August, 2024

article thumbnail

Serverless Is Trending Again In Modern Application Development

Forrester IT

For a time, it appeared that the reach of serverless platforms had exceeded their grasp. After some notable success stories like the high-profile “serverless-first” Capital One strategy, hype appeared to be dying down.

article thumbnail

Intel Cuts Over 18,000 Jobs Following Troubling Quarterly Earnings Report

IT Toolbox

Intel has announced the slashing of 18,000 jobs and other cost-cutting measures, including reduced capex and the suspension of dividends. Learn more about the development and the continuing trend of layoffs in the tech industry. The post Intel Cuts Over 18,000 Jobs Following Troubling Quarterly Earnings Report appeared first on Spiceworks Inc.

Intel 312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Ways SaaS, Low-code, and No-code Platforms Now Innovate with Gen AI

Social, Agile and Transformation

I recently shared how several breakthrough low-code platforms are innovating their developer and end-user experiences with gen AI. I reported the strategies, platform experiences, and technical capabilities from Quickbase, Appian, Pega, and SAP that they shared at their Q2 conferences.

SAP 289
article thumbnail

11 Irritating Data Quality Issues

Information Week

Organizations have been trying to improve data quality for more than 30 years, but it’s still an issue. In fact, it’s more important than ever. Here’s a look at common data quality challenges that can drive you mad.

Data 217
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say

Network World

Quantum computers may be here sooner than we thought, according to a survey of more than 900 quantum professionals released this month by quantum computing company QuEra. Just over half of the respondents said that quantum technology was progressing faster than they expected , and 40% said that it will surpass classical computing for some workloads within the next five years.

Survey 213
article thumbnail

Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC)

Tech Republic Security

A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash.

Malware 207

More Trending

article thumbnail

Cisco to Layoff 7% of Global Workforce to Focus on AI and Security

IT Toolbox

Cisco Systems, Inc. announced it will layoff approximately 7 percent of its global workforce, or approximately 5,000 employees. The post Cisco to Layoff 7% of Global Workforce to Focus on AI and Security appeared first on Spiceworks Inc.

Security 296
article thumbnail

3 Important GenAI Insights for Every Innovative Digital Transformation Leader

Social, Agile and Transformation

I want to thank Irene Lyakovetsky for interviewing me recently for the SaugaTalks podcast. We covered many topics related to AI, digital transformation, and lifelong learning, as well as technical topics such as testing large language models, AI governance, and experimenting with code generators.

article thumbnail

Did GenAI Expectations Just Crash Into Cold Economic Reality?

Information Week

After two years of ChatGPT-fueled GenAI hype, 2024 was supposed to be the year companies would invest and implement emerging AI technology. Does this week’s stock market meltdown mean the AI hype has peaked?

Company 213
article thumbnail

NIST finally settles on quantum-safe crypto standards

Network World

After years of review, the National Institute of Standards and Technology officially picked the world’s first three post-quantum encryption algorithms as the basis for its post-quantum security strategy : ML-KEM, ML-DSA, and SLH-DSA. NIST first asked cryptographers to develop these new standards in 2016, when the threat of quantum computers started becoming a reality.

IBM 210
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Nearly 1/3 of Companies Suffered a SaaS Data Breach in Last Year

Tech Republic Security

The number of organisations that experienced a SaaS data breach in the last 12 months is 5% higher than the previous year according to AppOmni.

Data 201
article thumbnail

The Ten Most Important Cloud Trends For 2024

Forrester IT

Forrester’s top ten cloud trends for 2024 report is out. No one will be surprised that AI figures prominently. Yet there are other fundamental shifts in play — the rise of the intelligent edge, increased cloud compliance complexity, and (finally!) mature multicloud networking offerings.

Trends 502
article thumbnail

Massive National Public Data Breach Exposes 2.9 Billion Records, Risks SSNs

IT Toolbox

Hackers have accessed billions of personal information records, including social security numbers, by breaching National Public Data (NPD), a background check firm. Learn more about the development and its implications for affected users. The post Massive National Public Data Breach Exposes 2.9 Billion Records, Risks SSNs appeared first on Spiceworks Inc.

Data 289
article thumbnail

Breakthrough AI and DevOps Innovations: Insights from Pioneering CTOs

Social, Agile and Transformation

You’re likely to read about the major innovations from the largest tech companies through their conferences and media coverage, while startups can get attention for their forward-looking innovations and the venture capital money funding them. However, many other breakthrough capabilities receive less notice.

Devops 196
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

How IT Leaders Can Benefit From Active Listening

Information Week

Have you heard the latest communication skill that leaders should apply? Active listening can help.

