Cloud Computing

In the current cross-industry scamper among enterprises migrating to clouds, no clear winners have yet to emerge in the race for market share among the hyperscale public cloud providers. Automated cloud migration company Next Pathway on April 20 unveiled a new report with key data on the overall sta...

Canonical's Ubuntu 22.04 LTS, aka "Jammy Jellyfish," is now generally available with features that raise the bar for open source -- from cloud, to edge, to IoT and workstations. Ubuntu enterprise users will find hardcore improvements in security and performance for IoT and cloud computing connection...

Cloud storage provider Nasuni recently announced a $60 million equity investment by new investor Sixth Street Growth. This is the fourth round of financing for Nasuni over the last five years, during which it has raised a total of $148 million. We spoke with the company's founder and CTO Andres Rodr...

The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.

Many vendors are missing a goldmine in personalizing customer experience because they are not thinking "inside" the box. A proprietary combination of software and on-demand printers from marketing automation firm UnDigital personalizes the unboxing experience. This relatively new technology is turni...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

Nearly 400 top-level corporate executives at software and device firms responded to a Revenera survey revealing the growing importance of SaaS and subscription models for the software industry. The study shows that today's dominant software monetization models are subscription and perpetual licensin...

OPINION

The Global Information Network

Let's start a new meme/hashtag/acronym: Global Information Network, or GIN. I know there's double entendre here, but we're entitled to have a modicum of fun in life, no? I've been writing about the coming of an information utility for a while, but even my visions don't match what we're watching unfo...

While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...

Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...

Even as operations as diverse as factories and hospitals are moving at least portions of their daily computational processes out of the centralized cloud and into various edges, edge computing for many people remains a mysterious concept. To provide some clarity and insight, we spoke with several ex...

The U.S. government is moving quickly and aggressively to address cybersecurity vulnerabilities affecting both the federal government and the private sector. Information technology companies that are directly and indirectly involved in providing IT products and services to the federal government wil...

Google's new service aimed at beefing up the search capabilities of retailers' websites may make those sellers more competitive with Amazon. Google Cloud Retail Search hopes to address the staggering problem of "search abandonment," which costs retailers more than $300 billion a year in the U.S. alo...

New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...

E-Commerce Times Channels