Java underpins enterprise app modernization plans


A new report from provider of Java web application platforms, Vaadin, looks at how enterprises build, deploy, and modernize Java applications in 2023 and also reveals trends and future plans for the use of Java in enterprise applications.
Java is used heavily for both internal (64 percent) and customer-facing (62 percent) applications, which include both SaaS and internet-based services. However, Almost half of Java applications still need modernization.
Real-time Ubuntu delivers for enterprise workloads


Today Canonical has announced the general availability of real-time Ubuntu 22.04 LTS. This enterprise-grade offering is aimed at the industrial, telecom, automotive, aerospace and defense sectors, as well as public sector and retail.
Real-time Ubuntu allows organizations to run their most demanding workloads and develop a wide range of time-sensitive applications on the open-source operating system.
Top enterprise concerns raised by so called 'romance' or 'pig butchering scams'


During "romance week" and Valentine's Day, your heart can be stolen in the blink of an eye, and so can your money. The FBI has warned of "romance" scams, centering the bulletin around the celebration of love, which demonstrates that it’s not just a box of chocolates that’s seducing people, it’s scammers and cyber criminals. Staggering new data from the FTC shows that last year, nearly 70,000 people reported a romance scam, and reported losses hit $1.3 billion. The median reported loss was $4,400.
Romance scams are a variation of what’s called "pig butchering," a type of social engineering attack that alludes to the practice of fattening up a hog before slaughtering it. The approach combines some time-tested elements of fraud -- such as gaining trust. It relies on the effectiveness of relationships nurtured on social media and the ease with which currencies can be moved electronically. In simpler terms, scammers are posing as lovers, gaining the trust of their fake beau, and then asking them for money for gifts, procedures, plane tickets, you name it.
AI, Machine Learning and Deep Learning in the enterprise: Implications to data storage


Artificial Intelligence (AI) has been a hot topic for a long time, but its impact on our society and in the enterprise are just beginning to be realized. AI and other forms of machine learning and deep learning will revolutionize business, automating repetitive tasks and accelerating outcomes -- all based on huge sets of data.
Developing deep learning applications generally follows a three-step process of:
Why app modernization shouldn't hold back digital transformation [Q&A]


Digital transformation projects often rely on the updating or replacing of apps, but that can put a brake on the speed of progress.
Many enterprise apps rely on established systems like Java which have been around for a long time but still remain popular. We spoke to Kim Weins, VP of products at open source web development platform Vaadin, to find out more about the challenges of bringing enterprise apps up to date.
More progress needed to protect identity, networks and applications


While technology to secure devices has been widely adopted, more progress is needed to protect identity, networks and applications, according to the first-ever Cybersecurity Readiness Index from Cisco.
Respondents rank identity and device management as two of the three top cybersecurity threats. With the widespread adoption of technology like multi-factor authentication (MFA), criminals are increasingly targeting the solutions employed to protect users and devices.
Continuous Threat Exposure Management and what it means for enterprise security [Q&A]


This summer, Gartner introduced Continuous Threat Exposure Management (CTEM). This is a set of processes and capabilities that allow organizations to create a system for review of exposures that is faster than the periodic project-based approach.
With endless threats and vulnerabilities hammering today's organizations, exposure management that evaluates the accessibility, exposure and exploitability of all digital and physical assets is necessary to govern and prioritize risk reduction for enterprises.
Cloud storage remains popular but comes at a cost


A new survey of 350 IT leaders in the US and UK shows 84 percent of respondents want a large portion of their storage to remain in the cloud, and two-thirds of them want as much storage in the cloud as possible.
On average, enterprises have put 57 percent of their storage in the cloud, whilst keeping 43 percent on premises.
Debugging the monolith: How to change the thinking of an entire tech company


In recent history the tech industry has been impervious to market forces that have crippled adjacent sectors, predominantly because of the public’s insatiable demand for digitization.
However, over the course of the past year vulnerabilities have begun to emerge, with the economic climate growing so harsh that even the mightiest tech giants have faltered. Tech industry investment was down 40 percent in Q3 2022 compared to the same quarter in 2022, while market leaders such as Meta, Amazon and Twitter have all cut jobs to manage costs.
CIO role gains in importance as economic hardship bites


According to a new report, 77 percent of CIOs say their role has been elevated due to the state of the economy and they expect this visibility within the organization to continue.
The 22nd annual State of the CIO report from Foundry looks at how the CIO's role has changed over time, as well as an in-depth analysis of technology and business initiatives that CIOs plan to focus on in 2023.
Island integrates ChatGPT into its enterprise browser


Since it was launched towards the end of last year ChatGPT has created quite a buzz, both for its legitimate uses and its potential to be abused.
Now though Island is announcing the integration of ChatGPT into its Island Enterprise Browser. It aims to provide deep contextual awareness, so you receive prompts that are informed by your behavior and relevant to what you're working on, as you work on it.
Quality and security suffer in the push for digital transformation


A new survey of 1,300 CIOs and senior DevOps managers in large organizations finds it's getting harder for IT teams to maintain software reliability and security amid the rapid acceleration of digital transformation and rising complexity of cloud-native environments.
The study from Dynatrace finds 90 percent of organizations say their digital transformation has accelerated in the past 12 months. 78 percent of organizations deploy software updates into production every 12 hours or less, and 54 percent say they do so at least once every two hours.
Taking control of the scary things: churn, incidents and downtime


Three little words herald major impact (and fear) for organizations: churn, incident, and downtime. Given that Gartner reports companies might be at risk of losing up to half a million USD each hour from severe incidents (based on losses and time to remediate), boards should take the health of a company’s digital operations seriously. Thankfully, those responsible for digital operations and incident response have a plethora of capabilities and services at their disposal that can drastically reduce the impact downtime and instability has on their organization.
With a long recession forecast for the UK, leveraging these tools to better understand, plan, and predict is crucial. Achieving this state of operational maturity means businesses are equipped with the right analytics, communications, understanding, and ability to take action to manage all threats and incidents -- and try to prevent as many as possible from occurring in the first place. True operational maturity goes beyond the technology in place to also cover the people and processes involved. These ‘human’ elements are no less vital since they are associated with important metrics and outcomes such as hours worked, staff burnout, and attrition.
Why enterprises need a complete data strategy [Q&A]


Thanks to eCommerce, IoT devices, social media and more, organizations are collecting larger volumes of data than ever before. But often this is on the basis that they collect everything and work out what to do with it later. An approach that opens them up to risk that data can be misused.
We spoke to open detection and response firm Corelight's CISO Bernard Brantley, who believes organizations can implement a complete data strategy, allowing them to work backward from risk to raw logs and create a supply chain that generates information critical to risk reduction activities.
It's time to consider the business impact of APIs


APIs need to be discussed in terms of business impact. For too long, the API (application programming interface) has been considered a pure technology topic. But with the need to digitize core business operations and deal with rising security threats, business and technology leaders must elevate API strategic discussions. Meanwhile, organizations need to end the hotchpotch of APIs that act as point solutions and adopt a modern integrated platform approach to APIs that will deliver business optimization and improve the customer experience.
It is essential to look at the effect of APIs on the business, particularly as organizations deal with the three big impacts of war, recession, and inflation, which are putting pressure on all types of business. Moreover, APIs are a central pillar of three trends: digital transformation, improving data access and sharing and enhancing the customer experience, which were identified in a study we recently commissioned with research firm Vanson Bourne.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.