IT News and Events
May 2nd, 2022 — May 8th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 290, Issue 1 << Previous Issue | Next Issue >>
Citrix News
Citrix Achieves FedRAMP Moderate Status
US government agencies can now leverage company's market-leading digital workspace solutions to enable secure work anywhere, anytime from any device
Citrix Systems announced that it has achieved the U.S. Federal Risk and Authorization Management Program's (FedRAMP) Moderate Status, clearing the way for U.S. government agencies to use the company's market-leading digital workspace solutions to empower secure work anywhere, anytime from any device. The authorization was approved for Citrix Cloud Government and Citrix DaaS by the FedRAMP Program Management Office (PMO) and Joint Authorization Board (JAB) following a rigorous review process.
Citrix News, May 2nd, 2022
(Get More Information . .) open to premium members only

Citrix And Google Cloud Simplify Shift To Flexible Work
New Citrix DaaS solutions available on Google Cloud Marketplace deliver cost and time-savings in making transition from procurement to deployment.
Last year, Citrix Systems, Inc. (NASDAQ: CTXS) and Google Cloud announced their commitment to helping customers accelerate and embrace hybrid work models through Desktop as a Service (DaaS) solutions. And they're delivering on it. The companies today announced that two new Citrix DaaS solutions are available for purchase in the Google Cloud Marketplace, making it easier than ever for organizations with Citrix VDI solutions to transition to Citrix DaaS on Google Cloud.

And the timing couldn't be better.

Citrix News, May 4th, 2022
(Get More Information . .) open to premium members only

Citrix Features Explained: Improving User Experience With Citrix Secure Private Access
Your workforce has gone hybrid. Your employees demand anywhere access to the SaaS and cloud apps they need to be productive alongside an engaging and secure user experience
But because your critical business apps remain inside the datacenter while employees access them on a variety of networks and devices, ensuring a strong security posture is not easy. Enter Citrix Secure Private Access, which delivers zero trust network access (ZTNA) for hybrid employees inside an unparalleled security user experience.

The Citrix Secure Private Access solution gives you the best of both worlds: adaptive, robust, and VPN-less security without disrupting the preferred workflows of your remote employees. Let's examine how Citrix Secure Private Access can strengthen your security posture with location-based security and provide zero trust network access to critical business apps - all inside a simplified user experience.

Citrix News, May 4th, 2022
(Get More Information . .) open to premium members only

In An Age Of Chip Shortages, Citrix Software And SaaS Come To The Rescue
The global semiconductor shortage continues to place severe constraints on IT departments.
The U.S. Department of Commerce reports that demand for chips has risen by 17 percent from 2019 to 2021, with little growth in supply. The mismatch in supply and demand has led to delays and even cancellation of critical digital transformation initiatives.

This shortage has served as a wake-up call for technology leaders. There is a growing realization that excessive dependency on hardware vendors can jeopardize digital transformation initiatives. These technology leaders are accelerating their move to the cloud.

Citrix News, May 2nd, 2022
(Get More Information . .) open to premium members only

Rising Fuel Costs Snarl Return To Office Traffic
Citrix survey reveals majority of employees will continue to work from home until skyrocketing gas prices return to Earth
hey've been given the green light to head back to the office, but employees aren't in a rush to do so given the rising price of gas. According to the results of a OnePoll survey conducted by Citrix Systems, Inc. (NASDAQ: CTXS), 57 percent of workers across the United States plan to stay parked at home to avoid the high costs of commuting. And close to half of their counterparts around the world say they will do the same.

And the timing couldn't be better.

Citrix News, May 5th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
6 Smart Practices For Better Business-IT Alignment
From ride-alongs to reverse-embedded IT, CIOs are establishing new approaches to bridging the business-IT divide - and devising inventive strategies with business alignment top of mind.
"Do you wish business executives and IT could work together better, collaborating on projects and fully sharing information?" asks Minda Zetlin in CIO.

"If you're like most IT leaders, the answer is very much yes. The benefits of improved business-IT collaboration include things such as projects that better fit business goals, improved change management, and better buy-in for new initiatives.

