Gartner predicts a 9.3% increase in IT spending in 2025

Gartner is predicting that IT spending will continue to grow in 2025. Specifically, they predict a 9.3% increase from this year, with the total spending equaling $5.74 trillion. Generative AI investments are driving data center spending, which grew by 34.7% in 2024, and represented the biggest increase of the various IT spending categories. Gartner doesn’t … continue reading

Report: IT outages cost $1.9 million per hour on average

The average cost of IT outages has increased to $1.9 million per hour, with the median downtime for a high-impact outage being 77 hours.  This is according to observability company New Relic’s newly released 2024 Observability Forecast, which surveyed 1,700 IT professionals from 16 countries.  Just a decade ago, Gartner reported that the average cost … continue reading

Vultr unveils advanced serverless capabilities for agentic AI for the enterprise

Vultr, the world’s largest privately held cloud computing platform, today announced a significant expansion to its Vultr Serverless Inference platform, providing organizations with the essential infrastructure needed for agentic AI. Building upon its initial launch earlier this year, these powerful new capabilities empower businesses to autoscale models and leverage Turnkey Retrieval-Augmented Generation (RAG), to deliver model inference … continue reading

Resourcely reinvents infrastructure DevOps with configuration platform for scaling HashiCorp’s Terraform and OpenTofu and launches new free tier

Resourcely, the configuration platform company, today announced that it has released a free tier of its tool for configuring and deploying cloud resources. Resourcely, with its novel approach to infrastructure configuration, lets organizations shift left safely while governing their cloud infrastructure using their existing tools. Developers get a simplified experience for configuring Infrastructure-as-Code (IaC) while … continue reading

RHEL AI 1.2 adds support for new hardware accelerators from Lenovo and AMD

Red Hat has announced the latest version of Red Hat Enterprise Linux AI (RHEL AI), its platform for developing, testing, and running LLMs.  “Building on the success of our initial release of RHEL AI 1.1 on September 5, 2024, this version furthers our commitment to empowering developers, AI engineers and data scientists by lowering the … continue reading

FIDO Alliance’s newest specifications for passkeys enable better user choice and flexibility in credential managers

The driving force behind passkeys, the FIDO Alliance, is working to make passkeys even easier to adopt by publishing new working drafts of specifications for secure credential exchange, a format for transferring different types of credentials in a credential manager.   Passkeys have significant momentum at this moment of time, with over 12 billion online accounts … continue reading

Cloud Native Computing Foundation announces KubeEdge graduation

The Cloud Native Computing Foundation today announced that KubeEdge, an open-source edge computing project built on Kubernetes, has achieved graduation status. KubeEdge, according to the CNCF, expands the cloud native ecosystem to scenarios and industries outside of data centers by bringing the container orchestration and scheduling capabilities of Kubernetes to the edge. Further, it delivers edge … continue reading

Why your zero trust strategy will fail without automation

Zero trust is broken. Not because it’s a bad idea, but because most organizations are applying it wrong. If your security still depends on humans to approve access requests, verify identities, and respond to threats, you’re already behind. Zero trust’s core principle—trust no one, verify everything—breaks down when manual processes are too slow, error-prone, and … continue reading

ClearML’s GPU-as-a-Service provides multi-tenant access to AI infrastructure

The AI development platform ClearML is making it even easier for companies with multiple teams working on AI solutions to get the infrastructure they need. GPU-as-a-Service provides access to large on-premise or cloud computing clusters that are multi-tenant so that multiple teams can work off them. ClearML tracks compute consumption, data storage, API calls, and … continue reading

AWS Console-to-Code jump starts infrastructure automation

AWS has released a new solution designed to make it easier to get started with infrastructure automation. AWS Console-to-Code allows users to record the console actions they are performing and have those actions converted to code for later use. Code can be generated in several different infrastructure-as-code (IaC) formats, like an AWS CloudFormation template (YAML … continue reading

Simbian’s new AI Agents enable more efficient security operations

The AI-powered IT security company Simbian has announced a set of three new AI Agents that can “work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program.” SOC Agent investigates and responds to security alerts, leveraging knowledge from security experts, the company’s playbooks, and user guidance to create responses … continue reading

Commvault’s Cloud Rewind enables quick restoration of data and cloud applications following incidents

Commvault is making it easier for companies to restore their services after a cyberattack with the launch of Cloud Rewind. According to Commvault, following an attack, restoring data is half the battle, but the other half is restoring the applications that actually run and power that data. Organizations can’t typically be in “business-as-usual” operations until … continue reading

Navigating the complexities of modern IT operations

As organizations rely more on digital services for every facet of their operations, the role of CIOs and CTOs has grown more complex and essential than ever. But while the evolution of IT from a supporting function to a critical business driver has created some challenges, it also opens up new avenues for innovation.  Traditionally, … continue reading

Six security principles that operators of critical OT systems should be following

A number of international government organizations have come together to publish the “Principles of operational technology cyber security,” which features six principles to follow. The guide was created by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and co-sealed by government security offices from the U.S, U.K, Canada, New Zealand, Germany, the Netherlands, … continue reading

Next Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!