Insight

  • Navigating the Edge Data Deluge Is No Small Feat

    Edge computing locations are important and often mission-critical sites for business transactions and operations. As such, they can be the point of ingress for large volumes of data with varied processing and storage needs. Recent research by TechTarget’s Enterprise Strategy Group examined the storage profile of edge sites for further insights into this landscape.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Extreme temperatures, shocks, moisture, dust, strong vibrations, and even workplace-specific elements such as grease are just some of the environmental factors that can impair important IT infrastructure at the edge. Research by TechTarget’s Enterprise Strategy Group shows that when it comes to edge locations, ruggedized infrastructure and enclosures designed to withstand these conditions are pivotal, especially so for certain organizational profiles.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on private 5G adoption, use cases, connected devices, benefits, challenges, comparisons with Wi-Fi deployments, third-party assistance, consumption models, supplier preferences, edge deployment factors, and future spending plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on predictive, causal, and generative AI adoption for application development; use cases for automation and AI; benefits and challenges; productivity measurements; satisfaction with AI against expectations; stakeholder roles; and the function of AI in container orchestration.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • End-user devices such as laptops and smartphones connect workers to the critical digital infrastructure that they need to access to get their jobs done. But users’ device preferences can vary by factors such as role, comfort level with certain technologies, and more. Recent research by TechTarget’s Enterprise Strategy Group asked IT decision-makers about their organizations’ attitudes toward supporting BYOD policies that cater to the needs and preferences of individual end users.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The personal computer remains a keystone of employee productivity today. But when IT decision-makers take stock of the many PC vendor offerings, they often find more similarities than differentiators. Recent research by TechTarget’s Enterprise Strategy Group investigated how offerings like PC-as-a-service (PCaaS) appeal to buyers and help PC vendors stand out.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Despite growing conversational focus on browser-based applications, Windows applications remain part of most modern operations. Research by TechTarget’s Enterprise Strategy shows that support for critical Windows devices and applications cannot fall by the wayside as industries move forward with alternative approaches.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Oracle has unveiled an exciting milestone in database technology, the Oracle Database 23ai, signaling a significant shift toward integrating AI capabilities into its core database functionality. This release, which marks the culmination of years of meticulous development, emphasizes not only Oracle’s commitment to AI but also its dedication to enhancing developer productivity. The decision to rename the database from Oracle Database 23c to Oracle Database 23ai underscores the pivotal role of AI in this era of technological advancement.

    One of the standout features of Oracle Database 23ai is its focus on three key areas: AI for Data, Dev for Data, and Mission Critical for Data. Under the AI for Data umbrella, the aim is to empower app developers to seamlessly integrate AI functionalities into their applications, as well as to offer generative AI capabilities to all users of Oracle Database. This includes streamlining data management processes, providing AI algorithms for data analysis, enabling natural language interactions for queries, and facilitating object similarity searches through AI-generated vectors.

    A notable addition to Oracle Database 23ai is the AI Vector Search technology, which lets users augment existing AI models with relevant data from their database. By generating and storing vectors, users can conduct similarity searches and combine them with traditional SQL queries, enhancing the context and accuracy of AI responses. This capability not only enriches the understanding of data sets but also ensures the secure encoding of data, as users can load their trusted AI models directly into the database through the support of the ONNX standard.

    The Oracle Database 23ai also enables users to ask questions in natural language, simplifying complex queries and expanding the accessibility of the database to a broader range of users. Integrations with AI models such as Cohere and Meta’s Llama allow for seamless translation of natural language queries into SQL, providing users with a more intuitive and efficient means of interacting with the database.

    As Oracle Database 23ai continues to build on its legacy of built-in machine learning algorithms, offering sophisticated capabilities for pattern recognition, trend analysis, and prediction, the company is expanding the capabilities. These features, available since Oracle Database 9iR2, have been refined and expanded over the years, making Oracle Database one of the most comprehensive data mining platforms in the industry. This is a timely announcement, as Oracle Database 23ai represents a significant leap forward in database technology, with its focus on AI integration and developer productivity as organizations are looking for choices in the market for their AI workloads. By leveraging AI capabilities, Oracle aims to provide users with a more intuitive and efficient means of interacting with their data, ultimately driving innovation and insights across organizations.

  • Red Hat Summit: What I Want to See

    The 2024 Red Hat® Summit and AnsibleFest will take place at the Colorado Convention Center in Denver from May 6 through 9, 2024. I’m really looking forward to attending this event in my adopted hometown, but I’ve got to warn you—May is the month with the least predictable weather, so be prepared. I have experienced both plowable snow and sunny days above 80 degrees in early May. What I’m saying is you might want to bring a coat, an umbrella, and some sunscreen in addition to your enthusiasm for open source.

