article thumbnail

Private 5G networks are sparking innovation at the edge

CIO Business Intelligence

For the enterprise, planning edge strategies and reaping their rewards is often a complex and challenging process, with myriad applications to deploy, a proliferation of hardware devices to manage, multiple data types and sources to integrate, and significant security risks to avoid.

Network 105
article thumbnail

Supply chain woes? Analytics may be the answer

CIO Business Intelligence

“We think of the supply chain as the sum of several parts of the whole business operation — from understanding customer demand to materials management and manufacturing or sourcing and purchasing, to logistics and transportation, to inventory management and automated replenishment orders at Optimas and at our customers’ locations.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 155

Scott Lowe

If I’m understanding the article correctly (and feel free to correct me if I am mistaken) it looks as if Cilium Service Mesh will leverage/does leverage a combination of certificate-based mTLS for identity at the workload level and node-based transport encryption (via WireGuard) for data confidentiality. Servers/Hardware.

article thumbnail

Technology Short Take 116

Scott Lowe

Servers/Hardware. Although I’ve by and large moved away from Apple hardware (I still have a MacBook Pro running macOS that sees very little use, and a Mac Pro running Fedora), I did see this article regarding a new keyboard for the MacBook Air and MacBook Pro. It provides the basics behind X.509v3

Storage 60
article thumbnail

Technology Short Take #80

Scott Lowe

Servers/Hardware. As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. Check back next time!

article thumbnail

GeekWire Gift Guide: 10 gadgets and tools you can actually get this holiday season

GeekWire

Both the hardware and software for Watchy are open-source, which offers a lot of variety for what you want the watch to do and look like. If you don’t need to transport a full-sized laptop, the smaller Classic messenger bag is an inexpensive alternative with all the durability of the Especial Stash. Price: $199.

Tools 119
article thumbnail

Technology Short Take #37

Scott Lowe

A fan of network virtualization might also say that decomposing today’s complex physical networks into multiple simple logical networks on top of a simpler physical transport network—similar to Mike’s suggestion of converging on a smaller set of reference architectures—might also help. (Of Here’s a good source.

Vmware 60