Sat.Jun 14, 2025 - Fri.Jun 20, 2025

article thumbnail

8 signs that outdated IT systems are killing your business

CIO Business Intelligence

At a time when IT budgets are increasingly constrained, many CIOs are tempted to squeeze extra life out of systems that should have been put out to pasture years ago. For such CIOs, Dan Sundt , workday human capital alliance lead at Deloitte, offers this simple advice: think twice. “If you’re investing money in an IT system that’s limping along on a version that’s barely being supported by the solution vendor, it’s a good sign that the system might be killing your business,” Sundt says.

System 302
article thumbnail

Multicloud explained: Why it pays to diversify your cloud strategy

Network World

An organization takes a multicloud approach when it uses cloud services from more than one provider. That might seem obvious from the name — it’s multiple clouds, after all—but the reasons for choosing a multicloud approach can be as varied as the cloud platforms themselves. Because “cloud” has become such a broad and all-encompassing category, a multicloud environment might include, say, Microsoft 365 SaaS for productivity apps, Google Drive for storage, and Amazon AWS for compute services.

Cloud 374
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Productivity: How to Cut Costs With Generative AI

Information Week

CIOs are using GenAI to enhance financial efficiency by cutting third-party spend, renegotiating contracts, and improving cash flow forecasting, thus boosting operating margins amid budget constraints.

How To 243
article thumbnail

Report on integrity of current Post Office Horizon system due in autumn

ComputerWeekly

Search the TechTarget Network Join CW+ Login Register Cookies News In Depth Blogs Opinion Videos Photo Stories Premium Content Webinars Download 2024 IT salary survey RSS IT Management IT leadership & CW500 IT architecture IT efficiency Governance Innovation Legislation & regulation Operations & support Project management Strategy Supplier management Business issues Sponsored Communities Industry Sectors Healthcare IT Charity IT Business services IT Financial services IT Government &

System 126
article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

The AI Cost Center Crisis

Forrester IT

Place AI In The Business Model To Help Brands Thrive AI reshapes the way marketing agencies deliver value — increasing productivity, accelerating the speed of insights, assisting creative ideation, amplifying production velocity, and sharpening media and search activation. But they are not being compensated for the value creation. It’s an AI cost center crisis.

Media 311
article thumbnail

Essential commands for Linux server management

Network World

Any Linux systems administrator needs to be proficient with a wide range of commands for user management, file handling, system monitoring, networking, security and more. This article covers a range of commands that are essential for managing a Linux server. Keep in mind that some commands will depend on the particular Linux distribution you’re using.

Linux 373

More Trending

article thumbnail

API endpoints

Dataconomy

API endpoints play a crucial role in modern software development by acting as vital conduits for communication between client applications and servers. They enable multiple systems to exchange data seamlessly, making it possible for various applications to integrate and create richer user experiences. Understanding API endpoints is essential for anyone looking to harness the power of APIs in software development.

article thumbnail

How a New CIO Can Fix the Mess Left by Their Predecessor

Information Week

TechTarget and Informa Tech’s Digital Business Combine. TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CTO Hire 426
article thumbnail

Understanding how data fabric enhances data security and governance

Network World

Data fabric is a powerful architectural approach for integrating and managing data across diverse sources and platforms. As enterprises navigate increasingly complex data environments, the need for seamless data access coupled with robust security has never been more critical. Data fabric has the potential to enhance both data security as well as governance, but it’s not always a straight path for organizations to achieve the optimal outcome.

article thumbnail

8 steps to ensure data privacy compliance across borders

CIO Business Intelligence

As organizations expand internationally, IT leaders must navigate a maze of regulations, from the General Data Protection Regulation (GDPR), to the California Consumer Privacy Act (CCPA), as well as other region-specific privacy laws. So to stay compliant, they should have strong plans that cover data mapping, encryption, consent tracking, and see that vendors follow the rules.

Data 279
article thumbnail

AI Isnt the Future — Its the Fight Youre Already In: Are You Ready?

The AI era isn’t coming—it’s here. But over 70% of AI projects fail before they scale. Why? No strategy. No alignment. No ROI. We worked with a $50M company that wasted a year and half their budget chasing AI pilots with no payoff. Sound familiar? That’s where our four-step transformation system comes in: Assess, Strategize, Execute, Scale. We help you cut through the hype, find what actually moves the needle, and build a roadmap that delivers results.

article thumbnail

Grid computing

Dataconomy

Grid computing has transformed the way we approach complex computational problems by leveraging the collective power of distributed systems. Imagine tapping into idle computing resources from countless devices around the globe, creating a virtual supercomputer capable of tackling massive challenges. This powerful model not only enhances computational efficiency but also addresses tasks that require extensive resources, making it a remarkable advancement in technology.

article thumbnail

How Will You Staff Your AI Workforce for the Future?

