Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
April 29, 2024
TransUnion transforms its business with IT
On the heels of its Neustar acquisition, the consumer credit reporting agency seeks to give customers access to its troves of consumer data to fuel next-generation services through solutions platform OneTru. Read more
The end of non-compete agreements is a tech job earthquake
The FTC ruled this week that companies can no longer use non-compete agreements to stop workers from moving from one job to another â and businesses are having fits. Read more
DIY cloud cost management: The strategic case for building your own tools
Cloud cost optimization in complex environments may require some CIOs to move beyond commercial offerings and build their own cloud cost tools in-house. Read more
Cisco urges immediate software upgrade after state-sponsored attack
Hackers exploited previously undetected vulnerabilities in Ciscoâs Adaptive Security Appliances â a product that combines multiple cybersecurity functions. Read more
Dropbox adds end-to-end encryption for team folders
Dropbox this week unveiled a range of features, including security updates and key management, and the ability to co-edit Microsoft 365 documents from within the file-sharing app. Read more
The temptation of AI as a service
Enterprises may find it faster and easier to deploy their AI models in a public cloud that runs them as a service. AWS is jumping on this trend. Read more
Network jobs watch: Hiring, skills and certification trends
What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. Read more
Altnets and neutral hosts: Are options widening for enterprise network services?
Independent broadband and telecom-infrastructure providers could provide connectivity options in areas where service is thin, if enterprise concerns about business viability and technology operations are addressed. Read more
How the ToddyCat threat group sets up backup traffic tunnels into victim networks
The Chinese APT group is using a variety of tools to infiltrate networks and steal large amounts of data. Read more
5 ways to use JavaScript promises
Developers use JavaScript promises to model asynchronous operations in web and server-side programs. Here's a quick look at five ways to use promises in your code. Read more