November, 2022

Telia’s OSS/BSS evolution toward 5G digital service delivery

TM Forum

Telia has an ambitious transformation plan to create a new digital service ecosystem and their road of OSS/BSS evolution toward 5G digital service delivery is not without challenges.

Top 6 security risks associated with industrial IoT

Tech Republic Security

Industrial IoT is gaining adoption, but this comes with some security risks. Check out the dangers and how you can avoid them. The post Top 6 security risks associated with industrial IoT appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Why Tech Needs More People Skills

Information Week

Technology jobs continue to be in high demand, but there’s still a perception that there is a high barrier to entering the field. Technical skills can be built over time while other non-technical skills are applicable and just as important to the industry

How to create a virtual machine in Google Cloud Platform

Tech Republic Data Center

The key component of cloud-based computing is the virtual machine. Creating a VM using Google Cloud Platform is simple, but there are some decisions to make. The post How to create a virtual machine in Google Cloud Platform appeared first on TechRepublic.

4 Key Steps to Data Transformation Success with Data Mesh

It’s tougher than ever to give your clients the data and insight they need, when they need it (and how they want it) – while addressing issues like security. Find out how data mesh architectures can help you meet these challenges and more.

Veteran IT Pro Leverages Knowledge, Patience and Hustle To Get Ahead

Association of Information Technology Professional

Military veteran Daniel Avila credits his IT skills, his patience and his natural hustle to starting a tech career that supports his family

220
220

Edge AI Opens Endlessness Possibilities for Next-Gen AI

IT Toolbox

Here’s how next-gen AI will benefit from edge AI and its possibilities. The post Edge AI Opens Endlessness Possibilities for Next-Gen AI appeared first on. artificial intelligence Edge Computing

More Trending

Top cybersecurity threats for 2023

Tech Republic Security

Next year, cybercriminals will be as busy as ever. Are IT departments ready? The post Top cybersecurity threats for 2023 appeared first on TechRepublic. Security malware phishing ransomware

Preparing for the Post-Password World

Information Week

Passwords won’t truly go away altogether, but they can be moved farther into the background. However, the path to get to there will be ‘very long and messy.’ Also, the understanding of the term passwordless is misleading and a bit confusing

165
165

Commit to Simple Agile Principles and Collaborate on Meaningful Self-Organizing Standards

Social, Agile and Transformation

A few weeks ago, I suggested three questions that could spark a discussion and debate over your organization’s agile principles. But I didn’t go as far as suggesting example principles or practices in defining them.

Agile 201

NWDAF through a new lens

TM Forum

5G presents a new paradigm for communication networks and is expected to lead the telecommunications industry into a new digital chapter.

Monetizing Analytics Features: Why Data Visualization Will Never Be Enough

Five years ago, data visualizations were a powerful way to differentiate a software application. Today, free visualizations seem to be everywhere. Two trends are forcing application providers to rethink how they offer analytics in their products.

Physical-backed NFTs to Connect with Consumers: Three Key Lessons from Big Brands

IT Toolbox

Increasing consumer connect with physical-backed NFTs. Read on for industry lessons. The post Physical-backed NFTs to Connect with Consumers: Three Key Lessons from Big Brands appeared first on. Digital Transformation

9 Ways To Use Grep To Filter Results in Linux

Association of Information Technology Professional

Learn nine ways to use grep and the pipe redirector to filter the results of various Linux commands and find the information you need

Linux 186

Open-source repository SourceHut to remove all cryptocurrency-related projects

Tech Republic Security

Also including blockchain-related projects in the ban, SourceHut's creator said the technology is associated with fraudulent activities and high-risk investments. The post Open-source repository SourceHut to remove all cryptocurrency-related projects appeared first on TechRepublic.

The Future of AI Is Tiny

Information Week

Tiny AI reduces carbon footprints, brings deep learning at an affordable cost, creates context-aware consumer devices, cuts down data infrastructure, bolsters security, and more

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

The Distributed Computing Manifesto

All Things Distributed

Today, I am publishing the Distributed Computing Manifesto, a canonical document from the early days of Amazon that transformed the architecture of Amazon's ecommerce platform. It highlights the challenges we were facing at the end of the 20th century, and hints at where we were headed

Evolving business support systems for future services

TM Forum

Business support system (BSS) transformation has been a theme for the communications service provider (CSP) community for the past 10-15 years.