    Living here, I’ve “discovered”—everyone in Denver knows these places—some fantastic restaurants beyond the usual NFL city/convention center adjacent chains (Cheesecake Factory, Bubba Gump’s, Ruth’s Chris) that won’t break the bank or your diet.

    Weather aside—you’ve been warned—I’m looking forward to a couple of Red Hat Conference sessions on observability and sustainability, two areas that are getting increasing attention in the open source community.

    Serverless observability with OpenTelemetry. Daniel Oh’s talk on how to observe serverless functions with OpenTelemetry, Jaeger (distributed tracing), Knative , and Kubernetes should be a good one on instrumentation—the bane of “legacy” observability approaches, now championed and heavily supported by commercial Full Stack Observability purveyor, Cisco, now with added Splunk. I’m looking forward to seeing how OpenTelemetry works in serverless and exactly what sorts of differentiated metrics there are to be collected.

    Update on Red Hat’s vision for sustainability and the Kepler project. I’m particularly excited for this session on IT sustainability. Sustainability in computing is becoming increasingly crucial, and we simply need to find ways to make our systems more efficient. This session focuses on Red Hat’s vision for Kepler, a Kubernetes tool that helps enterprises understand and reduce their energy consumption.

    This aligns perfectly with our recent research­: The Role of ESG Programs in IT Decision Making, Enterprise Strategy Group, September 2022) which highlights the importance of translating broad environmental, social, and governance and sustainability goals into actionable steps. Kepler, with its focus on real-world power use metrics for reporting and reduction, exemplifies this approach to operationalizing sustainability. Red Hat, along with IBM and Intel, have been major contributors to this Cloud Native Computing Foundation project that leverages eBPF to gather energy related system stats and exports them as Prometheus metrics. I want to see how Red Hat envisions the future.

    AnsibleFest Keynote: Automation, AI, and the next enterprise IT revolution. Revolution is not a word to be thrown around lightly, but when it comes to the impact that AI and automation can have on IT, Enterprise Strategy Group’s own research concurs that the future of IT involves automation and AI to accelerate operations anywhere from 25 to 100% over the next few years. Ansible plays a key role in automation for many organizations, so it will be interesting to hear how Red Hat envisions Ansible in the revolutionary era of AI.

    Plus, it’s an industry trade show so it’s obligatory to speak about artificial intelligence. I wonder if Jensen Huang, CEO of Nvidia, is going to turn up on the main stage?

    Mile-high oxygen bar. The event planners had enough foresight to include the oxygen bar on the daily agenda. Folks, the air is thinner here. The sun is brighter. Seriously, people. Stay hydrated and if need be stay oxygenated. Altitude sickness can ruin your day.

    Dining Tips

    I’m a Denver transplant. Here are a couple of insider meal tips for your stay in the Mile High City.

    • The most Denver place to eat: Sams No. 3. Do not miss the green chili. Seriously, it’s one of the best things about Denver. You can walk there easily from the convention center.
    • A good place for dinner away from the show: Rioja, a cozy modern Mediterranean spot in Larimer Square, a neighborhood that can be interesting even if you don’t eat here.
    • A good place to go if you’re not paying: Uchi, a very modern sushi restaurant. Yes, there is one in Austin, too. It’s really great sushi despite being thousands of miles from any coast.

    I am looking forward to seeing you at the show and I hope you enjoy the Mile High City.

  • Operationalizing Encryption and Key Management

    The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. As a result, organizations are turning to encryption and future-proofed post-quantum encryption to maintain cyber resilience as well as to ensure data privacy and compliance.

    To learn more about these trends, download the free infographic, Operationalizing Encryption and Key Management.

  • Generative AI (GenAI) introduces new risks as employees connect to GenAI applications, share data, and build homegrown large language models. Security professionals are also anxious about how cybercriminals may use GenAI as part of attack campaigns. Despite these risks, generative AI holds great cybersecurity-boosting potential as well.

    To learn more about these trends, download the free infographic, Generative AI for Cybersecurity: An Optimistic but Uncertain Future.

  • This Complete Survey Results focuses on the use of causal, generative, and predictive AI for IT operations, including current and planned adoption, maturity, drivers, use cases, benefits, challenges, real-world results, measurements, stakeholders, and purchase considerations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.