At GTC, Nvidia announced new AI hardware, software and cloud partnerships – as well as a new breakthrough in computational lithography that will enable next-generation chips.
Among a slew of new enterprise features, Google showcased a Generative AI App Builder that it said would help companies build applications “in minutes or hours.” The tech giant has been scrambling to reassert its leadership in the industry since...
The need for an IAM solution isn’t new, but the public cloud has introduced new complications for IT teams. We break down the IAM challenges that have arisen in the cloud era – and how to address them.
From access control to pseudonymization and everything in between – we delve into methods and technologies to help you secure sensitive data in the cloud.
More cyberattackers are targeting organizations' cloud environments, but some cloud services, such as Google Cloud Platform's storage, fail to create adequate logs for forensics.
Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.
Cloud outages are occurring more than ever before. Addressing them requires a technical understanding and design patterns baked into your organization’s enterprise architecture.
Organizations must establish a clear cloud strategy anchored in both quantitative and qualitative migration drivers from a business, technology, and operational perspective.