IDG’s Top Enterprise Stories |
|
| Our top picks from IDG's editors |
| |
| |
Buyer beware: The transactional nature of outsourcing relationships could leave your organization exposed to charges you hadn’t bargained for. Here’s what to watch out for. Read More ▶ |
|
| White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform. Read More ▶ |
| The underlying game-theory principles could be applied to the real world, only if the test cases reflected the real world, not artificial fantasy environments Read More ▶ |
| | You can accelerate deep learning and other compute-intensive apps by taking advantage of CUDA and the parallel processing power of GPUs Read More ▶ |
| In today’s Linux tip, we’re going to look at the lsblk command, which provides useful information on block devices. Watch Now ▶ |
| The latest version of the Linux kernel cleans out nearly 100K lines of code and adds file encryption and the Berkeley Packet Filter. Read More ▶ |
| Boomerang, Otter, and Voicera are three new-breed voice and artificial intelligence (AI) apps to help you get more done -- though there's a catch. Read More ▶ |
| Cryptojacking attacks, fileless malware, and malware with small file sizes all increased in the first half of 2018 as cyber thugs tried to use more covert tactics. Read More ▶ |
| White Paper: Bronze Drum Consulting Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶ |
|
|
|