Articles about Q&A

The keys to executing an employee-centric return to the office [Q&A]

Office entrance

As businesses begin to announce their intentions to bring employees back into the office, many employees have publicly pushed back. People don't want to go back into work and incur all of the stresses that come with it, including lengthy commutes, parking fees, and a loss of work-life balance.

Zach Dunn co-founder and VP of customer experience at Robin has helped hundreds of companies, including Twitter, Peloton, and Toyota, to execute comprehensive return to office (RTO) strategies that have run smoothly and paved the path towards an effective hybrid workplace model.

Continue reading

How eCommerce has adapted to the pandemic [Q&A]

eCommerce

One of the side effects of the COVID-19 pandemic has been a boost to online shopping. This has increased pressure on companies offering eCommerce to adapt quickly to the new business model.

But how well have businesses -- particularly smaller ones -- coped with this and what should they be focusing on as we move forward?

Continue reading

Facing the business challenge of open data [Q&A]

Digital data

We're all familiar with the term 'big data' but not perhaps with 'open data'. Open data is information that can be freely reused and distributed, it's often linked with mixing datasets too.

But what challenges does dealing with open data present for enterprises? We spoke to Mo Ladha, product manager at content services platform Hyland, to find out.

Continue reading

Why open banking apps must stay secure to earn consumer trust [Q&A]

online banking

Traditional banks are realizing that they must develop more user-friendly open banking apps if they're not to lose customers to fintech startups.

But it's critical that these apps gain the trust of consumers if open banking is to succeed. We spoke to Jasen Meece, CEO of Cloudentity to discuss how financial services companies can ensure their open banking apps and partners adhere to compliance standards and protect consumer’s personal data.

Continue reading

Why service mesh adopters are moving from Istio to Linkerd [Q&A]

Service mesh, in case you're unfamiliar with it, is an infrastructure layer that facilitates service-to-service communications between services or microservices via the use of a proxy.

This offers a number of benefits including secure connections and visibility of communications. The two main competitors in the service mesh space are Istio and Linkerd, and the market has recently seen a shift towards the latter. We spoke to William Morgan, CEO of Buoyant and co-creator of Linkerd, to find out more about service mesh and why the shift is happening.

Continue reading

Microsoft Teams and the challenge of cloud app management [Q&A]

MS teams

Microsoft Teams' pandemic-inspired rise within the enterprise hit a new milestone recently when the company announced the app had 145 million daily active users.

Microsoft has been the biggest beneficiary of the shift to remote work as thousands of businesses have adopted its 365 platform to support employees. However, due to the speed at which many organizations adopted the collaboration app, there are often pockets of employees resistant to using Teams because they're more comfortable with alternatives like Slack or Zoom.

Continue reading

How deep learning can deliver improved cybersecurity [Q&A]

Traditional cybersecurity isn't necessarily bad at detecting attacks, the trouble is it often does so after they have occurred.

A better approach is to spot potential attacks and block them before they can do any damage. One possible way of doing this is via 'deep learning' allowing technology to identify the difference between good and bad.

Continue reading

Why enterprises are struggling with their digital transformation projects [Q&A]

Digital transformation

We recently reported on research from value stream platform Digital.ai into digital transformation projects, which should make worrying reading for many enterprises.

The study showed that many organizations feel they're not getting the most from their transformation projects. We talked to Gaurav Rewari, chief technology officer at Digital.ai to find out why this is happening and what can be done about it.

Continue reading

How mismatched incentives create problems for development [Q&A]

home working

Site reliability engineering (SRE), SecOps and developer teams are all supposed to be on the same side.

But mismatches in incentives between these groups can lead to challenges surrounding how and what information is shared across siloed teams. This creates a hazard where one team can shift deployment risk to another team, with no accountability back to the originating team.

Continue reading

The challenges of securing the modern enterprise [Q&A]

business security

In recent months there have been many high profile attacks using ransomware and other techniques, against businesses.

But why has there been an apparent upsurge in attacks and what should enterprises be doing to keep them selves safe? We talked to Lynx Software Technologies' vice president of product management, Pavan Singh to find out.

Continue reading

Why enterprises need to prepare for more insider threats [Q&A]

insider threat

Insider threats are a growing problem. In its 2021 predictions, Forrester believes that insider incidents will be the cause of 33 percent of data breaches in 2021, up from 25 percent in 2020.

But what does this mean in practical terms for businesses and how can they protect themselves? We spoke to Anurag Kahol, CTO of cloud security specialist Bitglass, to find out.

Continue reading

What does Apple's enterprise growth mean for IT administrators? [Q&A]

Apple logo iMac Pro

The use of Apple devices in the enterprise has grown exponentially over the past year. In fact, a recent report from IDC showed that macOS was the operating system of choice for 23 percent of computers at US companies with 1,000 employees or more in 2020, up from 17 percent in 2019.

As businesses continue to adopt Apple devices at work, Mosyle CEO Alcyr Araujo, wants to highlight how to seamlessly deploy, manage, maintain and protect these devices at scale. He believes simple, intuitive and automated mobile device management (MDM) and endpoint security are the key to solving new endpoint management and security challenges, we spoke to him to find out more.

Continue reading

Why ransomware is on the rise and how organizations can protect themselves [Q&A]

Ransomware skull

Many high profile attacks in recent months have involved ransomware, notably the Colonial Pipeline attack. Worryingly some businesses seem willing to pay the ransoms too.

But why are these attacks on the rise and what can businesses do to protect themselves against them? We spoke to Clumio CEO, Poojan Kumar to find out.

Continue reading

The encryption technology that's revolutionizing secure data usage [Q&A]

Data encryption

Conventional encryption methods rely on the exchange of keys. This can leave them vulnerable, particularly when they're used on public cloud services.

One way around this is to use homomorphic encryption, this permits third party service providers to perform some types of operations on a user's data without needing to decrypt it.

Continue reading

Why businesses need to look to a new technology model post pandemic [Q&A]

Aging infrastructure, legacy tools and outdated strategy. Businesses today that have one or more of these issues are quickly realizing that they're not set up for success.

As we start to see signs that the pandemic is getting under control in some places, many companies are finding themselves faced with the reality that they were ill prepared to handle the tumultuous nature of the past 12 months. Those who've struggled to make it this far are realizing it's time for more than just a refresh of their old systems. A new approach is needed.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.