Enterprise process automation (EPA) is a fascinating field that strategically leverages technology to integrate, streamline, and automate business processes across an…
Read MoreResearch
CIEM: Bridging the Gap Between IAM and Cloud Security
The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreThe Cloud Networking Polysemy
A very high market demand for cloud networking has encouraged a large number of networking vendors to enter this space. Each…
Read MoreSpringing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read MoreThe Evolution of Application and API Security (AAS)
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it…
Read MoreThe Elephant Flows Through the Data Center Network
Techniques for optimizing data center networks to support AI workloads are not intuitive. You first need a baseline understanding of how…
Read MoreCustomer Data Platforms (CDPs): A Smart Tool for the Enlightened Marketer
Customer data platforms (CDPs) unify first-party customer data from multiple online and offline systems to create a single centralized view of…
Read MoreMaking Sense of ITAM Investments in 2024
In the mature market landscape of IT asset management (ITAM), you might wonder “what’s the rush?” to invest in a long-run,…
Read MoreFrom Here to GitOps and Back Again
The IT sector has been pursuing automated deployment for a very long time. Back in the day, application release automation mapped…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read MoreInsights from Runtime: How Kubernetes Resource Management Influences Cloud Development
The evolution of software portability converges naturally with the proliferation of easily scalable infrastructure made available by cloud computing providers. The…
Read MoreBest Practices for Implementing an ASM Solution
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not…
Read MoreSASE: Today’s Landscape and Tomorrow’s Horizons
Secure access service edge (SASE) is a transformative cybersecurity concept that converges network security functions with wide-area networking capabilities to match…
Read MoreDigital Transformation Not Working? Here’s a Five-Point Plan That Can Help
Digital transformation is the holy grail of businesses today, but the route is bumpy and the journey full of challenges. Businesses…
Read MoreDeveloping a Culture for Growth—Reflections from the Project Team
Over the past several months, GigaOm has been working to establish and maintain the right culture to position the company for…
Read MoreMachines as Amplifiers: Constructing Value Statements
As I’ve previously noted, all machines are amplifiers, including the hardware and software machinery that makes up today’s computer systems. The…
Read MoreAll About the GigaOm Radar | Explainer Video
We’re delighted to announce the launch of our in-depth GigaOm Radar explainer video, which tells you everything you need to know…
Read MoreTransformational Training as Lived Experience: 5 Questions for Heather MacDonald, Pluralsight
I spoke with Heather MacDonald, principal consultant for technology training and online learning platform Pluralsight, about how to align learning with…
Read MoreApple Vision Pro: Unlocking the Potential of Spatial Computing
Introduction I rarely get the chance to work with technologies that fundamentally disrupt the way we work. Right now, I am…
Read MoreCharting A Course Through Cloud Workload Security (CWS): An Enterprise Blueprint
The landscape of cloud workload security (CWS) is rapidly evolving, offering new challenges and opportunities for businesses of all sizes. In…
Read MoreThe Evolution of Endpoint Management
Unified endpoint management (UEM) is neither a new term nor a new technology. Rather, it’s a bundling of existing technologies into…
Read MoreContainer Networking: From DIY to Buy
There’s been little to no coverage from the analyst community of enterprise-grade container networking solutions—a market that has until recently consisted…
Read MoreHybrid 5G or Private 5G: What’s Right for Your Business?
As the fifth generation of cellular network technology, 5G has tremendous potential as a transformative technology: it can enhance connectivity, drive…
Read More“But Aren’t CDNs Boring?” No, Not at All.
Content delivery networks (CDNs) have been around for decades, so they may not generate the interest and excitement of newer technology.…
Read More