Information Week

TechTarget and Informa Tech’s Digital Business Combine. TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CTO Hire 321
article thumbnail

Cisco capitalizes on Isovalent buy, unveils new load balancer

Network World

Since it acquired open-source software developer Isovalent in January 2024, Cisco has been busy integrating its technology into some core products. In particular, Cisco has elevated the use of Isovalent’s core container communications technology, Kubernetes-native networking and security platform eBPF (extended Berkeley Packet Filter). eBPF is an open-source Linux operating-system kernel technology that lets programs run securely in a sandbox within the kernel of the OS.

article thumbnail

4 levers every IT leader should pull to do more with less

CIO Business Intelligence

Running a high-performing IT function today requires more than just keeping the lights on. With limited resources, high customer expectations and the rapid emergence of new technologies, IT leaders are being asked to deliver greater impact with fewer resources. That means making deliberate choices about where to focus and where to step back. Over time, I’ve come to rely on four core levers that consistently help my team deliver better outcomes with limited resources: Eliminating waste Simplifyi

Resources 210
article thumbnail

Tariffs on the Table: How to Brief the Board and C‑Suite With Confidence

“What should we do about the tariffs?” There’s no straightforward answer — every leader has a different expectation. CFOs want numbers. COOs want action. CEOs want strategy. And supply chain and procurement leaders need to be ready with the right response — fast. That’s why GEP has created a simple three-part framework that will help CPOs and CSCOs brief the board and C-suite with clarity and confidence.

article thumbnail

Data integration

Dataconomy

Data integration is an essential aspect of modern businesses, enabling organizations to harness diverse information sources to drive insights and decision-making. In today’s data-driven world, the ability to combine data from various systems and formats into a unified view is paramount. This ensures that all stakeholders have access to accurate and timely data, fostering collaboration and efficiency across departments.

Data 36
article thumbnail

AI and Data Security: Takeaways from Latest Cybersecurity Info Sheet

SecureWorld News

The 2025 Cybersecurity Information Sheet (CSI) on AI and Data Security offers critical guidance for organizations navigating the intersection of artificial intelligence and cybersecurity. The U.S. National Security Agency (NSA), in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and cybersecurity agencies from Australia, New Zealand, and the United Kingdom, released the guidance— AI Data Security: Best Practices for Securi

article thumbnail

Broadcom resets private cloud strategy with VMware Cloud Foundation 9.0

Network World

Broadcom today made generally available its VMware Cloud Foundation (VCF) 9.0 platform, which the company says will provide enterprises with a more secure, predictable, and cost-efficient infrastructure, enabling organizations to consolidate data centers and modernize their IT operations. First announced at VMware Explore in 2024 , VCF 9.0 offers enterprises a unified platform that supports traditional, modern, and AI applications with consistent operations and controls across a private cloud en

Vmware 309
article thumbnail

CIOs brace for rising costs as Salesforce adds 6% to core clouds, bundles AI into premium plans

CIO Business Intelligence

Salesforce is rolling out sweeping changes to its pricing and product packaging, including a 6% increase for Enterprise and Unlimited Editions of Sales Cloud, Service Cloud, Field Service, and select Industries Clouds, effective August 1. Simultaneously, the company is retiring standalone AI add-ons and Einstein 1 Editions and moving to bundled Agentforce plans priced from $125 to $550 per user per month, a shift that Anish Krishnan, senior analyst at QKS Group, cautioned “risks being viewed as

Cloud 221
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

Primary key

Dataconomy

A primary key is an essential component in relational databases, acting as a unique identifier for records. It helps maintain the integrity and accessibility of data, which is crucial for efficient database management. Understanding the primary key’s significance allows database professionals and users to manage relational databases more effectively.

article thumbnail

Automation Strategies for IT Resource Constraints

Information Week

This session details how automation automation creates sustainable workloads and robust support for security teams.

Resources 195
article thumbnail

Edge reality check: What we’ve learned about scaling secure, smart infrastructure

Network World

Enterprises are pushing cloud resources back to the edge after years of centralization. Even as major incumbents such as Google, Microsoft, and AWS pull more enterprise workloads into massive, centralized hyperscalers, use cases at the edge increasingly require nearby infrastructure—not a long hop to a centralized data center—to take advantage of the torrents of real-time data generated by IoT devices, sensor networks, smart vehicles, and a panoply of newly connected hardware.

