Industry insider news for New Zealand's technology resellers
These search results are from across the Techday network of sites
Fortinet: Optimising opportunities for security resellers
Managed security services offer resellers sustainable revenues, an opportunity to increase engagement with clients, and an even greater opportunity to bring new customers on board.
The human eye as a proxy for the future of networking
In recent years scientists have been unravelling the intricate structure and wiring of retina neurons within the eye - Mellanox Technologies looks beneath the surface.
How cloud technologies are shaping the data-driven contact centre
According to a global Ecosystm cloud study, more than half (53%) of organisations have increased work processes and efficiency as a result of using the cloud.
Interview: Catalyst Cloud on the second wave of cloud innovation
The demand and use of containers and Kubernetes come from a deep realisation that there is a better way to package, deploy and run applications.
BitSight and ServiceNow announce integrations improving cyber risk management
Together, BitSight and ServiceNow provide organisations with prioritised visibility and automated workflows to manage cyber risk.
Application shielding startup RedShield raises $14m
RedShield CEO and co-founder Andy Prow says that taking capital from a New Zealand private equity player was a strategic choice.
VMware's open pledge to help partners and customers make their mark
Technology is neither good nor bad, but it’s often how we shape it. Will technology shape the world we want to live in? Or will it create a world we’re afraid to live in?
How to take your job search to the next level
What can you do to make sure you get the attention you deserve in your job search?
Simplifying collaboration in the changing workplace
Continuing advancements in technology and the rapid speed of delivery are driving incredible change in today’s workplaces.
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Schneider Electric’s key considerations for deploying a hybrid data centre
Pod frame architectures and liquid cooling can greatly improve the efficiency of hybrid IT applications.
10 ways to benefit from the emerging ‘data nation’ - Snowflake
Data is opening up new opportunities for revenue generation that can significantly boost the corporate bottom line.
Case study: Kemp load balancers resolve issues for Now IT
Now IT faced a problem when its load balancer was unable to share information with AWS’ relational database, or access Microsoft Exchange.
The rise of document databases - MongoDB
one of the most popular and flexible ways of storing data is via a document data model, where each record and its associated data is thought of as a “document”
Four misconceptions about open source technology - Acquia
Despite widespread adoption around the globe, open source technology continues to generate questions about its security and performance.
Caution needed in AI implementation for A/NZ businesses
Moving slowly and prudently towards the adoption of AI solutions is a strategy that’s likely to serve an organisation better than a fast-paced embrace of AI-centric architecture.
Why finance and IT must work together to implement RPA
In the accounting department, robotic process automation sees automation software running on a workstation perform many of the tasks formerly carried out by accountants.
Why next-gen CRMs need real-time data for forecasting
The problem is that many finance departments are still stuck making important business decisions based on last quarters’ numbers.
Where cloud migrations still come unstuck - ThousandEyes
It’s not just code that needs refactoring for the move to cloud.
Riding the frictionless wave with cloud-based apps – Talend
The term has been co-opted in recent years to describe the phenomenon of commercial processes which appear to work smoothly and effortlessly.
Key threats businesses must be vigilant against – LogRhythm
At home and abroad, companies anticipate cyber-crime will be the most disruptive economic crime of 2019 and 2020.
Protecting organisations from insider threats - Bitglass
The biggest challenge for most external threat actors is gaining access to a target organisation, but insider threats already have this.
Why AI algorithms are only as good as the data they’re fed - Snowflake
If this data is of poor quality or contains bias, this will have a significant impact on subsequent decisions made by the software.
Overcoming deepfakes with deep learning
In the past couple of weeks, there have been high-profile examples of deepfakes, where deep learning, an advanced subset of AI, is used to manipulate videos to create fake videos.