CIO role: 3 areas to focus on in 2020 Emerging technologies such as quantum computing and artificial intelligence create new security...
Why cloud will drive innovation in government IT in 2020 More government agencies are on the verge of realizing the cloud model's full potential in 2020. Let...
Robotic Process Automation (RPA) in 2020: 5 trends to watch What’s next for robotic process automation? Look for reality checks about fit, new partnerships...
Blockchain in 2020: 5 trends to watch Blockchain “tourism” is giving way to serious projects, and standards groups are tackling key pain...
5 myths about 5G, debunked 5G will change the rules for apps requiring high speed and near-zero latency. But what about...
5G: What IT leaders need to know 5G networks promise fast speeds and low latency: That’s a big deal in an era when data is gold. Let...
Kubernetes: 3 ways to get started How can you get started with Kubernetes? Maybe you’re ready to try an experiment – or move from...
DevOps vs. ITIL 4 vs. SRE: Stop the arguments Which approach is right in the age of digital transformation? It’s not an either-or question. Let’s...
How to explain CVE, Common Vulnerabilities and Exposures, in plain English CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities...
Big data and AI: 3 real-world use cases Big data and artificial intelligence work together to help companies improve customer experiences in...