Breaking down digital silos

To absolutely no one’s surprise, a new Gartner survey of more than 3,100 CIOs and technology executives found that 52% of digital initiatives fail. If anything, the surprise is that the number isn’t higher. Way back in 2014, I was writing about how and why big data projects fail. “Most companies simply don’t know what…

Read More

Can Wasm replace containers?

Heralded as the fourth standard of the web, WebAssembly, or Wasm for short, has sparked heated discussion since its origins. Wasm is an assembly-like programming language, a compact binary format, and a compilation target for C, C++, C#, Go, JavaScript, Python, Rust, and others that runs at near-native speeds in a web browser. It is…

Read More

Is your software architecture as clean as your code?

Modern software must function smoothly within a diverse ecosystem, from on-premises monoliths to ever-evolving cloud-based microservices. Architectural choices made during software development, be they explicit or implicit, add complexity and create interdependencies, often leading to an increased risk of outages, incidents, and security issues as well as the accumulation of technical debt that impact the…

Read More

AtScale Launches Public Leaderboard for Evaluating Text-to-SQL Solutions

As the demand for natural language data queries continues to grow, so does the need for a standardized way to evaluate Text-to-SQL (T2SQL) solutions. Despite rapid advancements in T2SQL technologies, the industry has struggled with inconsistent benchmarks. This lack of uniform standards has made it challenging for stakeholders to accurately assess and compare solution performance….

Read More

Analytics and Data Science News for the Week of November 8; Updates from Databricks, Impetus, MicroStrategy & More

Solutions Review Executive Editor Tim King curated this list of notable analytics and data science news for the week of November 8, 2024. Keeping tabs on all the most relevant analytics and data science news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines…

Read More

Java app security would get a boost through quantum resistance

Java application security would be enhanced through a couple of proposals to resist quantum computing attacks, one plan involving digital signatures and the other key encapsulation. The two proposals reside in the OpenJDK JEP (JDK Enhancement Proposal) index. One proposal, titled “Quantum-Resistant Module-Lattice-Based Digital Signature Algorithm,” calls for enhancing the security of Java applications by…

Read More

Serverless computing’s second act

Serverless computing has had a tumultuous journey characterized by early excitement, skepticism, and challenges that some—including yours truly—believed might spell its end. However, this technology is now experiencing somewhat of a resurgence, or perhaps it is more of a forced renaissance. In other words, change or die. Perhaps it can accomplish both. Let’s back up…

Read More

IBM: APIs getting AI boost

IBM sees a confluence of artificial intelligence and APIs, with AI powering APIs in a way that improves the productivity of API teams. AI is augmenting skills that API teams may just be starting to learn, said Rashmi Kaushik, director of product management for the integration portfolio at IBM, during a presentation at the API…

Read More

.NET vector data abstractions library now available in preview

Microsoft has introduced its Microsoft.Extensions.VectorData.Abstractions library, now in preview. The library provides abstractions to help integrate vector stores into .NET applications and libraries. The vector data abstractions library, introduced October 29, provides library authors and developers with the ability to perform create-read-update-delete (CRUD) operations and use vector and text search on vector stores. Vector databases…

Read More

‘Package confusion’ attack against NPM used to trick developers into downloading malware

Application testing company Checkmarx has warned developers to be on the lookout for malicious NPM packages, after discovering a new attack that employs typosquatting to impersonate two popular packages. Part of a much larger campaign against NPM, in a new twist, the malicious package eschews traditional command & control (C2) by using the Ethereum blockchain…

Read More