Cloud News & Reviews - Page 5
More Cloud News
Red Hat updates its OpenShift Kubernetes container orchestration portfolio with new features gained via the acquisition of CoreOS in January.
Symantec is expanding its cloud security portfolio with new cloud workload assurance capabilities, enhanced cloud workload security features and a new Managed Cloud Defense service.
Adobe is delivering on the promise it made in May when it announced plans to acquire Magento Commerce for $1.68 billion, a deal it said would lead to the creation of a single platform for both B2B and B2C customers globally.
The biggest barrier to effective IoT implementation is lack of internal expertise and skills, according to 31 percent of respondents. Other barriers include the inability to manage and process large volumes of data (29 percent), integration issues (28 percent) and too many legacy systems (28...
Palo Alto Networks is aiming to combine the technology from RedLock with capabilities it acquired in March from Evident.io to create a new unified cloud security platform.
eWEEK is creating a new series of articles which examine all sectors of IT and present up-to-date research and analysis on the leading companies in each space. It's all designed for enterprise buyers of hardware, software, services and cloud products to have more and better information in hand...
Combination of two longtime rivals expected to establish a unified Hadoop and industry standard platform that will cover data management from data center, to the cloud, to the edge and to AI.
Workday updates its human capital management system with the addition of Workday skills cloud, a machine learning-powered skills ontology designed to help organizations better understand and manage their employees' talents.
Tim Berners-Lee announces a new startup effort called Inrupt that will advance the development of the open-source Solid specification to help restore user control of information.
While this “data everywhere” philosophy is great for efficiency, it’s devastating to traditional security models because they fail to protect data, especially when both the user and the data are beyond the security perimeter.