System 130

Ransomware and SaaS data: The Threat is Real

IT Toolbox

Here are measures organizations can take to ensure their data is secure and protected. The post Ransomware and SaaS data: The Threat is Real appeared first on. Big Data Cybersecurity SaaS

10 Reasons We’re Thankful for CompTIA’s Amazing Global Community

Association of Information Technology Professional

Thanks to CompTIA's volunteer leaders and staff, who came on strong in 2022, rallying around opportunities and initiatives that would drive the industry forward and make it a better place for all of us

Modern Data Architecture for Embedded Analytics

Data has gone from a mere result of applications & processes to being crowned king. Picking the right avenue to data architecture depends on your organization’s needs. Development teams should build in stages, starting with a task that can be solved.

AWS re:Invent 2022: Partners on parade

Tech Republic Security

There's news from Amazon Web Services' Las Vegas show as a flurry of partnerships and edge computing initiatives have been revealed. The post AWS re:Invent 2022: Partners on parade appeared first on TechRepublic. Amazon Cloud Edge AWS aws re:invent 2022 cloud

New CISA Goals Tackle Critical Infrastructure Cybersecurity

Information Week

CISA has released new cybersecurity performance goals for the critical infrastructure sector. How will these goals help stakeholders reduce cyber risks in critical infrastructure industries

DevOps at SMBs: Three Important Considerations that Differ from Large Enterprises

Social, Agile and Transformation

I recently started a new program called Coffee with Digital Trailblazers on LinkedIn. We typically meet on Fridays at 11am ET and discuss a selected topic on leading digital transformation.

Devops 196

The secret of smarter software and systems

TM Forum

Improving customer experience. Being more responsive. Both are essential for forward-thinking organisations because customers these days want to get their hands on the latest service features as soon as possible, rather than having to wait three months until the next software release.

System 130

Blueprint to Modernize Analytics

The longer you wait to modernize your application’s analytics, the longer it will take for you to realize this value. A blueprint helps you define your new solution, plot out how to get there, and determine what you’ll need in terms of time and resources.

6 Tips for Brands To Engage Sports Lovers With Social Media Marketing

IT Toolbox

Check out these tips on how to boost brand engagement among sports lovers through social media. The post 6 Tips for Brands To Engage Sports Lovers With Social Media Marketing appeared first on. MarTech

Sports 197

What is software as a service?

Tech Republic Cloud

This article doesn’t just provide a definition, but also looks at the benefits, drawbacks and features of SaaS. The post What is software as a service? appeared first on TechRepublic. Cloud saas software as a service

Qualys Security Conference 2022: Corralling horses in an expanding edge rodeo

Tech Republic Security

It wasn’t a “Day of Anger” as Qualys used the final leg of its multi-city conference series to discuss the control of edge assets. The post Qualys Security Conference 2022: Corralling horses in an expanding edge rodeo appeared first on TechRepublic.

Data Strategy: Synthetic Data and Other Tech for AI's Next Phase

Information Week

Forrester's Data Strategy & Insights event will offer insights to help you take your machine learning and artificial intelligence initiatives to the next phase

Best Practices for Deploying & Scaling Embedded Analytics

Today, sophisticated capabilities such as adaptive security, predictive analytics, workflow, and writeback are taking analytics far beyond basic dashboards and reports. With cutting-edge capabilities like these, application teams are able to differentiate their products from the competition.

NVIDIA unveils supercomputing and edge products at SC22

Tech Republic Data Center

The company’s products seek to address real-time data transport, edge data collection instruments. The post NVIDIA unveils supercomputing and edge products at SC22 appeared first on TechRepublic. Cloud Edge accelerated computing edge computing nvidia sc22

Applying the power of data and machine learning to proactively increase revenues and customer satisfaction

TM Forum

In the competitive market of telecommunications, the ability to identify network malfunctions, billing errors and fraud before they impact customer experience is crucial – many CSPs however still tend to manage business assurance issues manually, as isolated events, despite their potentially serious implications for revenue and churn.

HP to Lay Off Up to 6,000 Employees as PC Demand Tapers Off

IT Toolbox

HP’s long-term cost-cutting strategy indicates that the company expects PC demand to remain low while the global economy continues to underperform. The post HP to Lay Off Up to 6,000 Employees as PC Demand Tapers Off appeared first on. workforce management

HP 207

Think Outside the Box To Find a Cool Job in IT: The NFL

Association of Information Technology Professional

Cool IT jobs are everywhere, and technicians are in high demand. Even the NFL needs tech specialists

195
195

Drive Better Decision-Making with Data Storytelling

Embedded Analytics can be the foundation of successful applications, and data storytelling is now critical for business today. It has become pivotal to drive decisions, generate actionable insights, and increase user adoption and stickiness.