eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
Like organizing your garage, modernizing your applications can seem daunting before you start, but you know it will pay off once it’s done. So instead of thinking about this project as a technical challenge, put it in the wider context of the business. Just as getting rid of old junk in your garage frees up […]
As we embark on the third year of the seemingly endless COVID pandemic, the top priority for most chief information officers (CIOs) is to support their remote workforces. CIOs are migrating more infrastructure to cloud-based workloads, but this effort for digital transformation is especially hard on mid-sized companies that lack the budget and IT talent […]
California took bold steps to protect consumer data in 2018 with the California Consumer Privacy Act (CCPA), the first U.S. data privacy regulation that promised strict oversight and severe financial risk for businesses. This landmark legislation increased awareness about the need to protect consumer data and the individual rights of a user. It took steps […]
A common lament among machine learning engineers is that, in general, putting machine learning (ML), deep learning (DL), and AI applications into production is problematic. Many engineers would attest that a large percentage – estimated at 90% – of ML models never see the light of the day in production. Let’s examine four best practices […]
The acceleration of digital transformation over the past two years has radically shifted the way enterprises need to protect themselves from today’s modern cybersecurity threats. In particular, the move from monolithic applications to a highly distributed modern application architecture is causing the number of workloads and communications within and across clouds to explode. In fact, […]
Ransomware attacks lead the headlines and strike fear in the hearts of executives who face crippling operational shutdowns and public relations nightmares. Yet too many executives are prepared to pay a ransom without considering other avenues as a means of business recovery, and place too much trust in insurance coverage and the honesty of criminal […]
As employees continue to work remotely, cloud-hosted virtual desktops have become a popular platform to securely deliver the data and applications they need to remain productive. As a result, virtual desktops have become a mission critical component of many IT environments. Making them resilient, therefore, is an important design consideration when relying on the service […]
Security leaders are facing the perpetual challenge of keeping their threat detection capabilities on par with increasingly sophisticated malware. Unfortunately, traditional threat detection technology that uses malware signatures and rules no longer offers the most effective approach for protecting enterprises against modern malware. While signature-based detection – which scans traffic for unique patterns of code […]
If you’re reading this, no doubt you take data security seriously. Your company might even have an industrial-strength firewall, rock-solid data governance rules, a professional security team, and a roster of data protections like encryption. You feel good about it. You sleep well at night. But should you? Sorry to ruin your sleep here, but […]
Containers have emerged as the standard for cloud-native application development, and Kubernetes, also known as K8s, is arguably the most popular container orchestration tool. A survey from the Cloud Native Computing Foundation (CNCF) revealed that 91% of respondents use Kubernetes, 83% of them in production. That’s up from 78% the previous year. However, popular isn’t the […]