Not only that, collaborating well with the business is a survival skill for today's technology leaders. In 2021, Gartner research showed that more technologists were being recruited for functions outside IT than within it, says Darren Topham, senior director analyst at Gartner. Meanwhile, with easy-to-use, cloud-based, no-code or low-code solutions readily available, tech-savvy business professionals can handle much of their own technology without any help at all..."

CIO, April 25th, 2022
(Get More Information . .) open to premium members only

7 Leadership Traits Major Enterprises Look For In A CIO
Are you ready to make the move to a big company? Better stretch yourself now to ensure you have what top-tier enterprises seek in a top-post IT leader.
John Edwards writes in CIO, "While many, perhaps even most, CIOs are content to head operations at a small- or midsize enterprise, others have loftier ambitions. These individuals wish to climb to the very top of the IT career ladder.

CIOs at major enterprises - particularly those with market capitalizations measured in the tens or hundreds of billions of dollars - tend to be a different breed than their lower-level counterparts. IT chiefs at the largest enterprises are typically expected to possess knowledge and skills that may be minor, or even completely unnecessary, talents at smaller organizations..."

CIO, April 27th, 2022
(Get More Information . .) open to premium members only

Amazon Cloud Services: 5 Things CIOs Should Know
Exploring the many options and technologies around cloud services can be daunting. Navigate Amazon Web Services with this expert advice in mind
"The modern CIO doesn't really need an introduction to Amazon Web Services. To say that AWS is already well-known is an understatement," opines Kevin Casey in The Enterprisers Project.

"IT leaders can still use a helping hand, however, in navigating the massive scope and scale of AWS while making sure their cloud strategy is tightly focused and aligned with business goals.

That's a taller task than it might first appear. AWS and other public clouds are called "hyperscale" clouds for a reason. Keeping up with the vast number of technologies and services available can become overwhelming. Moreover, adopting and using said technologies and services just because they exist doesn't promise any tangible results other than a bill..."

The Enterprisers Project, April 26th, 2022
(Get More Information . .) open to premium members only

Three In Five CIOs Would Replace Half Or More Of Their Current Technology If Given Opportunity
Research commissioned by Lenovo reveals CIOs are more involved than ever before in areas outside their traditional technology purview, such as business model transformation, corporate strategy, and sustainability
A new global research study from Lenovo[1] reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as well as removing barriers to business growth.

Today, technology is the nervous system that connects corporate strategy, finance, innovation, operations, and talent. CIOs are increasingly tasked with connecting with key stakeholders across the organization to ensure alignment and drive execution. With IT enmeshed in every facet of a business, CIOs believe that their organizations must continue to invest in digital transformation to remain relevant., April 25th, 2022
(Get More Information . .) open to premium members only

5 Habits Of A Successful CTO
My name is Rohan Pinto and I have been a security and identity management expert for three decades.
Rohan Pinto writes in, "I'm a self-proclaimed 'cryptography nerd' who has developed and is responsible for a number of enterprises that take advantage of breakthroughs in blockchain and identity management. I hope to continue to show the world the amazing possibilities of well-implemented cryptographic systems. Today, I would like to share '5 Habits of a Successful CTO' that I learned from five of my favorite books...", April 27th, 2022
(Get More Information . .) open to premium members only

CIOs Have The Greatest Impact On Business
Chief information officers see their role as core in building out the IT and security infrastructure and talent pool that their organisations require to grow post-pandemic
"Three-quarters of the CIOs who took part in a recent survey by Lenovo believe they have a greater impact on their company's overall fortunes than other C-suite positions," writes Cliff Saran in ComputerWeekly.

"The study, based on a survey of 550 CIOs in companies with 250 or more employees across Brazil, China, Japan, Singapore, the UK and the US, found that the vast majority (88%) agree with the statement: 'My role as CIO is the most critical component of my company or organisation's continued operation.'..."

ComputerWeekly, April 28th, 2022
(Get More Information . .) open to premium members only

IT News - MFA
Why MFA Alone Isn't Enough For True Cybersecurity
Multi-factor authentication (MFA) was once a foreign terminology, but today, with the myriad of hacks and data breaches dominating headlines, it's fair to say that most individuals now see MFA as a no-brainer - for now.
Bojan Simic writes in Cyber Defense Magazine, "When thinking about MFA, both companies and consumers alike consider it to be a safer, more secure option. And while that isn't necessarily untrue (as it is safer than single-factor authentication), it doesn't bypass the increasingly large password issue developing across digital mediums. In fact, despite widespread MFA adoption, account takeover fraud generated a $3.3 billion loss in 2020.

