Edge computing has many upsides including better near-real-time response and analytics for IoT, but it’s far from plug and play.
Stories by Bob Violino
Salesforce systems hold a lot of sensitive customer data. Businesses must not fall victim to one of these common sins, errors, and blindspots.
A brief guide to the network, infrastructure, data and app security capabilities AWS, Microsoft Azure and Google Cloud provide to prevent cyber attacks.
The line between CIO and CTO roles is increasingly blurring. Here’s how to these roles traditional differentiate and how they are converging.
Indirect costs related to a ransomware attack can add up over time. These are the expenses and financial risks that CISOs should be aware of.
The CTO has emerged as a key player in the C-suite, as digital transformations become high strategic priorities for so many organisations.
Putting a framework of IT policies that should be the foundation of every company's security plan.
Finding success with data analytics requires good tools, good data management, and good strategy.
G&J Pepsi and Zipline turn to data science and machine learning to get the right products to the right locations at the right time.
Employers talk about how IoT is enabling contact tracing, monitoring air quality, and enforcing social distancing rules as workers go back to the office.
How customers are using AI and machine learning to improve sales, identify and protect sensitive information, and automate oil drilling operations.
Moving analytics to the cloud requires new approaches, skills, and architectures compared with analysis done in-house the traditional way.
New, cross-discipline risk management techniques are necessary to securely reap the benefits of transformative technologies.
Here’s how IT teams have protected work-from-home employees, and what needs to be done moving forward.
IT pros aim to take on IoT leadership roles as organisations deploy more connected devices and build the infrastructure to support them.
Nominations now closed