IDG’s Top Enterprise Stories |
|
| Our top picks from IDG's editors |
| |
| |
From virtual machines and Kubernetes clusters to serverless functions and machine learning APIs — how to navigate Google’s cloud riches Read More ▶ |
|
| White Paper: Magento What started as a revolution in the B2C world, with Amazon and eBay leading the front, eCommerce is now impacting the world of B2B commerce. eCommerce is permanently altering the way B2B businesses work - from customer acquisitions to customer retention, and from other fulfillment to building a relationship with customers. Read More ▶ | In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces. Read More ▶ |
| Low-code and no-code development tools give business users and developers a fast track to mobile app success Read More ▶ |
| | Users spread the blame as DisplayLink technology goes dark after Apple’s update to its MacOS. Read More ▶ |
| Artificial intelligence is wending its way into business processes. But CIOs should pause and research the potential business impact of AI tools — both good and bad. Read More ▶ |
| Are you getting the most from Microsoft Word 2016 for Windows? Get to know the key features. Read More ▶ |
| With Patch Tuesday right around the corner, it’s time to salvage the fixed parts of March’s patches and get them applied. Win7/Server 2008 R2 customers have to choose between a gaping security hole and even more bugs. Here's what you need to know. Read More ▶ |
| It isn't just digital health care records that are vulnerable. Paper records are regularly compromised—and they're the easiest for health care organizations to protect. Read More ▶ |
| Using Overclock's Akash Network, companies can turn their unused servers into Kubernetes-orchestrated Docker containers for rent. Read More ▶ |
| White Paper: ReliaQuest The background noise surrounding cybersecurity can be deafening to the enterprise security teams tasked with securing their organizations around the clock. These teams are made up of dedicated professionals who understand not only cyber challenges and threats, but also the opportunity to help secure their organization and provide value beyond security by leveraging the vast amount of data they access each day Read More ▶ |
|
|
|