Kubernetes market matures as optimization and control of costs become key


A new survey from Pepperdata of 800 executives and senior ITOps and DevOps professionals across major industries finds the Kubernetes market is maturing, the number of clusters that are being deployed has grown to six to ten per organization.
The variety and types of workloads is increasing too, including data ingestion, cleansing, and analytics, databases, and artificial intelligence and machine learning.
What do we want? Data! What shall we do with it? Ermmm...


A new global survey of nearly 10,000 business leaders shows 80 percent say data is crucial to decision making in their organization.
However, the study from Salesforce also shows that a third lack the ability to generate insights from data, only 29 percent are using data to inform their strategy when launching in new markets, and 67 percent are not using data to decide on pricing in line with economic conditions, such as inflation.
Protecting the software supply chain [Q&A]


As developers come under increasing pressure to deliver projects quickly, there's a rising level of conflict between development and security teams. And attackers are taking advantage of this conflict in order to target software supply chains.
So, what kind of threats do enterprises face and what can they do to protect themselves? We spoke to Pete Morgan, co-founder and CSO of supply chain security company Phylum to find out.
Enterprises plan to spend more on identity verification


A new report shows that 91 percent of organizations in the financial services, technology, telecoms, and aviation sectors worldwide intend to increase their spending on identity verification solutions in the next one to three years.
The report from Regula says 17 percent of businesses intend is to dedicate 11-20 percent of their IT budget annually to IDV solutions, with 15 percent of businesses opting for 21-30 percent.
Unlocking productivity and uplifting efficiency with Microsoft Dynamics 365 Business Central


Microsoft Dynamics 365 Business Central holds the key to unlocking efficiency and productivity in the workplace. With improved processes at the forefront of business objectives, Dynamics 365 Business Central is the necessary solution for automating and streamlining operations.
Digitization has taken hold of our day-to-day lives and businesses. The technologies we now have access to allow us to flourish like never before -- when understood and used properly. While this may be overwhelming at times, it should be looked at in a positive light.
Marketing data science -- what is it and where is it headed? [Q&A]


Data science involves analyzing and interpreting large, complex amounts of data and turning it into valuable insight to achieve business goals. Though not exactly a breakthrough field now, it has changed many aspects of how markets conduct business.
In a conversation with Jerry Johnson, founder and president of Marketing Data Science Associates and director of Cascade Strategies, we talk about data science, its applications in marketing, and its future with the emergence of AI.
Microsoft UUP will deliver smaller and faster updates to on-premises Windows 11 22H2 devices from March


Starting at the end of March, Microsoft is going to deliver its first UUP on premises updates to Windows 11 devices.
Available for systems running Windows 11 22H2, UUP (Unified Update Platform) on premises works in conjunction with Windows Server Update Services (WSUS) and Microsoft Configuration Manager. Ultimately, it means smaller updates for clients and faster update delivery, but there will be a hefty download to kick things off.
Why BYOD could be the key to increased business productivity


A 'work device' isn’t what it used to be. Employees are no longer restricted to a single, company-issued device. Instead, they move between devices based on task, time of day, and location. One minute, they might be working at a desk on a Mac, while the next they are on the move, staying productive from an iPhone.
Research has shown that employees highly value the ability to choose which device(s) they use. In fact, 87 percent of respondents in an independent global survey, conducted by Vanson Bourne in 2021 said choosing their work device was important to them, and 89 percent said they’d even be willing to sacrifice part of their salary to be empowered to choose their own technology.
Java underpins enterprise app modernization plans


A new report from provider of Java web application platforms, Vaadin, looks at how enterprises build, deploy, and modernize Java applications in 2023 and also reveals trends and future plans for the use of Java in enterprise applications.
Java is used heavily for both internal (64 percent) and customer-facing (62 percent) applications, which include both SaaS and internet-based services. However, Almost half of Java applications still need modernization.
Real-time Ubuntu delivers for enterprise workloads


Today Canonical has announced the general availability of real-time Ubuntu 22.04 LTS. This enterprise-grade offering is aimed at the industrial, telecom, automotive, aerospace and defense sectors, as well as public sector and retail.
Real-time Ubuntu allows organizations to run their most demanding workloads and develop a wide range of time-sensitive applications on the open-source operating system.
Top enterprise concerns raised by so called 'romance' or 'pig butchering scams'


During "romance week" and Valentine's Day, your heart can be stolen in the blink of an eye, and so can your money. The FBI has warned of "romance" scams, centering the bulletin around the celebration of love, which demonstrates that it’s not just a box of chocolates that’s seducing people, it’s scammers and cyber criminals. Staggering new data from the FTC shows that last year, nearly 70,000 people reported a romance scam, and reported losses hit $1.3 billion. The median reported loss was $4,400.
Romance scams are a variation of what’s called "pig butchering," a type of social engineering attack that alludes to the practice of fattening up a hog before slaughtering it. The approach combines some time-tested elements of fraud -- such as gaining trust. It relies on the effectiveness of relationships nurtured on social media and the ease with which currencies can be moved electronically. In simpler terms, scammers are posing as lovers, gaining the trust of their fake beau, and then asking them for money for gifts, procedures, plane tickets, you name it.
AI, Machine Learning and Deep Learning in the enterprise: Implications to data storage


Artificial Intelligence (AI) has been a hot topic for a long time, but its impact on our society and in the enterprise are just beginning to be realized. AI and other forms of machine learning and deep learning will revolutionize business, automating repetitive tasks and accelerating outcomes -- all based on huge sets of data.
Developing deep learning applications generally follows a three-step process of:
Why app modernization shouldn't hold back digital transformation [Q&A]


Digital transformation projects often rely on the updating or replacing of apps, but that can put a brake on the speed of progress.
Many enterprise apps rely on established systems like Java which have been around for a long time but still remain popular. We spoke to Kim Weins, VP of products at open source web development platform Vaadin, to find out more about the challenges of bringing enterprise apps up to date.
More progress needed to protect identity, networks and applications


While technology to secure devices has been widely adopted, more progress is needed to protect identity, networks and applications, according to the first-ever Cybersecurity Readiness Index from Cisco.
Respondents rank identity and device management as two of the three top cybersecurity threats. With the widespread adoption of technology like multi-factor authentication (MFA), criminals are increasingly targeting the solutions employed to protect users and devices.
Continuous Threat Exposure Management and what it means for enterprise security [Q&A]


This summer, Gartner introduced Continuous Threat Exposure Management (CTEM). This is a set of processes and capabilities that allow organizations to create a system for review of exposures that is faster than the periodic project-based approach.
With endless threats and vulnerabilities hammering today's organizations, exposure management that evaluates the accessibility, exposure and exploitability of all digital and physical assets is necessary to govern and prioritize risk reduction for enterprises.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.