Ever since the 'password' was invented in the 1960s, it has been a topic of contention. The intent is always positive; but the efficacy is an ongoing debate - especially with the pace at which technology is evolving..."

Cyber Defense Magazine, April 28th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Storage Facing Trillion-Row Database Apocalypse
A new era of large-scale analytics and storage is opening up ahead of us. Ocient, Imply, VAST Data, and WEKA are four startups positioned to store and access data among hundreds of petabytes or trillions of database rows in seconds.
Chris Mellor writes in Blocks & Files, "They all employ massively parallel access techniques in one way or another and fundamentally use software rather than hardware to achieve their performance levels.

Update. SingleStore's database can chew through a trillion rows/second using 448 Xeon Platinum 8180 Skylake cores, 28 per server, as its blog describes. The data was stored on SSDs, though that wasn't really significant since the queries were run warm-start, so the data was already cached in memory. The network was 10-gigabit Ethernet..."

Blocks & Files, April 28th, 2022
(Get More Information . .) open to premium members only

2022-23 DCIG Top 5 Multi-Cloud SDS Object Storage Solutions
DCIG is pleased to announce the 2022-23 DCIG TOP 5 Multi-Cloud SDS Object Storage Solutions. These products represent the TOP 5 SDS-based object storage solutions organizations should consider for multi-cloud deployments.
"Enterprise storage used to be only purchased as an appliance, with proprietary software inextricably bound to its hardware," notes Todd Dorsey in DCIG.

"Software-defined storage (SDS) changed this paradigm by separating the software from its underlying hardware. Decoupling the software from its physical storage opens many benefits.

Early applications for software-defined storage were limited, on-premises use-cases, but maturing SDS brought expanded features and deployment options. SDS reached out of the data center to the cloud. Organizations could tier data to cloud storage and even run SDS in the cloud within virtualized server environments..."

DCIG, April 28th, 2022
(Get More Information . .) open to premium members only

All The Sources And Sinks Going To Object Storage
The vocabulary of sources and sinks are beginning to appear in the world of data storage as we witness the new addition of data processing frameworks and the applications in this space.
cfheoh writes in Stoarge Gaga, "I wrote about this in my blog 'Rethinking data. processing frameworks systems in real time' a few months ago, introducing my take on this budding new set of I/O characteristics and data ecosystem. I also started learning about the Kappa Architecture (and Lambda as well), a framework designed to craft and develop a set of amalgamated technologies to handle stream processing of a series of data in relation to time.

In Computer Science, sources and sinks are considered external entities that often serve as connectors of input and output of disparate systems. They are often not in the purview of data storage architects. Also often, these sources and sinks are viewed as black boxes, and their inner workings are hidden from the views of the data storage architects..."

Stoarge Gaga, April 25th, 2022
(Get More Information . .) open to premium members only

How Enterprises Can Ensure NVMe Security In 2.0
Today's world demands airtight security more than ever. Key NVMe security features, such as namespaces, the Lockdown command and TLS in NVMe over TCP, keep data safe.
Dave Raffo writes in SearchStorage, "NVMe is the dominant interface for enterprise SSDs, and both its uses and features are expanding. However, greater adoption of any enterprise technology shines a light on its gaps.

As with all storage, security is more about protecting data on drives than the drives themselves. In many ways, NVMe SSDs use similar security as other types of drives -- particularly in the areas of encryption and key management.

New developments specific to NVMe security bear watching. These include NVMe-oF and features added to the NVMe 2.0 specification released in mid-2021..."

