By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
Search Results: risk management (773)
Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.
El uso de soluciones de código abierto crece más de un 33% interanual, también las amenazas y ciberataques inherentes a estas soluciones.
Snowflake is leveraging its market-shaking data cloud innovations momentum into the red-hot applications-development space by helping customers deploy and monetize data-intensive applications directly into Snowflake’s Data Cloud.
Kieron reports from Celosphere 2022, where Celonis showcased several new apps that make process mining more accessible.
Reporting from Celosphere 2022, Tom Smith covers the process mining stalwart’s new apps, which take a process-centric approach to solving sustainability problems.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
As the role of technology increases in businesses, partner options have exploded. Janet explains why taking your time while vetting your choices makes all the difference.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Wayne explains how smart CIOs go about keeping their boards informed and enthusiastic about data modernization projects.
Our latest installment on startup funding highlights tec companies working on rebate management, SMB finances, eye health, cloud app dev, and data analytics.
The Women in Tech session inspired hundreds of attendees as they learned about and discussed topics from taking risks to fostering an inclusive workplace.
Operating on legacy finance systems can slow down your organization. When users are forced to consistently use manual processes, your…
From improving medical inventory management to optimizing supply chains to helping relationships grow, innovations flowed at the 43North startup competition.
Toni Witt explains health pros and cons of VR, and why work-from-home and Metaverse aficionados must approach it with as much moderation they do 2D screens, social media, and the like.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
Poor-quality data can derail a business. Janet Schijns explains how to choose partners who will wrangle and handle the right data properly and set your firm up to successfully navigate potentially rough economic times.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.


