208
208
article thumbnail

What enterprises say the CrowdStrike outage really teaches

Network World

Early on July 19, just minutes after data security giant CrowdStrike released what was supposed to be a security update, enterprises started losing Windows endpoints, and we ended up with one of the worst and most widespread IT outages of all time. There’s been a lot said about the why and the how. But how much of that reflects what enterprises think about the outage and what they believe they need to do?

article thumbnail

Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers

Tech Republic Security

NIST announces new post-quantum cryptography standards, marking a significant step in safeguarding data against future quantum computing threats.

Security 197
article thumbnail

Align Budget Planning To Accelerate Performance In 2025

Forrester IT

Business and technology leaders are gearing up to spend in the coming year. Making the most of modest budget hikes will take cross-functional collaboration, a willingness to part with outdated tech, and strategic experimentation with (and beyond) AI.

Budget 497
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024

IT Toolbox

One of summer's top information security events, Black Hat 2024, ended on August 8. The event comes at a time when AI affects everything from sports and politics to business and end consumers. It also comes at a time when the cyber threat landscape continues to evolve. Check out the key event takeaways identified by Spiceworks News & Insights. The post AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024 appeared first on Spiceworks Inc.

Microsoft 291
article thumbnail

Continuous reinvention: A brief history of block storage at AWS

All Things Distributed

Marc Olson, a long-time Amazonian, discusses the evolution of EBS, highlighting hard-won lessons in queueing theory, the importance of comprehensive instrumentation, and the value of incrementalism versus radical changes. It's an insightful look at how one of AWS’s foundational services has evolved to meet the needs of our customers.

Storage 189
article thumbnail

Enterprises Are Racing to Leverage GenAI, But Can They Scale It?

Information Week

The clock is ticking when it comes to generative artificial intelligence adoption. While businesses are bullish about it, implementations may tell a different story.

article thumbnail

Nvidia fixes chip glitch, says production back on schedule for Q4

Network World

Nvidia has fixed a glitch in its latest chip, Blackwell, and should be able to resume production in Q4, its CEO told analysts on an earnings call Wednesday. Reports of the glitch earlier this month caused some concerns with enterprise IT executives. “We executed a change to the Blackwell GPU mask to improve production yields,” said Nvidia CEO Jensen Huang.

Training 197
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds

Tech Republic Security

ThreatDown 2024 Report: Malwarebytes reveals ransomware trends, showing most attacks occur at night when security staff are off duty.

Security 195
article thumbnail

Fairy-Tale Data: The Comforting Fiction That Undercuts Your CX Efforts

Forrester IT

Chances are that your organization is lying to itself about the quality of the customer experience (CX) it provides. But this lie is so pleasant, so comforting, that organizations continue to tell it even as the problems it creates pile up.

Data 457
article thumbnail

MIT Unveils Comprehensive Database of Artificial Intelligence Risks

IT Toolbox

The Massachusetts Institute of Technology (MIT) has released the world's first comprehensive database to catalog artificial intelligence risks. Learn more about the effort and its importance for end users. The post MIT Unveils Comprehensive Database of Artificial Intelligence Risks appeared first on Spiceworks Inc.

article thumbnail

MS Intune Multi-Admin Approval Expands Support to Mobile Non-Windows Devices Policy

Anoop

Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel [link] and Facebook Page to get the latest updates [link] The post MS Intune Multi-Admin Approval Expands Support to Mobile Non-Windows Devices Policy appeared first on HTMD Community Blog #1 Modern Device Management Guides by Anoop C Nair.

Policies 188
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Outages Aftermath: What's Next for Microsoft and Its Customers?

Information Week

Microsoft and its customers have a lot of food for thought in the wake of a recent outage caused by a DDoS attack while still processing the CrowdStrike incident.

Microsoft 205
article thumbnail

With Project Cypress, VMware brings generative AI to cyberdefense

Network World

Attackers have been quick to jump on the generative AI bandwagon, using the new technology to increase both the volume and the complexity of their attacks. At the VMware Explore conference going on this week in Las Vegas, VMware announced the addition of a generative AI weapon to its own cybersecurity platform, vDefend. But, to start with, the tool will be available only in an advisory capacity and won’t be able to act autonomously.

Vmware 197
article thumbnail

Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns

Tech Republic Security

Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns.

Microsoft 191
article thumbnail

Announcing the Modern Application Development Services Vendor Landscape, Q3 2024

Forrester IT

Modern Application Development Services Defined Clients want more autonomy to better control their own innovation and development capabilities to build modern and up-to-date custom applications.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.