eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
Shadow IT continues to spread like a virus in organizations across the globe, and COVID-19 has only made it more challenging to track and eradicate. Shadow IT, sometimes known as stealth IT, refers to systems and devices deployed by employees without the approval or knowledge of the IT department. While shadow IT isn’t a new phenomenon, it has definitely grown more complex […]
The holiday shopping season is in full swing, which has been, and will continue to be, a much-welcome boon for many brands that have seen closed brick-and-mortar shops, lesser consumer traffic and reduced revenues for nearly three quarters due to COVID-19. With the pandemic still very much a looming presence, e-commerce is the true catalyst […]
In the past year, we’ve seen a rapid increase in the number of enterprise applications that IT teams are moving into the public cloud. Most recently, many are migrating even their most mission-critical applications, databases and ERP, such as SQL Server, SAP, HANA and Oracle. As IT teams under pressure to meet stringent service-level agreements […]
With the upcoming Black Friday/Cyber Monday holiday shopping season beginning this week, cybersecurity experts with Juniper Networks and Gurucul offer advice for consumers. Consumers cannot be too careful when shopping online. This is the time of year when not only many businesses make up for lack of sales earlier in this pandemic-riddled year—thus the “Black […]
Multiple types of cybersecurity solutions are necessary to defeat sophisticated criminals, but there’s a significant drawback with many conventional security tools. Often, these tools are on the lookout for anomalous activity in user behavior or network traffic, which creates the basis for an infinite set of anomalies. This means the alerts they produce are based […]
Cybercriminals continue to become more sophisticated and will take any opportunity—especially a global pandemic—to do their dirty work. In its Digital Defense Report, Microsoft notes the growth in identity-based and ransomware incidents and the expansion and evolution of internet of things (IoT) threats. Much is at stake because when bad actors penetrate networks and hijack […]
Here is the latest article in an eWEEK feature series called IT Science, in which we look at what actually happens at the intersection of new-gen IT and legacy systems. Unless it’s brand new and right off various assembly lines, servers, storage and networking inside every IT system can be considered “legacy.” This is because […]
Netherlands-based Antenna Company, which specializes in the design of high-performance embedded antennas, on Nov. 12 introduced a new Wi-Fi 6E MIMO antenna system designed to increase network capacity, extend range and reduce latency in enterprise and industrial IoT networks. The antenna system enables simultaneous operation in the 2.4, 5 and 6 GHz frequency bands, resulting […]
There’s something so satisfying about getting what you want, the way you want, when you want it. Custom everything is “in” these days. But unlike coveted-but-easily acquired custom personalize items, customizing a data center — “build to suit” in industry parlance — is a much different, more challenging undertaking usually reserved for a certain type […]
As teams worldwide embrace cloud-native architectures–replacing waterfall releases with CI/CD, monolith applications with multiple layers of microservices, and singular databases with data meshes–real-time visibility across these layers and their communication patterns becomes critical for management, troubleshooting and assurance. While there are many visibility tools on the market, they mostly operate on the application and infrastructure layer and […]