This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In 2025, insurers face a data deluge driven by expanding third-party integrations and partnerships. Many still rely on legacy platforms , such as on-premises warehouses or siloed data systems. These environments often consist of multiple disconnected systems, each managing distinct functions policy administration, claims processing, billing and customer relationship management all generating exponentially growing data as businesses scale.
The term service mesh has been widely used over the last several years to refer to technology that helps to manage communications across microservices and applications. In the cloud-native world, arguably the first implementation of a service mesh came from Buoyant with the open-source Linkerd technology in 2015. Over the last 10 years, Linkerd has grown as a core project within the Cloud Native Computing Foundation (CNCF).
5 key advantages of GPUs GPUs have several key advantages that make them essential for modern computing: Parallel Processing: GPUs can perform numerous calculations simultaneously, making them significantly faster than CPUs for specific tasks. Acceleration of AI and Machine Learning: GPUs are designed to handle the complex computations involved in training and running AI and machine learning models.
Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage
If AI agents are going to deliver ROI, they need to move beyond chat and actually do things. But, turning a model into a reliable, secure workflow agent isn’t as simple as plugging in an API. In this new webinar, Alex Salazar and Nate Barbettini will break down the emerging AI architecture that makes action possible, and how it differs from traditional integration approaches.
Mandiant, which was acquired by Google Cloud in 2022, paints a picture of global cyber threats from last year in order to help readers be better prepared this year.
Enterprises worldwide are harboring massive amounts of data. Although data has always accumulated naturally, the result of ever-growing consumer and business activity, data growth is expanding exponentially, opening opportunities for organizations to monetize unprecedented amounts of information. Data can be effectively monetized by transforming it into a product or service the market values, says Kathy Rudy, chief data and analytics officer with technology research and advisory firm ISG.
Enterprises worldwide are harboring massive amounts of data. Although data has always accumulated naturally, the result of ever-growing consumer and business activity, data growth is expanding exponentially, opening opportunities for organizations to monetize unprecedented amounts of information. Data can be effectively monetized by transforming it into a product or service the market values, says Kathy Rudy, chief data and analytics officer with technology research and advisory firm ISG.
Steering through a maelstrom of uncertainty and risk in a rapidly changing healthcare landscape requires resilient leaders who will adapt strategies centered on the human experience. Advancements in AI and the widespread availability of medical information are compelling healthcare provider organizations (HPOs) to reassess how they engage with customers and employees.
Billionaire Jeff Bezos takes questions in front of Blue Origin’s mock-up for the New Shepard spaceship’s crew capsule in 2017. (GeekWire File Photo / Kevin Lisota) Editor’s note: This guest post is written by Aaron Cohen , a longtime PR and brand executive. Cohen originally wrote about this topic on LinkedIn. Jeff Bezos Blue Origin may have made history on Monday for sending an all-woman crew into sub-orbit on its New Shepard rocket ship for all the wrong reasons.
Companies are intrigued by AIs promise to introduce new efficiencies into business processes, but questions about costs, return on investment, employee experience and expectations, and change management remain important concerns. To address its customers concerns, IBM is taking a Client Zero approach, having introduced AI directly into more than 70 of its business areas to solve real-world problems, and through this effort, suggesting use cases that customer companies can utilize based on IBMs o
The race to dominate AI is no longer about who has the smartest algorithms — it's about who can build and scale faster. Behind every AI breakthrough lies a battle for resources: data centers, compute hardware, power, and telecom infrastructure. And right now, even tech giants are hitting a wall. Our latest white paper reveals the six critical supply chain elements that are increasingly separating AI leaders from the rest.
A slowdown in data center lease talks by two of the larger public cloud service providers AWS and Microsoft is unlikely to have an immediate effect on enterprises running advanced workloads in the cloud. The pause in data center lease talks is unlikely to significantly disrupt enterprise ability to scale generative AI , agentic AI , or optimize AI workloads in the short term, said Ron Westfall, research director at Futurum Group.
Many organizations struggle with evolving their agile delivery model, leading to missed deadlines and customer dissatisfaction. The key issue is teams rush into solving problems without proper planning. To improve, simplify the approach by developing a clear vision, fostering collaboration, and enhancing change management while avoiding jargon and rigid frameworks.
Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.
Over the past year, CISOs have wrestled with integrating AI into security processes, balancing the promised efficiencies with the need for stringent testing and adherence to security protocols. Hot on the heels of this integration effort comes another innovation: agentic AI. An evolution that marks the next leap in AI maturity, agentic AI offers both opportunities and challenges that could redefine how CISOs, CIOs, and their teams defend against cyber threats.
