This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
At next months Optical Fiber Communication Conference and Exhibition (OFC), many of the technologies that are driving current and future Ethernet development will be on full display by the Ethernet Alliance, which is set to unveil its tenth anniversary Ethernet roadmap. Among the hot trends is, unsurprisingly, outfitting Ethernet for all things AI. Right now we are trying to get all of the people and groups who want to build Ethernet for AI to collaborate and work together.
AI is transforming the way we live, work, and play. It’s altering how we make decisions and interact with technology. But for all its power, it still needs humans (for now).
CIOs perennially deal with technical debts risks, costs, and complexities. While the impacts of legacy systems can be quantified, technical debt is also often embedded in subtler ways across the IT ecosystem, making it hard to account for the full list of issues and risks. Forrester reports that 30% of IT leaders struggle with high or critical debt, while 49% more face moderate levels.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.
Women are severely underrepresented in top leadership roles across the business world. Only 10.4% of the Fortune 500 companies have women CEOs. In an AP survey of S&P 500 companies, only 25 of 341 CEOs were women. That disparity extends into the technology sector. The Women in Tech organization reports that 17% of tech companies have a woman CEO, and only 25% of all C-suite jobs are held by women.
Agentic AI is rising. The evolution towards pervasive AI agents paves a way towards an “Internet of Agents,” where AI entities seamlessly interact and coordinate tasks across diverse ecosystems. Just as standardized protocols fueled the internet’s exponential growth, a shared framework is crucial to actualizing a globally interconnected agentic workforce.
Agentic AI is rising. The evolution towards pervasive AI agents paves a way towards an “Internet of Agents,” where AI entities seamlessly interact and coordinate tasks across diverse ecosystems. Just as standardized protocols fueled the internet’s exponential growth, a shared framework is crucial to actualizing a globally interconnected agentic workforce.
Legacy platforms meaning IT applications and platforms that businesses implemented decades ago, and which still power production workloads are what you might call the third rail of IT estates. IT leaders often worry that if they touch legacy systems, they could break them in ways that lead to catastrophic problems just as touching the high-voltage third rail on a subway line could kill you.
CVE-2025-22230 is described as an "authentication bypass vulnerability" by Broadcom, allowing hackers to perform high-privilege operations without the necessary credentials.
Are you ready? World Backup Day is March 31 a day that has been recognized every year since it was first set up in 2011. Initially, it was meant to be a simple reminder of the importance of backups and a time to reflect on how well were all doing with this important task whether were protecting our family photos or safe-guarding critical business data.
Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.
Its safe to run your AI agents (they’re mostly chatbots, case summaries, or simple text generators today) on the Agentforce chassis as long as you run them inside your Salesforce application domain. We spent two days in San Francisco at Salesforces TDX developer conference.
SAP user companies are up against the clock. Migration toS/4HANA must be completed by 2030, and thats only if they buy into SAPs special three-year reprieve beyond standard maintenance end-of-life at the end of 2027. While that may appear to be a distant concern, companies currently working toward an S/4HANA transition, even those with a high level of IT maturity, are finding the journey challenging.
Who is the crucial AI leader unnoticed by many CIOs, particularly regarding customer experience (CX)? Sacolick reviews advanced tools for enhancing CX, warns about GenAI's productivity trap, and encourages businesses to focus on creativity. Successful transformation requires strong leadership and collaboration between CIOs and CMOs. Adobe is an AI leader in CX, The post Who is the Pioneering AI Leader Every Innovative CIO Should Watch for CX?
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Linux admins who have enabled the unprivileged user namespace restriction in their recent Ubuntu environments should take action to close three new vulnerabilities that allow a threat actor to bypass the supposed protection. This warning comes after researchers at Qualys found three different ways this hardening feature can, under certain circumstances, be bypassed.
San Jose was abuzz with excitement as AI enthusiasts gathered for the 2025 NVIDIA GTC AI conference. NVIDIA showcased its expanding data center offerings, along with a commitment to joint developments with server and network vendors. Everyone had high expectations, as this is a world-renowned AI infrastructure event, and this year, it did not disappoint.
