New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content.
Although a serious engineering challenge, database vectorization delivers orders-of-magnitude performance boosts for a real-time analytics engine such as StarRocks. Here’s how we did it.
Schema design, indexes, queries, configs, I/O... what could go wrong? Follow these 10 essential tips to keep your MySQL servers humming.
Whether on the server or on the edge, Wasm lets you create custom logic that runs much closer to the data than it could before. And you can do it securely, efficiently, and with greater flexibility.
Proprietary software isn’t evil, but open source is a remarkable force for good. The transparent, community-driven approach to development is driving innovation in every industry today.
JFrog used Xray Container Contextual Analysis to scan the 200 most popular community images in Docker Hub, then tallied the results for the 10 most common CVEs. 78% were not exploitable.
JFrog’s new Xray Secrets Detection uncovered active access tokens in popular open-source software registries including Docker, npm, and PyPI. Here are our findings and takeaways.
A new paradigm for continuous delivery is emerging that enables it to serve as the foundation for improving devops and increasing development productivity.
Despite the duopoly of the current app marketplace, businesses should not be maintaining two development teams. Flutter and cross-platform apps are the future.
Developer-first security is the future in the cloud. Because the responsibility for cloud security rests with developers and devops teams, not IT security.
Bringing WebAssembly and OCI containers together could enable us to run the same container image on any hardware or operating system we want—wherever it runs best, fastest, or cheapest.
Granular visibility can help enterprises keep cloud costs in check. Follow these best practices when using monitoring methods to control Kubernetes-related spending.
An immutable package registry on the blockchain offers an opportunity for fairly compensating open source developers based on their contributions.
COBOL Colleague uses symbolic machine learning and static analysis to help developers understand and maintain COBOL source code. The same technology could be applied to other programming languages.
Event-driven architecture allows developers to create powerful, real-time digital experiences. Ably’s edge messaging platform helps them deliver these experiences at scale.
Apache Iceberg is an open table format that offers scalability, usability, and performance advantages for very large data sets. Here are five reasons Iceberg is optimal for cloud data workloads.
The next stage of cloud computing brings computing power closer to users, paving the way to better user experiences and more intelligent applications.
A full-stack networking platform with machine learning, autonomous capabilities, and multicloud support allows devops engineers to focus on what matters most—building applications.
Partitioning can provide a number of benefits to a sharding system, including faster query execution. Let’s see how it works.
Rather than punt database design decisions to a cloud service or third-party provider, understand what you want to achieve and how best to deliver on that goal.
The most dangerous security holes are often the most basic. Start improving your Kubernetes security posture by fixing these simple mistakes.
Security teams need a standard set of processes for locking down roots of trust for software artifacts, and developers need a clear path to balance open source selection against security policies. Open source has answers.
Every day, software developers implicitly trust software packages, container images, dependency maintainers, repository operators, and build systems that we don’t know anything about. It’s the opposite of Zero Trust.
Great API documentation is essential to a good developer experience. But your documentation should be great for non-developers too.
SingleStoreDB unifies transactions and analytics in the same engine to power real-time, data-intensive applications. Here’s what’s new.
Artificial intelligence unlocks the true potential of IoT by enabling networks and devices to learn from past decisions, predict future activity, and continuously improve performance and decision-making capabilities.
Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.
The skills needed to implement and manage cloud services differ substantially from those needed for on-premises applications. This has created a major hurdle for businesses needing to innovate.
Customer-obsessed organizations should introduce API gateways alongside enterprise service buses to optimize service connectivity. Here’s how.
The vast metaverse will also be vast in terms of code, accelerating the demand for supply chain security, automated scanning and testing, and continuous updates.
Businesses often lack critical insights into the security of their cloud environment. Here are nine questions business leaders need to ask—and cloud security teams need to answer.
YugabyteDB 2.13 brings materialized views, local reads for performance, region-local backups, and much more, extending the geo-distribution capabilities of the database.
Recording the model development process on the blockchain can make that process more structured, transparent, and repeatable, resulting in less bias and more accountability.
Artificial general intelligence will be able to understand or learn any intellectual task that a human can. AGI will have high costs and huge risks, but it’s coming—maybe soon.
Today we’re seeing a major evolution in how search anticipates what users want before they know they are looking for it. Developers should be tuning in.
Cloud security is all about configuration. Here’s how to make sure the configurations of your cloud resources are correct and secure, and how to keep them that way.
Understand the two dimensions of scaling for database query and ingest workloads, and how sharding can make scaling elastic—or not.
Narrow AI applications such as Google Search and Amazon Alexa are great at solving specific problems, but only as long as you stick to the script.
Machine learning workloads require large datasets, while machine learning workflows require high data throughput. We can optimize the data pipeline to achieve both.
Choosing the wrong database for data-intensive applications opens a door to scaling challenges and unnecessary complexity. Making the right choice is simpler.
Flexera 2022 State of the Cloud survey finds data warehouses, databases, and containers to be the top cloud draws, with serverless and AI/ML rising fast.
Vector databases unlock the insights buried in complex data including documents, videos, images, audio files, workflows, and system-generated alerts. Here’s how.
PostgreSQL was the first relational DBMS to introduce JSON support, and its JSONB index search capability is unique. More is on the way.
A zero-day vulnerability in Argo CD could be putting sensitive information like passwords and API keys at risk. Are you protected?
How the 12-factor methodology, container-based microservices, and a monorepo approach win with both customers and developers at Priceline.
As IoT extends into every facet of our lives, the big challenge will be delivering data solutions that are interoperable with legacy, current, and future systems.
There’s a difference between technology adoption and vendor lock-in. Technology adoption has gravity, but vendor lock-in has teeth.
More organizations will tune into the far-reaching benefits of a symbiotic human-AI relationship in the coming year. Here’s how.
How Incorta’s unified data analytics platform closes the gap between strategic and operational decision-making.
In the coming year, organizations will seek to simplify, optimize, and consolidate observability through a mix of new tools and practices.
Four predictions for how technology innovation will allow competitive businesses to distinguish themselves in the coming year.
Sponsored Links