Oracle Database@AWS goes GA: Exadata and Autonomous DB now live in the US
The focus, according to Yuhanna, is on ensuring high availability, and since the regions are geographically isolated, an outage in one doesn’t necessarily impact the other. Availability in 20 additional regions In addition to the US regions, Oracle and AWS plan to expand the availability of Oracle Database@AWS to 20 regions over the next 12-18 […]
Read MoreHow to select the right IoT database architecture
Organizations have many options when designing an IoT database, but technologists must decide the best fit by evaluating the different IoT database architectures, such as static vs. streaming vs. time series and SQL vs. NoSQL. The right IoT database depends on the requirements of the IoT project. To select a database, first factor in […]
Read MoreMetadata: Your ticket to the AI party
Agentic AI is fundamentally reshaping how software interacts with the world. New frameworks for agent-to-agent collaboration and multi-agent control planes promise a future where software acts with more autonomy and shared context than ever before. Yet amid all this excitement, one quietly persistent idea holds everything together: metadata. Known in data management circles for decades, […]
Read MoreIoT basics: A guide for beginners
IoT stands for the internet of things. Most simply, it refers to physical objects linked through wired and wireless networks. More specifically, it refers to the collection of internet-connected devices that can communicate autonomously over the internet, without needing a person to initiate communication. You might be asking, how is this different from the […]
Read MoreArriving at ‘Hello World’ in enterprise AI
Enterprise AI sells like middleware, not SaaS. You’re not dropping an API into Slack; you’re rewiring 20-year-old ERP systems. Procurement cycles are long and bespoke scoping kills product velocity. Then there’s the potential for things to go very wrong. “Small deals are just as much work as larger deals, but are just way less lucrative,” […]
Read MoreIoT compliance standards and how to comply
IoT continues to gather momentum. One way to recognize its progress is the number of standards, protocols and regulations that have emerged in recent years. Although some standards are essentially guidance, a few are mandatory, and compliance must be demonstrated. As such, it’s important to understand the key standards and regulations for IoT and […]
Read MoreAWS adds incremental and distributed training to Clean Rooms for scalable ML collaboration
“The need for secure data collaboration is more critical than ever, with the need to protect sensitive information, yet share data with partners and other collaborators to improve machine learning models with collective data,” said Kathy Lange, research director at IDC. “Often, enterprises cannot collect enough of their own data to cover a broad spectrum […]
Read More6 IoT architecture layers and components explained
Enterprise IoT continues to grow at a reported 20% annually, transforming operations across various industries, from manufacturing and logistics to healthcare and energy. As this expansion accelerates, enterprise IT and operational technology professionals must prepare to design, implement and manage increasingly complex IoT systems. The first step in achieving this is to determine the […]
Read MoreDeveloping JavaScript apps with AI agents
Matthew Tyson is a contributing writer at InfoWorld. A seasoned technology journalist and expert in enterprise software development, Matthew has written about programming, programming languages, language frameworks, application platforms, development tools, databases, cryptography, information security, cloud computing, and emerging technologies such as blockchain and machine learning for more than 15 years. His work has appeared […]
Read MoreTop 15 IoT security threats and risks to prioritize
IoT endpoints are prime targets for attacks, with the soaring number of connected devices and often porous security controls creating plenty of opportunities for hackers. In its “The State of IoT Security, 2024” report, Forrester Research concluded that corporate IoT devices were the most reported target for external attacks, meaning they were attacked more than […]
Read More