eWEEK EDITORS

About

eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

Tackling IT Staff Burnout: 3 Best Practices

For IT staff on the frontlines, the stress – and potential for burnout – is an occupational health issue that needs to be looked at seriously and addressed. While there aren’t necessarily hard and fast rules to follow, there are a few steps that CIOs, senior leadership and managers should take in order to tackle […]

The 5 Elements of Intelligent Automation

What’s the goal of automation? Ask a 19th century factory owner and the answer would likely have been “efficiency.” Through automation, individual workers could be made more productive. Ask a 20th century titan of industry, and the answer would likely have been “value.” Investments in automation equipment allowed for more tightly controlled quality, greater throughput […]

Agent vs. Agentless in Cloud Security: Why Both are Needed

When researching how to start with or even improve cloud security, it won’t take long to stumble upon some sort of agent versus agentless argument for cybersecurity controls. It comes up so often, it’s quickly becoming the security industry’s Vim versus Emacs or tabs versus spaces schism. Similar to those other arguments, the agent versus […]

Cybersecurity and Decentralized Finance: 4 Key Points

Criminals are now adopting cryptocurrency and non-fungible tokens (NFTs) to cleanse their illicit funds as an additional method of money laundering. For banks and their regulators, the emerging world of decentralized finance (DeFi) raises a slew of cybersecurity concerns. To prevent illicit activity, these new digital currencies must be regulated, but this will take time. […]

Understanding the Scale Limitations of Graph Databases

Graph databases and models have been around for well over a decade, and are among the most impactful technologies to emerge from the NoSQL movement. Graph data models are natively designed to focus on the relationships within and between data, representing data as nodes connected by edges. As such, the graph model is strikingly similar […]

How to Boost Data-Driven Collaboration

With rapid business expansion often comes data siloing, where one department doesn’t share its data with any of the others. While this may be noticed and fixed quickly in a small business, in a larger company with many sites and a global network, it’s much harder to alleviate. I’ve read that 73% of company data […]

Human-Centric IoT: Top Priority for Business Success

Two recent Internet of Things (IoT)-related surveys and reports emphasize use cases about efficiencies and return on investments. But surprisingly, there is no mention of people safety nor productivity. It is imperative to place people at the heart of the IoT universe. Today, people-related use cases have been greatly understated. However, all angles of IoT […]

Late to the Enterprise AI Party? 3 Ways to Get Started

Even as artificial intelligence becomes a cornerstone of current business, many enterprises are still struggling with how to get started. Those looking at what AI-driven companies like Amazon, Microsoft and Google Cloud are doing may be concerned that they don’t have the deep pockets or best-trained staff to emulate these leaders. The good news is, […]

Study Looks at CRM Data, from Accuracy to Business Impact

Everything an organization does relies on accurate customer relationship management (CRM) data. It encompasses every part of an organization, from marketing campaigns to sales development activity to customer experience and beyond. Yet far too many CRM users blindly assume their data is clean and ready for meaningful use. And in many cases, they’re wrong. The […]

5 Cybersecurity Threats That Aren’t Going Away

Last year saw the highest average cost of a data breach in 17 years, with the cost rising from $3.86 million to $4.24 million on an annual basis, according to the IBM Cost of a Data Breach Report. Clearly, organizations must have the correct people and processes in place to prepare for unrelenting cyber attackers. […]