Throughput is always a consideration for any type of networking technology. With security technologies in particular, networking throughput has long been somewhat constrained as the overhead of inspection and encryption slows things down. Today, networking access vendor Cloudbrink is claiming it has achieved a new milestone of 300 Gbps data center throughput for its SASE technology.
“Souffle under a sledgehammer.” Elon Musk, Tesla’s CEO, said in 2020 that if the company didn’t deliver on profits, Tesla stock would be “crushed like a souffle under a sledgehammer.” Messy dessert, anyone? The fairytale growth story of Tesla had already hit a speed bump in 2024 as revenue and profit declined.
A fan uses a smartphone to capture video of Seattle band Deep Sea Diver during a recent show at the Sunset Tavern in Ballard. (GeekWire Photo / Kurt Schlosser) Earlier this year I saw an amazing flamenco show in southern Spain. The memory is still vivid. I can hear the sharp staccato of tap shoes rattling against the plywood and visualize the dancer drifting across the stage, flowing with guitar riffs, hand claps, and vocals from her fellow artists.
In 2025, contact centers aren’t just changing—they’re being rebuilt by AI. This no-fluff, executive-ready guide shows you how to capitalize on the transformation. Inside: proven ROI calculators, workforce optimization tactics, deflection strategies, and a 90-day AI deployment plan. Built for CIOs, COOs, CX leaders, and contact center strategists, it goes beyond buzzwords into play-by-play implementation.
You dont need an LLM to tell you what the biggest change to IT departments is this year. The evidence is everywhere. Take for example our latest Pulse C-suite survey , published in January where 86% of surveyed executives plan to up their investment in generative AI in 2025, and 60% expecting their gen AI solutions to be scaled across the business a major jump from 36% in 2024.
A recent report by Hexagon looked at data from 660 enterprise executives worldwide to identify the ROI that could be achieved by digital twin technology. It found that only half of companies reported an ROI above 20%, which is roughly where CFOs tell me a project can get quick approval. Interestingly, this is almost exactly the ROI enterprises tell me they can expect from the AI projects that are approved.
This week, we saw the CVE process, as we know it, come hours from the brink of collapse when a memo started circulating on LinkedIn that DHS would cut funding to MITRE's CVE cataloging on April 16. MITREs role in the CVE process is the crucial first step in assigning IDs to vulnerabilities so practitioners, vendors, researchers and governments across the globe can consistently reference the same vulnerability.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
The Washington state capitol in Olympia. (GeekWire File Photo / John Cook) A host of tech-related businesses will soon be subject to Washingtons retail sales tax under legislation approved by lawmakers on Thursday and its sending shockwaves through the industry. Senate Bill 5814 updates the state’s excise tax code to apply sales tax to a wide range of categories, including advertising agencies, software development firms, IT support providers, and other digital service businesses.
In the race to build the smartest LLM, the rallying cry has been more data! That same mantra has made its way to company boardrooms, too. As businesses hurry to harness AI to gain a competitive edge, finding and using as much company data as possible may feel like the most reasonable approach. After all, if more data leads to better LLMs , shouldnt the same be true for AI business solutions?
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals the limitations of many products in this space. The work of cloud and Kubernetes security company Armo, the PoC is called Curing, a portmanteau word that combines the idea of a cure with the io_uring Linux kernel interface that the company used in its bypass PoC.
Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.
A coalition of over 40 Chief Information Security Officers (CISOs) from leading companies, including Salesforce, Microsoft, AWS, Mastercard, and Siemens, sent a letter to the G7 and OECD, urging them to take action on aligning international cybersecurity regulations.
Many companies invest heavily in leadership meetings but lack an effective system to capture, organize, and leverage the resulting insights and decisions. (BigStock Illustration) Are you getting more out of your meetings than ever before? You should be. Meetings remain an inevitable practice for organizations large and small. The practice dates back to the days of Socrates and Plato in ancient Greece but we have new tools and technology today that should mean more effectiveness and a much higher
ERP failures can cost millions, tarnish reputations, and even trigger leadership changes. So why do so many projects still lack meaningful executive oversight? With the majority of ERP programs running significantly over budget, its time for C-suite leaders to rethink their role. Executive oversight for ERP programs is mandatory and a standard industry practice, particularly in enterprises where senior leadership is accountable for the programs success or failure.
Tail spend — often unmanaged, fragmented and costly — can account for as much as 80% of total transaction volume. Without the right strategy, enterprises face hidden risks and unnecessary spend. It’s time to shift from fragmented, ad hoc purchasing to a strategic, technology-driven approach. Download this GEP-sponsored Everest Group research for insights on how your competitors are upping their tail spend management game.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content