SearchStorage, April 28th, 2022
(Get More Information . .) open to premium members only

Storage As A Service Can Drive Transformation - If It's Agile Enough For All Workloads
'STaaS for all' drives transformation by delivering as-a-service agility and flexibility. Before you invest, make sure your STaaS solution can power every workload across the infrastructure lifecycle.
Simon Watkins writes in CIO, "Just a few years ago, enterprises were rapidly shifting to a cloud-first IT model in the expectation that moving operations to the cloud would solve many, if not all, of IT's roadblocks, while offering few, if any, drawbacks. The public cloud delivered a new kind of IT and a new kind of experience - scalable, seamless, and simplified. Cloud set the standard for agility with an operational model that enabled customers to deploy new apps and services quickly and easily..."
CIO, April 26th, 2022
(Get More Information . .) open to premium members only

IT News - AI
AIOps - The Future Is Here
The term Artificial Intelligence for IT Operations (AIOps) combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination
Nayanaraja V Naidu writes in, "AIOps is the proactive answer to many lingering issues in application development environments. It approaches IT infrastructure and systems through real-time monitoring and addresses issues before they spread across the system. This is possible mostly because an AIOps platform ingests all the data from across all the systems in the application landscape, applies AI principles to analyze it, and creates opportunities to proactively identify and improve, optimize, or correct these areas...", April 25th, 2022
(Get More Information . .) open to premium members only

Enterprise Guide To Robotic Process Automation
RPA is a fast-growing category of software, driven by global enterprise digital transformation efforts. Is it ready for prime time? This guide covers the benefits, best practices and use cases today.
"Judging by the interest in the concept," notes James M. Connolly in InformationWeek, "it looks like IT people, and even many businesspeople, have figured out the first lesson in dealing with robotic process automation: There are no robots, no androids, not even one little R2D2.

RPA is about letting computers, software and, often, voice technology take over the routine, repetitive and boring business tasks that humans don't really want to do. In doing so, the computer doesn't complain but does work 24x365 without needing days off. Those processes are the workflows and rules that human business leaders define..."

InformationWeek, April 26th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
What Is DisplayHDR
High dynamic range (HDR) monitors are becoming mainstream, but their performance can vary widely. So how do you know what HDR performance level you are getting with a particular monitor? The VESA DisplayHDR certification hopes to solve this issue.
HDR allows a more lifelike visualization of images and videos. A display achieves HDR by representing brighter highlights, darker shadows, and a wider range of colors than SDR or standard dynamic range. Simply put, the HDR displays can showcase more realistic images and videos.
How-To Geek, April 25th, 2022
(Get More Information . .) open to premium members only

Defining The Next Cycle Of Technology
We're in the middle of what we at ScyllaDB dubbed The Next Tech Cycle. Not 'The World of Tomorrow' nor 'The Shape of Things to Come' nor 'The Wave of the Future'-because it's already here today.
Peter Corless writes in, "We're right in the middle of it. It's a wave that's carrying us forward, but it began with trends that got their start earlier this century.

Everything is co-evolving, simultaneously, from the hardware you run on to the languages and operating systems you work with to the operating methodologies you use day-to-day. All of those familiar technologies and business models are themselves undergoing revolutionary change...", April 26th, 2022
(Get More Information . .) open to premium members only

IT News - PM
Managing Hidden Project Costs For Better ROI
The most common argument for outsourcing is cost savings. And in the face of a challenging economic climate, cost figures largely in the decision to outsource IT projects and business processes.
While cost-effectiveness is a huge deciding factor for offshoring, cheaper labour and service rates should not be the only measures of the possible financial success of a project. In fact, long-term benefits are extracted from the industry expertise of vendors that could make up for the investments in communication, time zone overlaps, and travel.

A human resources management expert, Dr John Sullivan, advises that metrics and measures should be identified right after selecting the vendor. A competitive business environment typically requires a higher return on investment.

ProjectSmart, April 28th, 2022
(Get More Information . .) open to premium members only

IT News - BI
The 14 Best Business Intelligence Tools For Mac To Consider In 2022
Solutions Review's listing of the best business intelligence tools for Mac is an annual mashup of products that best represent current market conditions, according to the crowd
Timothy King writes in Solutions Review, "Our editors selected the best business intelligence tools for Mac based on each solution's Authority Score; a meta-analysis of real user sentiment through the web's most trusted business software review sites and our own proprietary five-point inclusion criteria.

The editors at Solutions Review have developed this resource to assist buyers in search of the best business intelligence tools for Mac to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process - one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we've profiled the best business intelligence tools for Mac all in one place. We've also included introductory software tutorials straight from the source so you can see each solution in action..."