Security 309
article thumbnail

The augmented IT team: How AI is reshaping IT roles and skills for the future

CIO Business Intelligence

As artificial intelligence (AI) becomes more embedded in daily operations, IT teams are being asked to adapt, not just in what they manage but also in how they work. Routine tasks are increasingly handled by automation, and AI systems provide insights that once required human intervention. This shift is prompting a key question: What does the future IT team look like?

article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Memory hierarchy

Dataconomy

Memory hierarchy plays a crucial role in computing systems, determining how data is organized, accessed, and processed. Its structure significantly impacts the efficiency and performance of operations, particularly in how it manages various memory types. Understanding this hierarchy provides insight into optimizing computing tasks for speed and cost-effectiveness.

Storage 36
article thumbnail

Visa CISO Subra Kumaraswamy on Never Allowing Cyber Complacency

Information Week

TechTarget and Informa Tech’s Digital Business Combine. TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CTO Hire 221
article thumbnail

Datadog DASH: A Revolving Door of Operations and Security Announcements

Forrester IT

Datadog’s 2025 keynote showcased a bold vision for AI-driven observability and security, unveiling a sweeping array of autonomous agents and tools designed to transform IT operations. From Bits AI SRE and Security Analyst to LLM Observability and Code Security, Datadog is trying to position itself as a central hub for operational intelligence in an increasingly algorithmic tech landscape.

Security 243
article thumbnail

SaaS sprawl keeps growing with no end in sight

CIO Business Intelligence

Even as CIOs try to limit SaaS sprawl, the problem appears to be getting worse, as employees keep adding new apps instead of removing them, according to a new study. While SaaS sprawl is a well-known and long-standing problem , more than six in 10 IT leaders say their organizations are adding new SaaS tools every month, according to a new report from intelligent process automation provider Nintex.

Survey 162
article thumbnail

How AI Is Transforming IT in 2025: A Playbook for Smarter IT Ops

IT teams are under pressure to do more with less. AI isn’t just hype—it’s already helping lean IT teams cut support volume by up to 60%, reduce cloud waste, and eliminate risk from their stack. In this executive playbook, you'll learn how mid-sized companies are deploying AI to automate tier-1 tickets, predict outages, optimize SaaS spend, and secure infrastructure without hiring a bigger team.

article thumbnail

Data minimization

Dataconomy

Data minimization is a fundamental principle in the realm of data privacy, spotlighting the importance of restricting personal data collection to what is strictly necessary for specific objectives. This practice not only serves to enhance individual privacy but also reduces the potential risks associated with data management and storage. Understanding and implementing data minimization can significantly improve organizational compliance with data protection regulations.

Data 36
article thumbnail

So. You Want to Become a Penetration Tester?

TechSpot

Penetration testing is a key part of cybersecurity : finding and safely exploiting system flaws. Learn the skills, tools, and steps to start your career as an ethical hacker in this growing field.

Tools 94
article thumbnail

Maturing Your AI Vendor Security Assessment Process

SecureWorld News

It's hard to find a SaaS application these days that doesn’t include some form of AI. A recent McKinsey report found that 55% of organizations had adopted AI in at least one function, and that number is rising steadily. Whether it's summarizing emails, recommending code, or interpreting natural language queries, AI has become the quiet engine under many digital hoods.

article thumbnail

Modernizing data ingestion: How to choose the right ETL platform for scale

CIO Business Intelligence

When custom pipelines start to crack In the early stages of building a data platform, it’s common to patch together ingestion workflows by hand — scripting one-off jobs, customizing transformations per customer and relying on tribal knowledge to keep things running. It works…until it doesn’t. At a fast-scaling healthcare technology company, our customer base grew faster than our data infrastructure.

Data 200
article thumbnail

How Companies Are Navigating Tariff Chaos with GEP’s AI-Powered Procurement Platform

Tariffs are no longer just policy noise. They’re driving real, bottom-line impact. One policy shift and your sourcing strategy is upside down. This bulletin cuts straight to the point. How Market-Leading Companies Are Navigating Tariff Chaos with GEP’s AI-Powered Procurement Platform breaks down how procurement teams are staying ahead of the chaos with real-time insights, smarter sourcing moves and AI-powered agility.