You Are Browsing ‘OPINIONS’ Category

By Robin Schmitt General Manager for APAC, Neustar The unprecedented growth of the cloud computing industry has had the business community rejoice. The discussion among the business and IT leaders is no longer concerning ‘Should we move to the cloud?’ but ‘How do we optimize our cloud migration strategy?’ Taking advantage of the competitive cloud market,...

By Chris Chelliah, Group Vice President and Chief Architect, Core Technology and Cloud, Oracle Asia Pacific Machine learning will be a defining technology of 2018, doing more to change how we live and work than any technology since the internet. To understand why, we first need to get past sensational headlines about robots ‘stealing our jobs’. Innovation and...

By Alan Zeichick Editorial Director, NetEvents We all have heard the usual bold predictions for technology in 2018: Lots of cloud computing, self-driving cars, digital cryptocurrencies, 200-inch flat-screen televisions, and versions of Amazon’s Alexa smart speaker everywhere on the planet. Those types of predictions, however, are low-hanging fruit. They’re not...

Interview conducted by Alan Zeichick Editorial Director, NetEvents We’ve heard about what to expect in 2018: Digital transformation, IT transformation, and cloud computing, and a shift in how enterprises will acquire products and services from the industry. Tom Burns, SVP of Dell EMC Networking, doesn’t want 2018 to be like 2017. Frankly, none of us in tech want...

Virtualization and software-defined networks should be a means to an end — not an end to itself. The goal of a data center, after all, is to deliver services (such as applications and microservices) to end users or to drive business processes. It doesn’t matter if those applications run on physical servers or virtual servers or in Infrastructure-as-a-Service...

By Symantec Security Response security Symantec has released the following detection for attempts to exploit the Multiple CPU Hardwares Information Disclosure Vulnerability (CVE-2017-5753/Spectre): Exp.CVE-2017-5753 A series of newly discovered vulnerabilities affecting processor chips could permit attackers to gain unauthorized access to a computer’s memory. Dubbed...

By Anthony Giandomenico You know what they say about history: Those who don’t learn from it are doomed to repeat it. Another maxim about the future holds true, too: To predict the future, simply look at the past. With that in mind, here’s a quick overview of the current state of cybersecurity, along with what lies on the horizon and what organizations can...

By Bernard Solomon, Head of Applications, Malaysia & Head of Human Capital Management (HCM) Applications, ASEAN The current economy is service-driven. To win and stay competitive in the market, organizations must take care of two: customers and employees. However, in a landscape that is shaped by competitive pressures, talent scarcity and workforce demographic...

By Dr. Gary McGraw Vice President of Security Technology, Synopsys Inc. What does 2018 look like in the software arena? Let us examine automation and software integrity. Automation will continue at a faster pace than ever before in human history. If you recall talk about the “information revolution” from 25 years ago when the web was in its infancy, you’ll...

By Reggie Bradford, SVP, Oracle, Startup Ecosystem & Accelerator It’s a great time to be an entrepreneur. The cloud gives you access to an amazing array of tools and resources, enabling you to bring a great idea to the marketplace in very little time and reach potential customers around the world. No matter your industry, you have the opportunity to use your...