Solutions Review, April 26th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
70 Data Center Companies Join The Infrastructure Masons Climate Accord
The initiative is looking to develop a standard methodology for measuring and reporting carbon emissions in data center power, materials, and products.
"Infrastructure Masons (iMasons), a non-profit professional association for the data center industry, has launched an initiative that aims to reduce the carbon footprint of digital infrastructure," reports Raleigh Butler.

"To date, more than 70 organizations have joined the iMasons Climate Accord (ICA), including hyperscale companies AWS, Google, Meta, and Microsoft, along with more than 40 colocation providers, and data center product, service, and investment firms..."

DataCenter Knowledge, April 27th, 2022
(Get More Information . .) open to premium members only

IT News - Security
10 Security Technologies To Secure Remote Work
The recent global pandemic forever changed the way people work. These days, more and more people are working remotely, but much of that remote access technology is exposed to external threats.
Ron Stefanski writes in Security Boulevard, "The move to online working has provided tons of new opportunities for cybercriminals looking to exploit unsecured technology systems.

This, in turn, has resulted in an increased need for integrating security technologies into remote workspaces to secure communications and transfer of private employee, business or consumer data.

If you have remote workers, then you need to pay extra attention to securing the technology your workers are using..."

With that in mind, here are 10 ways you can maintain cybersecurity for your remote workforce.

Security Boulevard, April 27th, 2022
(Get More Information . .) open to premium members only

Best Practices For Creating An Insider Threat Program
A thorough insider threat program includes plan preparation, threat assessment, and plan review and renewal. Learn how to implement this three-step model to protect your company.
"Insider threats continue to be a potent attack vector across every industry vertical," warns Ashwin Krishnan in SearchSecurity.

"Insider attacks -- whether malicious or negligent -- can lead to system outages, data theft, ransomware and advanced persistent threats.

A challenging aspect of insider threats is that they can be even more difficult to detect than external threats. Insiders can capitalize on their unique insights into their organization's systems and launch attacks that are undetectable or appear to fall within acceptable behavioral norms..."

SearchSecurity, April 28th, 2022
(Get More Information . .) open to premium members only

Security Tools Fail To Stop Significant Security Incidents
The security industry is failing to keep pace with evolving cybercrime tactics, techniques and procedures as security and IT teams face mounting expectations to keep their organizations protected from such threats.
"This was the result of a Vectra AI survey of 1,800 global IT security decision-makers at companies with over 1,000 employees," writes Nathan Eddy in Security Boulevard, "which found that in the last year, 74% of respondents experienced a significant security event within their organization that required an incident response effort.

Nearly eight in 10 (79%) security decision-makers said they have bought tools that have failed on at least one occasion and cited poor integration, failure to detect modern attacks and lack of visibility as reasons for the failures..."

Security Boulevard, April 27th, 2022
(Get More Information . .) open to premium members only

Best Identity And Access Management (IAM) Software 2022
Identity and access management tools play a critical role in an enterprise's security infrastructure, requiring users to pass authentication tests for each session.
"IAM solutions allow organizations to manage all network users and set policies to control their access to sensitive applications," writes Jenna Phipps in CIOinsight.

"For enterprises seeking to tighten access to applications, particularly those with important data, selecting the right IAM tool is an important first step..."

CIOinsight, April 26th, 2022
(Get More Information . .) open to premium members only

Identity And Access Management: The Pursuit Of Invisible Value
The speed versus risk balance is always in question while considering identify and access management in enterprise transformation scenarios
Ashraf Motiwala, Chad Wolcott, and Dusty Anderson writes in CIO, "Identity and Access Management(IAM) is the cornerstone of security. Proper IAM enables legitimate internal and external users to access the right data at the right time from the right devices. While IAM may seem like a check box in the journey to technology transformation, its role is much larger.

CIOs identify and focus on current strengths and weaknesses to arrive at a best-of-breed IAM solution that is structurally sound and integrates well in the organizational technology ecosystem. They implement IAM programs that enable efficiency and trim duplicative or overlapping technologies so that organizations are not over-licensed for capabilities that will not be utilized..."

CIO, April 27th, 2022
(Get More Information . .) open to premium members only

A Breath Of Fresh Air For A Busy CISO
We've all been there. As Chief Information Security Officer (CISO), your team, your management, and your board are all clamoring for your time.
Not to mention the dozens of items calling you from your inbox and notification dashboards that all are demanding your immediate attention. The threat landscape is rapidly changing, with warnings being issued by government agencies about nation-state grade attacks coming out of a European war zone.

