your market intelligence analyst
Search Results
Edit Save
2,210 results 04/06/2020 14:30
Palo Alto Networks has updated its Prisma Cloud to make it easier to embrace best DevSecOps processes while deploying workloads in the cloud. New capabilities include the ability to define and apply cybersecurity policies to continuous integration (CI) and continuous delivery (CD) workflows and scanning tools for discovering misconfigurations in cloud infrastructure templates, which is […]. . 04/06/2020 03:30
Outages happen, it’s inevitable. But, unplanned downtime often comes with substantial costs—not only in terms of recovery and revenue loss, but also customer happiness, brand reputation and employee morale. While there is no foolproof way for companies to avoid outages, there are steps they can take to help improve uptime. Development teams should determine what […]. . 04/06/2020 03:00
Site Reliability Engineering (SRE) is a topic that over the last several years has become a popular discussion across many companies I have interacted with. This article is the first of two that I’m passionate to share, as I’ve come across many organizations who are trying to build and implement this ideology, while all are […]. . 04/06/2020 02:30
I’ve built apps, in some shape or form, for about 20 years now. During this time, I’ve always started the same way—design the user interface, build the backend services and connect everything together, adding in appropriate logic along the way. Recently, however, I’ve noticed that my design philosophy has changed. It’s less about how screen […]. . 04/03/2020 03:30
With the rise of DevSecOps comes a whole new need for training and upskilling. It isn’t a secret that the cybersecurity skills gap will only continue to grow. The security skills gap combined with the rise of DevSecOps has introduced hidden challenges organizations must address. The Rise of DevSecOps While DevOps accelerates agility and scalability […]. . 04/03/2020 03:00
Do you know how much IT resources your employees are consuming? According to research conducted by the Everest Group, shadow IT spending accounts for a whopping 50% or more of the IT budget. Beyond these costs, shadow IT could end up costing you big in terms of a security breach: Gartner estimates that 33% of […]. . 04/03/2020 02:30
It’s a SaaS-driven world inside today’s workplace. Business users have taken control over their organization’s data within SaaS applications in search of a much more collaborative and responsive IT experience. This has caused a fundamental shift in the security paradigm. The user has become the new perimeter. IT and security must now monitor user activity […]. . 04/02/2020 11:08
GitLab this week announced it has moved 18 features that previously organizations had to pay for into the core open source version of its namesake continuous integration/continuous delivery (CI/CD) platform. Scott Williamson, executive vice president of product management for GitLab, said as a general rule the company makes available DevOps tools for teams across the […]. . 04/02/2020 10:30
The Linux Foundation this week announced it will make up to 500 training scholarships available this year. Clyde Seepersad, general manager for training at the Linux Foundation, said the number of Linux Foundation Training (LiFT) Scholarships being made available is being increased because of both the demand for individuals with particular expertise such as Kubernetes […]. . 04/02/2020 10:13
CircleCI today announced it is making it easier for DevOps teams to determine the amount of resources being consumed by its continuous integration/continuous delivery (CI/CD) platform to help make application development teams more efficient. Kunal Jain, senior product manager for CircleCI, said via the application programming interface (API) that CircleCI exposes DevOps teams can now […]. . 04/02/2020 03:30
With the introduction of network programmability and APIs for everything from management systems to devices themselves, the modern network landscape has evolved to being managed like software. This shift from hardware-focused networks to software-centric functions has had a profound effect on network management techniques and skillsets required to keep pace with the changing ecosystem. A […]. . 04/02/2020 03:00
Trying to get ahead of the bugs and vulnerabilities that cause security breaches and hacks has become an increasingly high priority in recent years across a variety of industries. With a growing cybersecurity skills gap and short-staffed security teams, many organizations are turning to bug bounty programs to expand their breach prevention capabilities beyond their […]. . 04/02/2020 02:30
The IT pro gig usually includes a basic headwind. They’re part of a cost center, and budget for resources and staff are limited by design unless they’re managing a strategic initiative, which—at least for a while—is more generously funded. Early adopters of DevOps, Agile or site reliability engineering (SRE) teams have been budget beneficiaries when […]. .

Financial Services

Business Issues

Companies - Public

Companies - Venture Funded

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



  • Actions
    • Bookmark and Share: Allows you to Bookmark the page for easy future retrieval and sharing with colleagues
    • Email: Opens a pop-up window where you can write a message to the recipient of the email
    • Copy URL: Copies the URL of the requested document for pasting in an email or other document
    • Previous Versions: Only shown if essentially the same document has been republished
  • Saved Searches and Alerts
    • Save your search for later viewing & updates by clicking the blue "Save" button to the right of the search box. 

Click here for more info on Search Results.