All articles by CBR Staff Writer

CBR Staff Writer

How to Cover Security Holes Left by Edge Computing

Edge computing is beneficial, but it can lead to gaps in security via unpatched devices. Quest Software’s Jennifer LuPiba joined Global Data’s Kathryn Weldon to discuss the issues…

Google’s Velostrata Migration Tool Adds New Tricks in Wave Form

“With migration waves, you can perform dynamic instance right-sizing to optimize the post-migration cloud costs.”

ROI on Innovation Spending Declines 27%

Accenture highlights 7 key characteristics of successful innovators

Samsung Starts Mass Production of Its One Terabyte Flash Storage Chip

“The 1TB eUFS is expected to play a critical role in bringing a more notebook-like user experience to the next generation of mobile devices.”

SAP CEO Waves “Xs and Os” as Cloud Soars 40%

“Don’t be surprised if I sign my e-mails XO, Bill”

Apple FaceTime Bug: Teenager Spotted Vulnerability 9 Days Ago

Was vulnerability reported 9 days ago and ignored?

IBM Facial Recognition Dataset Aims to Remove Gender and Skin Bias

“We expect face recognition to work accurately for each of us”