It can be incredibly overwhelming, and sometimes the only thing you can do to stay sane is turn off your monitor to clear your head for a few minutes, so you can get back to it with fresh eyes.

HolistiCyber, April 27th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
Linux Security Study Reveals When, How You Patch Matters
Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments. Apparently, it isn't. At least for some Linux users who ignore installing patches, critical or otherwise.
"A recent survey sponsored by TuxCare, a vendor-neutral enterprise support system for commercial Linux, shows companies fail to protect themselves against cyberattacks even when patches exist," writes Jack M. Germain in LinuxIInsider.

"Results reveal that some 55 percent of respondents had a cybersecurity incident because an available patch was not applied. In fact, once a critical or high priority vulnerability was found, 56 percent took five weeks to one year on average to patch the vulnerability..."

LinuxIInsider, April 25th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
New SDP 2.0 Specification Facilitates Zero-Trust Maturity
The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.
"The Cloud Security Alliance (CSA) recently published the Software-Defined Perimeter (SDP) 2.0 s pecification, which is created by their SDP and zero-trust working groups," reports Chris Hughes in CSO Online.

"Given that the original specification was published in 2014 and we've seen industry-wide eagerness to adopt zero trust, this update is timely. SDP ties closely to the pursuit of implementing a zero-trust architecture, and what follows are the key aspects of SDP 2.0 in zero-trust environments that CISOs and other security leaders need to know.

CSO Online, April 26th, 2022
(Get More Information . .) open to premium members only

IT News - Email
Sender Policy Framework (SPF)
Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message. SPF blocks spammers and other attackers from sending email that appears to be from a legitimate organization
SMTP (Simple Mail Transfer Protocol) does not place any restrictions on the source address for emails, so SPF defines a process for the domain owners to identify which IP addresses are authorized to forward email for their domains.

The SPF protocol was published in 2014 by the Internet Engineering Task Force (IETF) in RFC 7208, "Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1." SPF is an IETF Proposed Standard specification.

SearchSecurity, April 28th, 2022
(Get More Information . .) open to premium members only

IT News - Big Data
Benefits Of Using Big Data To Assist With Digital Adoption
Big data technology can help immensely with developing a digital adoption strategy.
"Digital transformation has been a goal for many organizations in recent years, and the shift to remote and hybrid working arrangements has only made this desire to future-proof their business more immediate," writes Andrew Oziemblo in SmartDataCollective.

"However, this transition isn't easy and wouldn't be possible without major advances in big data technology.

Digital adoption has been defined as the reinvention of a company through the optimization of legacy systems and utilization of new technologies. Big data has been the epicenter of digital adoption in recent years. This is why companies around the world spent over $162 billion on big data last year..."

SmartDataCollective, April 25th, 2022
(Get More Information . .) open to premium members only

Top DataOps Tools 2022
Businesses have always been data-driven. The ability to gather data, analyze it, and make decisions based on it has always been a key part of success. As such, the ability to effectively manage data has become critical.
"In the past few years," writes Kihara Kimachia in IT Business Edge, "data has exploded in size and complexity. For example, the amount of data created, captured, copied, and consumed worldwide will hit 181 zettabytes by 2025, up from only two zettabytes in 2010.

This fact has made it difficult for businesses to promptly gather, analyze, and act on data. However, DataOps (data operations) is a software framework that was created to address this very problem..."

IT Business Edge, April 26th, 2022
(Get More Information . .) open to premium members only

IT News - Developer
Python Is Now Top Programming Language - But Shouldn't Be
Python may be the top programming language in the world right now, but its popularity won't last. Here's why.
"Times have never been better for Python," opines Christopher Tozzi in ITProToday. "The language currently ranks as the most popular programming language in the world, according to the TIOBE Index - a position that reflects years of steady growth over the past two decades.

That growth stems from a variety of factors. One is the fact that Python - despite its humble origins as an enhanced shell scripting language - has evolved into one of the most versatile, dynamic languages out there. It's used for everything from web development, to internet of things (IoT) programming, to AI and beyond..."

ITProToday, April 26th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section