How cloud technology can help SMBs to compete [Q&A]


Smaller businesses have always found it hard to compete against their larger rivals, but that's starting to change as technology allows a leveling of the playing field.
So how can technology, and in particular the cloud, help to give smaller companies an edge? We spoke to John Buni, CEO and co-founder of the CleanCloud SaaS platform and founder of bespoke tailoring company Tailor Made London, to find out.
Why application security should be a key part of development [Q&A]


As data protection legislation tightens and breaches continue to make headlines, there is increased pressure on businesses to implement security by design in their applications.
For many this has meant a move to DevSecOps. We spoke with Rusty Carter, vice president of product management at application security specialist Arxan to find out why this approach is becoming essential.
The separation of storage and compute [Q&A]


Business intelligence and analytic projects have traditionally been based on the concept of the enterprise data warehouse, which saw compute and storage combined in a monolithic platform to achieve the performance required for high-performance analytics. More recently, the trend has been toward data lakes, but this was similarly based on the approach of putting all data in a single environment -- initially Hadoop -- for storage and analysis.
We spoke with Justin Borgman, CEO for Starburst Data, on why he believes the separation of storage and compute in the data processing and analytics sector is a trend that will continue to gain momentum.
Why digital transformation must be optimized for speed and success [Q&A]


Companies worldwide across all industries are enacting digital transformation (DX) initiatives -- and for good reason. If completed successfully, modern technology implementation drives competitive advantage and makes business operations much more real-time.
However, the journey to the DX finish line is unfortunately sometimes much more of sprint than a marathon, as speed is the currency for organizations to complete the process.
How microsegmentation can deliver zero trust security [Q&A]


With a never-ending supply of new security threats presenting themselves every day, it can be tough for IT departments to keep up.
While perimeter security continues to be important, the sheer volume of novel attacks means that, eventually, an attack will bypass defenses and gain a foothold in the interior. To harden the network interior, best practice now calls for microsegmentation to achieve a zero trust environment, but that’s not easy to do.
Why change management is essential to digital transformation projects [Q&A]


Digital transformation is currently an attractive option for many businesses. But to make it work it needs to be effectively managed.
We spoke to Nital Hooper, senior manager consulting at consultancy company Servita to find out about the importance of change management to successful digital transformation.
How open source is helping remove data silos in the enterprise [Q&A]


Historically data has been stored in silos in order to deliver a quick solution. But in the longer term silos can slow down decision making, make modifying systems harder, and hinder compliance with regulations.
One of the ways to break down barriers between silos is to allow data to be freely shared between them and open source has a big part to play in this. We spoke to Mandy Chessell, distinguished engineer at IBM Cognitive Applications, and recently elected leader of the Technical Steering Committee of the ODPi, to learn more.
Is latency the cloud's Achilles heel? [Q&A]


The cloud is arguably the most transformative enterprise technology in the past two decades. Yet, as powerful as it is, it faces a huge latency problem -- and the big public cloud providers know it.
Their data centers can't be everywhere and close to every end-user, so the big distances created result in unavoidable latency.
Protecting card data and more in the contact center [Q&A]


Although many transactions are now carried out online, contact centers remain an important tool for businesses.
Call and contact center payment security solutions provider Semafone has had its latest Cardprotect (version 4) product validated by the Payment Card Industry Security Standards Council (PCI SSC) against the latest version of the Payment Application Data Security Standard (PA-DSS). This makes it one of the only companies in the industry to provide this level of certification.
Why firewalls still matter [Q&A]


Firewalls have been used to protect networks and endpoints from the very early days of the web. In recent years many people have been predicting its demise, yet the firewall is still with us.
Why is this and how has the firewall evolved to protect enterprises in the 21st century? We spoke to Ruvi Kitov, founder and CEO of network security specialist Tufin to find out.
What is fueling container and multicloud adoption? [Q&A]


Containers and cloud native applications are transforming how quickly and reliably organizations can bring ideas to market, while also providing the key building blocks for multicloud strategies.
But for all the speed, agility, and elasticity these technologies promise, they also create a complexity tipping point. Across industries, IT staff looking to deliver on the benefits of container and multicloud strategies -- without being overwhelmed by complexity -- are increasingly turning towards workload automation.
Understanding the Brazilian hacking community [Q&A]


We tend to think of hacking communities as being concentrated in the Far East or the former Soviet bloc, but of course there hackers elsewhere that we don't hear so much about.
Researchers at Recorded Future have been investigating hacking communities around the world, and their latest report covers Brazil.
Securing serverless computing, the latest cloud paradigm [Q&A]


The cloud-skills shortage has made security a major challenge for enterprises. In fact, virtually every data breach in the cloud today is due to human error, rather than brilliant hacking. Hackers don't even bother launching attacks in the public cloud; they simply look for misconfigured systems that leave data exposed.
Against this backdrop, a whole new cloud model is taking hold -- serverless computing. In a world where cloud certifications and security skills are already in short supply and causing chaos in the cloud, what will serverless computing do to compound that problem for enterprises? Is it possible for organizations to avoid making the same mistakes with this new paradigm that they are making in traditional cloud environments?
Why bare-metal containers are scaring VMware [Q&A]


With a market capital of $73 billion and a stock price that has more than tripled in three years, VMware is one of the big hitters of the IT industry. The company has dominated the market since it introduced virtual machine server abstraction 19 years ago.
But some industry watchers cite the rise of containers as an existential risk to VMware. This new way of software deployment was popularized by developers via the Docker container format, and more recently is taking the data center by storm as enterprises take containers into production and standardize on Google’s Kubernetes orchestration platform.
How edge computing is making 5G possible [Q&A]


This month, Verizon announced its intention to increase its use of edge computing technology, having tested edge functions in its 5G network in Houston resulting in massively decreased network latency.
This move is another example of how new technologies will enable and extend digital transformation projects at the edge, and this is only the beginning.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.