Cloud News & Reviews - Page 2
More Cloud News
JOIN US: This is a chat-based conversation about how we realistically are going to be storing our business and personal data in places where it will be safe and accessible for years to come. Can the cloud handle all of this? Doubtful.
EXCLUSIVE: Sysdig is set to launch version 2.0 of its Cloud-Native Visibility and Security Platform, providing organizations with integrated capabilities to manage workload performance and security.
eWEEK DATA POINTS: Questionable online travel agencies, travel aggregators, competitors and criminals are using malicious bots to conduct a variety of attacks on airline websites that result in online fraud, website downtime and loss of potential revenue.
PRODUCT/SERVICE ANALYSIS: Why isn't it automatic--or at least much easier--to show movies from services with which you subscribe on any device you are using? It's all a complicated mess; perhaps this leaves open an opportunity for an enterprising new service company.
eWEEK DATA POINTS: Though excitement about AI and ML is legitimately growing, we hear little about how the data actually goes from collection to algorithm. By examining the process behind building hypothetical machine learning models, we can look at what important processes are often glossed...
Salesforce veterans come together to launch a new company that looks to provide visibility to help organizations secure Software-as-a-Service(SaaS) cloud applications from potential data leakage.
The Xen Project is continuing to enhance performance and boost security in its latest open-source hypervisor release.
Intel Capital has added 14 tech startups to its portfolio of investments in areas such as health care, communications and manufacturing. The record $117 million in funding was announced at Intel’s annual investor conference.
Also available is a preview version of Anomaly Detector in Azure Cognitive Services, which lets users add feedback to improve app code.
NEWS ANALYSIS: Security researchers report that the Intel VISA chips can be exploited to expose information from signals that pass through the system boards of some computers.