Storage explained: Consumption models of storage procurement
Storage has long been the monolith of datacentre components. Deployed in forklift upgrades on multi-year refresh cycles, shiny new…
What are the security risks of bring your own AI?
Since the launch of ChatGPT by Open AI in November 2022, interest in generative artificial intelligence (GenAI) tools has…
Beyond VPNs: The future of secure remote connectivity
As more companies adopt cloud services and remote work, the limitations of virtual private networks (VPNs) are becoming obvious.…
ESET shines light on cyber criminal RedLine empire
Cyber security analysts at ESET have released an in-depth look at the inner workings of the RedLine Stealer operation…
Serverless computing’s second act | InfoWorld
Despite these issues, the hype train was at full speed. For example, a large provider took issue with me pointing…
Java app security would get a boost through quantum resistance
Java application security would be enhanced through a couple of proposals to resist quantum computing attacks, one plan involving digital…
Gartner Symposium: Time to get rid of the dead wood
The idea of lifting and shifting workloads into the public cloud is never going to deliver a good return…
IBM: APIs getting AI boost
IBM sees a confluence of artificial intelligence and APIs, with AI powering APIs in a way that improves the productivity…
Google Cloud MFA enforcement meets with approval
The cyber security community has reacted positively to Google’s 4 November announcement that it will begin to enforce multifactor…
GitHub Copilot learns new tricks
You start with an existing project and the details of build tools and frameworks, along with a target Java version…