Topstories

The State Of Low-Code In 2023

The State Of Low-Code In 2023

Low-code rose up. Throughout the last decade, the software industry has witnessed the hugely impactful growth of low-code technologies designed to provide software application development engineers with accelerators and automations to make their lives easier. In an era when ‘automations’ (pl... Read more

date11 months ago
Process mining should become easier, but how?

Process mining should become easier, but how?

Process mining can be of great benefit to organizations. However, they need to know how to get to those beneifts. That's where companies need help. Appian wants to provide that help through its Insight to Action program. It also revealed what the future of process mining looks like according to App... Read more

date11 months ago
Why Microsoft keeps pushing the limit by forcing its software on you

Why Microsoft keeps pushing the limit by forcing its software on you

Regulators have told Microsoft several times that it cannot bundle or force software on its users. Yet time after time, the company manages to come up with new tactics that push the boundaries, and find ways to force its software on you. The Redmond company also seems to get away with it. Is it tim... Read more

date11 months ago
IBM Cloud Code Engine: Serverless programming should be a default

IBM Cloud Code Engine: Serverless programming should be a default

With great power, comes great responsibility - clearly - but also, comes complexity and the need to shoulder a steep learning curve. The latter extension of the saying may be needed for cloud computing container orchestration technology Kubernetes. The inherent complexity and power has been like... Read more

date11 months ago
AI creates identity crisis in security world

AI creates identity crisis in security world

Artificial intelligence is going to shake up security. RSA CEO Rohit Ghai stated at RSA Conference that it is becoming necessary to give AI more and more responsibility over securing digital environments. This particularly because IT security could otherwise be killed by that same technology. At... Read more

date11 months ago
Overcoming trust hurdles: What is ambient computing?

Overcoming trust hurdles: What is ambient computing?

A setting where AI, smart devices, machine learning, data, and human activity all work together to produce an outcome is referred to as an ambient computing environment. There is no need for direct human command to carry out a task. In contrast to smartphones and watches, which require... Read more

date11 months ago
Confidential computing creates enclaves of privacy and security

Confidential computing creates enclaves of privacy and security

Confidential computing is essentially a type of technology that aims to improve data privacy and security. The hardware-based technology works by using encrypted computation on sensitive data, and then isolating that data from host resources. Data, therefore, remains separate from applications and ... Read more

date11 months ago
The future of PostgreSQL in an automated world

The future of PostgreSQL in an automated world

In case you hadn’t noticed, Artificial Intelligence is in the news. With the rise of generative AI driving Chat-GPT (although the jury is still firmly out in terms of how much use it will be in software development spheres) we have entered an era of automation and autonomous systems management th... Read more

date11 months ago

Also check our Insights

1 40 41 42 43 44 101