The proof of concept (POC) has become a key facet of CIOs AI strategies, providing a low-stakes way to test AI use cases without full commitment. But as enterprises increasingly experience pilot fatigue and pivot toward seeking practical results from their efforts , learnings from these experiments wont be enough the process itself may need to produce more targeted success rates.
AI, including agentic AI, continues to rise in popularity, but without the right foundation, enterprises are taking unnecessary risks. Heres what CIOs need to know.
With IT budgets projected to grow 9.8% in 2025, leaders must invest wisely—not just cut blindly. This whitepaper introduces The Future-Proof IT Cost Optimization Model, a framework to reduce costs while maintaining service quality. Learn how Cloud Efficiency, AI-Powered Workforce Automation, Vendor Optimization, Cybersecurity Resilience, and Unified Communications can drive savings and improve efficiency.
IT and security workforce management firm CyberSN surveyed job listings from 2022 to 2024. Yes, decreases in demand for some job titles may be related to AI.
Red Hat announced updates to Red Hat OpenShift AI and Red Hat Enterprise Linux AI (RHEL AI), with a goal of addressing the high costs and technical complexity of scaling AI beyond pilot projects into full deployment. New capabilities include the ability to split AI inference across multiple GPUs and nodes, integration of InstructLab into OpenShift AI pipelines, and a new AI guardrails orchestration framework.
The growing demand for real-time data to power AI applications is compelling businesses to reevaluate their traditional data architectures. Legacy systems typically rely on separate platforms for transactional and analytical processing, leading to inefficiencies and delayed insights.
By Bryan Kirschner, Vice President, Strategy at DataStax Change management across people, processes, and technologies is a critical part of succeeding with generative AI (genAI). In earlier articles, weve covered the human element and how to adapt your processes ; here, well take a look at the third: technology. A recap: A growth mindset and the cognitive value chain Because deploying technology is a means to an end rather than an end in itself, heres a recap of the keys to achieving great outco
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Employee burnout is a common thing as the pace of business continues to accelerate. However, the symptoms in WFH and RTO environments differ. Heres what CIOs should know.
Outbound’s demonstrator plane, code-named STeVE, takes off from a runway at Pendleton UAS Range in Oregon. (Outbound Aerospace Photo) Things are looking up for Outbound Aerospace’s quest to build a new kind of passenger airplane. The Seattle startup has raised $1.15 million in pre-seed funding so far, and last weekend it sent a small-scale prototype into the skies over Oregon for its first-ever flight test. “Over the last month, everything came together, and we went out there a
In a significant development for digital infrastructure in India, Bharti Airtel has landed the 2Africa Pearls submarine cable, delivering 100 Terabits per second of international network capacity for the country. The submarine cable will connect to Airtels cable landing station (CLS) in Mumbai. This infrastructure addresses bandwidth constraints and communication challenges for enterprises seeking improved global connectivity.
Last week, SUSE hosted SUSECon 25 in Orlando, FL. Although SUSE has been in the open source game for decades, theyve been getting increased attention with some seasoned leadership coming from competitor Red Hat, its acquisition of much-loved Rancher, and changing expectations/norms in the open source ecosystem.
ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!
Generative AI is transforming functions throughout the enterprise, including in IT where its use has showcased the power of the technology. Take, for example, how gen AI is speeding service delivery and improving the accuracy of services provided by the IT help desk by looking at the history of the call logs and then providing a perfectly contextualized response based on what has worked in the past, says Nate Suda, senior director analyst for AI strategy at research firm Gartner and its CIO AI A
An artist’s conception shows Gravitics’ Orbital Carrier with payloads ready for deployment. (Gravitics Illustration) The U.S. Space Force has chosen Marysville, Wash.-based Gravitics to build and fly an orbital carrier that could deliver maneuverable space vehicles to the final frontier — and have them ready to respond to future threats.
There are a lot of different components that make up a cloud deployment. How many of those components, across multiple cloud environments, is the typical enterprise actually backing up for proper disaster recovery ? Thats a question that cloud infrastructure automation startup ControlMonkey is helping enterprises to help answer. ControlMonkey is in the business of helping to improve cloud automation.
Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content