Sat.Dec 12, 2020 - Fri.Dec 18, 2020

5 Essential Cybersecurity Skills for Embedded Developers

Association of Information Technology Professional

This article will introduce you to how embedded systems and security are connected and why embedded developers should have cybersecurity skills

7 Options to Modernize Legacy Systems


Digital transformation has made it imperative for application leaders to find effective ways to modernize legacy systems. The biggest challenge? Knowing the risk-to-reward ratio before acting.

System 308

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Predictions for AI in 2021

Information Week

We look past the hype to provide some real-world predictions for artificial intelligence in the enterprise next year

Centrify Momentum Fueled by Digital Transformation Including Secure Cloud and DevOps Acceleration


Centrify, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced significant sales momentum across all regions and industries as organizations seek to secure privileged access to an […]. News Centrify

Devops 267

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

SolarWinds attack explained: And why it was so hard to detect

Network World

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack

Mandatory Skills to Sustain Application Delivery in 2021


If 2020 taught the world nothing else, organizations learned the vital importance of adapting to disruption. When COVID-19 halted supply chains and countries around the world phased in and out of various lockdown procedures, organizations needed to quickly shift gears to survive.

More Trending

MongoDB Atlas Online Archive brings data tiering to DBaaS


MongoDB today released into general availability its Atlas Online Archive service, providing users with a service that enables data tiering. With data tiering a user can archive older, less active data […]. News MongoDB

Data 265

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

Network World

Hot patching and isolating potentially affected resources are on the IT response schedule as enterprises that employ SolarWinds Orion network-monitoring software look to limit the impact of the serious Trojan unleashed on the platform.

4 Ways to Make Your Tech Business Stronger in 2021

Association of Information Technology Professional

In 2020, all businesses were required to respond to new and unprecedented challenges. As we approach the new year, technology companies should focus on cybersecurity; diversity, equity and inclusion; selling solutions; and enabling trusted and safe workplaces, among other things

IT Leadership: 10 Ways the CIO Role Changed in 2020

Information Week

The pandemic presented IT leaders with an incredibly disruptive set of circumstances. But those challenges also brought new opportunities


How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. You feel ready to take on rising security threats while continuously delivering quality software updates. But how do you monitor your new program? Are you truly able to gauge the state of your projects? To ensure the success of this new breed of a team, you need to know the metrics to look at and how to advocate these metrics to C-Suite and stakeholders. Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

Bastille Networks Receives DHS OTA to Continue Wireless Security Tech Dev’t


Atlanta, Georgia-based internet of things company Bastille Networks has received an other transaction agreement from the Department of Homeland Security to continue the development of a technology designed to protect […]. News Bastille Networks

How to Drive Agility with Intelligent ERP in the New Normal

Social, Agile and Transformation

Driving agility has taken on greater meaning and importance because of the COVID pandemic, and successful digital leaders recognize the urgency in enabling smarter, faster, safer, and innovative organizations.

Agile 192

Who’s Hiring for IT Jobs in the United States?

Association of Information Technology Professional

IT pros continue to be in demand - even amidst a pandemic. But who is hiring, and where? We turn to CompTIA Tech Town data to find out

Data 179

ConfigMgr 2010 is Generally Available | SCCM


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. ConfigMgr 2010 is Generally Available now without an opt-in version script. Microsoft released the SCCM opt-in version of 2010 on Nov 30th, 2020.

The Pro’s Guide To Getting The Best ROI From Your New LMS

You need a Learning Management System when your courses and training programs need to be accessible online. Quickly build the perfect business case and easily determine which LMS will provide the best return on investment you need with this how-to eBook!

Immuta Automates Data Access Governance for Cloud Data Ecosystems


Immuta, the automated data governance company, today announced the availability of new features for its Automated Data Governance platform including new, native integrations with Starburst Presto and Presto. By natively […]. News Immuta

How Tech-Focused Unicorns Adapt

Information Week

Here's a playbook for tech companies with high-growth aspirations

Predicting 2021 in cybersecurity: DDoS attacks, 5G speed, AI security, and more

Tech Republic Security

Expert pleads with companies to realize they are potential attack victims, no matter their size

Chef cofounder on CentOS: It's time to open source everything

Tech Republic Cloud

Commentary: Red Hat has been in hot water about changing the way CentOS operates, but that model looks like the exact right way for open source entrepreneurs to operate

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Palo Alto Networks Takes On 5G Security With New Offerings


Palo Alto Networks has rolled out a series of as-a-service offerings to help service providers and enterprises secure 5G networks, services, applications and devices. The Santa Clara, Calif.-based based platform security vendor […]. News Palo Alto Networks

From AI to Tech Towns: The Top 10 Technology Business Blogs for 2020

Association of Information Technology Professional

This year’s list of CompTIA’s top technology business blogs demonstrates how the tech industry responded to the pandemic, how our businesses pivoted in the midst of unprecedented chaos and change, and, ultimately, how we’ve emerged tougher and more resilient

Phone scammers were able to get 270% more personal information in 2020 than in 2019

Tech Republic Security

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion

Report 169

Fable Studio unveils two AI-based virtual beings who can talk to you

Venture Beast

Fable Studio has announced two new conversational AI virtual beings, or artificial people. Their names are Charlie and Beck. Read More.

How Embedding AI-Powered Analytics Can Give You a Competitive Advantage

Embedding dashboards and reports aren’t enough. Futureproof your application by offering instant, actionable insights that will give you and your customers a competitive advantage.

Appian Releases Unified Platform for Hyperautomation


Appian recently announced the latest version of the Appian Low-code Automation Platform. The new version makes it easier for IT professionals to drive rapid and substantial business value from a […]. News Appian


10 Tech News Stories You May Have Missed This Year

Information Week

Tech news never sleeps, but you may have missed (or forgotten about!) a major story or two this year because working at home can be really distracting


Cybersecurity experts hail new IoT law

Tech Republic Security

The bill would increase protection for the billions of connected devices "owned or controlled by the government" in homes and businesses

Nvidia’s Inception program tracks 7,000 AI startups, up 25% in a year

Venture Beast

Nvidia's Inception program is tracking over 7,000 AI startups, up 25% in a year. That's a lot of growth in a very tough climate. Read More.

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Tech unicorn UiPath discloses data breach


Tech unicorn UiPath, a startup that makes robotics automation software, is currently emailing users about a security incident that exposed their personal information online. “On December 1, 2020, UiPath became aware […]. News UiPath

Data 254

Why Lego Went Cloud and Serverless to Handle Traffic Spikes

Information Week

Toy giant spoke at AWS re:Invent about its transformation to better scale its online resources to accommodate customer demand

AI, ML can bolster cybersecurity, and vice versa, professor says

Tech Republic Security

Howard University professor talks about his research in emerging technologies

Mobile game giant Playtika files for an IPO

Venture Beast

Israel-based mobile gaming giant Playtika has filed papers for its long-awaited initial public offering (IPO). Read More. Business Games Mobile category-/Business & Industrial category-/Games category-/News/Business News DeanBeat Mobile and Social initial public offering IPO Playtika

Mobile 114

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.