All articles by CBR Staff Writer
How to Cover Security Holes Left by Edge Computing
Edge computing is beneficial, but it can lead to gaps in security via unpatched devices. Quest Software’s Jennifer LuPiba joined Global Data’s Kathryn Weldon to discuss the issues…
Will You Still Be Happy with Your Oracle Database in Five Years Time?
Is the Oracle-DBA relationship breaking down?
Google’s Velostrata Migration Tool Adds New Tricks in Wave Form
“With migration waves, you can perform dynamic instance right-sizing to optimize the post-migration cloud costs.”
ROI on Innovation Spending Declines 27%
Accenture highlights 7 key characteristics of successful innovators
Samsung Starts Mass Production of Its One Terabyte Flash Storage Chip
“The 1TB eUFS is expected to play a critical role in bringing a more notebook-like user experience to the next generation of mobile devices.”
Cloud Management Specialist Rubrik Spews Customer Data After Configuration Error
Major Rubrik client data including NHS data exposed
With 1.4 Billion Active Devices, Apple Milks Services for Revenue Growth
“Still a honourable performance”
SAP CEO Waves “Xs and Os” as Cloud Soars 40%
“Don’t be surprised if I sign my e-mails XO, Bill”
Apple FaceTime Bug: Teenager Spotted Vulnerability 9 Days Ago
Was vulnerability reported 9 days ago and ignored?
IBM Facial Recognition Dataset Aims to Remove Gender and Skin Bias
“We expect face recognition to work accurately for each of us”