New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content.
Disparate BI, analytics, and data science tools result in discrepancies in data interpretation, business logic, and definitions among user groups. A universal semantic layer resolves those discrepancies.
A significant chasm exists between most organizations’ current data infrastructure capabilities and those necessary to effectively support AI workloads.
GPU monitoring differs significantly from the monitoring of general CPU and memory resources, and requires a different approach. Here’s how Kubecost meets the challenge.
Web APIs facilitate the sharing of functionality and data across platforms, opening up new possibilities for business expansion and innovation. Here’s how to take advantage of them.
Recent advances in AI, such as foundation models, make it possible for smaller companies to build custom models to make predictions, reduce uncertainty, and gain business advantage.
Automation should serve as a foundational principle for approaching every security challenge. Here’s how automation can help you secure software development processes.
Highly optimized incremental backups, expanded SQL/JSON support, and a configurable SLRU cache are three of the most impactful new features in the latest PostgreSQL release.
Vector databases don’t just store your data. They find the most meaningful connections within it, driving insights and decisions at scale.
Acquiring cloud infrastructure is easy, but controlling cost and usage is hard. Here’s how open-source project Cloud Custodian flipped the script with policy as code.
Biometric authentication isn’t invulnerable, but it’s significantly more secure than traditional passwords. Here’s why.
A headless data architecture can unlock unparalleled data access across your entire organization. It starts with a shift left.
In the beginning, we identified two major types of software supply chain attacks and nine minor types. The world keeps insisting on a broader definition.
Look no further than the recent forkings of Redis and Terraform to see where the true power lies in the land of open source.
With digital maps and vast databases, there’s no limit to how rich and real-time maps can get. Accuracy and consistency will come from a system of unique identifiers called GERS.
The extract, transform, and load phases of ETL typically involve multiple tasks, each of which can be executed independently. This means you can develop each task as a microservice.
You can’t just fire up a web browser and explore all your APIs running in production. We need discovery tools built for APIs.
vCluster creates lightweight virtual Kubernetes clusters within physical Kubernetes host clusters, dramatically reducing resource consumption—and increasing agility and control.
For effective API security, build a collaborative defense across development, operations, and business teams and take advantage of these proven strategies for strengthening defenses.
A headless data architecture means no longer having to coordinate multiple copies of data and being free to use whatever processing or query engine is most suitable for the job. Here’s how it works.
Apache Iceberg provides an open table format for interoperability across data lakes, showing the importance of a true open standard.