News
-
02 Jul 2025 / SD-WAN
Arista buys VeloCloud from Broadcom
Arista fills a gap in its portfolio with VeloCloud's SD-WAN capabilities.
-
02 Jul 2025 / Products & Vendors
IFS snaps up AI agent platform vendor TheLoops
IFS has beefed up its industrial AI agentic capabilities by acquiring TheLoops.
-
02 Jul 2025 / Artificial intelligence
Racial bias evident in psychiatric recommendations by LLMs
New research shows psychiatric treatment recommendations by LLMs are prone to racial bias, highlighting the importance of AI oversight to ensure health equity.
-
02 Jul 2025 / Data Science & Analytics
Qlik adds trust score to aid data prep for AI development
By measuring dimensions such as diversity and timeliness, the vendor's new tool helps users understand if their data is properly prepared to inform advanced applications.
-
01 Jul 2025 / Management & Analytics
Panzura Symphony conducts automated user data permissions
Panzura tunes its Symphony software to automatically add and remove users from protected data and connect with third-party storage vendors like IBM and NetApp.
-
01 Jul 2025 / AI Technologies
Amazon foundation model for robots shows what's possible
The vendor created the new model with Amazon SageMaker, showing what's possible with the platform and that models do not have to be language models to provide business value.
Technology Insights
-
What is post-quantum cryptography? Comprehensive guide
Post-quantum cryptography, also known as quantum encryption or PQC, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers.
-
02 Jul 2025 / Enterprise IoT
How IoT data collection works
IoT data collection enables organizations to constantly gather and analyze physical measurements, location data and operational metrics with internet-connected sensors and devices.
-
02 Jul 2025 / Network Security
What is SIEM (security information and event management)?
SIEM (security information and event management) is software that helps organizations detect, analyze, and respond to security threats by collecting and correlating security event data from across the IT environment in real time.
-
02 Jul 2025 / IoT Security
Top 15 IoT security threats and risks to prioritize
Certain IoT security concerns, like botnets, are hard to forget, but others might not come to mind as easily, including DNS threats and physical device attacks.
Topics Covered
- App Architecture
- AWS
- Business Analytics
- CIO
- Cloud Computing
- Content Management
- Customer Experience
- Data Backup
- Data Center
- Data Management
- Disaster Recovery
- Enterprise AI
- Enterprise Desktop
- ERP
- Health IT
- Healthcare Payers
- Healthtech Analytics
- HealthtechSecurity
- HRSoftware
- IoT Agenda
- IT Channel
- IT Operations
- Mobile Computing
- Networking
- Oracle
- Patient Engagement
- Pharma Life Sciences
- Rev Cycle Management
- SAP
- Security
- Software Quality
- Storage
- Sustainability and ESG
- Unified Communications
- Virtual Desktop
- Virtual Healthcare
- VMware
- WhatIs
- Windows Server