data held by enterprises is growing at an alarming rate, yet it's often still being stored on 20-year-old technology.

Add to this a proliferation of different types of systems -- or even different storage platforms for specific use cases -- and you have greater complexity at a time when it’s hard to find new IT personnel.

Continue reading

How phishing scams have changed and how to protect against them [Q&A]

Cyberattacks and data breaches come it many forms, but often at the root of them is a phishing scam.

Exploiting the fact that humans are the weakest link in the security chain, cybercriminals use phishing to trick employees into giving up credentials or other sensitive information that can be used to gain a foothold to carry out a later attack.

Continue reading

Adapting to a changing cybersecurity landscape [Q&A]

Laptop security

The past few years have seen some major changes in the IT world. Accelerated by the pandemic we've seen a significant shift to the cloud and hybrid working models.

But this brings with it additional risks. We spoke to Matt Spitz, head of engineering at Vanta, to discuss the security challenges posed and how enterprises can adapt to cope with them.

Continue reading

The return of data modeling -- this time it's strategic [Q&A]

financial data exchange

Over the past decade data modeling -- setting up data structures aligned to business requirements -- has tended to take something of a back seat as businesses have rushed to bring products to market.

But we're producing more data than ever and need ways to process it effectively. That's why Satish Jayanthi, CTO and co-founder at Coalesce, believes it's time for data modeling to make a comeback in enterprise strategy. We spoke to him to find out more.

Continue reading

Shifting left to improve data reliability [Q&A]

The concept of 'shifting left' is often used in the cybersecurity industry to refer to addressing security earlier in the development process.

But it's something that can be applied to data management too. Shifting left in this sense means performing data reliability checks sooner. The ability to execute data reliability tests earlier in the data pipelines helps keep bad data out of production systems.

Continue reading

How software-defined instrumentation is changing testing and measurement [Q&A]

Software testing

The testing and measurement industry like any other is looking towards digital transformation projects, but it’s a sector that in the past has been slow to adapt.

Software-defined instrumentation looks set to change that and drive transformation efforts forward. We spoke to Daniel Shaddock, the co-founder and CEO of Liquid Instruments and a professor of physics at the Australian National University, to find out more.

Continue reading

Data bias -- the hidden risk of AI and how to address it [Q&A]

machine learning AI

Artificial intelligence is generally only as good as the data that it's trained on. However, when data is collected and used in the training of machine learning models, the models inherit the bias of the people building them, producing unexpected and potentially harmful outcomes.

We spoke to Matthieu Jonglez, VP, technology at Progress, to discuss the company's recent research around this topic and what organizations can do to reduce bias.

Continue reading

Why SOCs need urgent modernization [Q&A]

Security Operations Centers (SOCs) aim to detect, investigate, remediate, and restore organizational systems to a fully functional, secure state, whether it's defending against insider threats, data exfiltration attempts, or malware attacks.

However, examining the daily issues faced by many SOCs reveals a concerning array of challenges that place increasing pressure on the work of SOCs and the dedicated professionals who manage them.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.