#standards-development

[ follow ]
DevOps
fromInfoWorld
5 hours ago

Enterprises are rethinking Kubernetes

Kubernetes is losing its status as the default choice for enterprise application deployment due to operational complexities and rising expectations.
fromTechzine Global
3 hours ago

The European cloud of the future is built using actual, physical containers

The European Commission aims to provide a framework for 12 EU member states to strengthen Europe's digital and technological sovereignty through the IPCEI-CIS initiative.
European startups
#ai
London startup
fromwww.bbc.com
4 days ago

Could a digital twin make you into a 'superworker'?

Digital Richard is an AI twin that assists Richard Skellett in business and personal decision-making, serving as a model for digital twins at Bloor Research.
Artificial intelligence
fromFast Company
5 days ago

The idea that the internet is built for people is crumbling. That has huge implications for your business

The internet is evolving to accommodate software agents that act on behalf of users, changing how websites are designed and interacted with.
DevOps
fromTheregister
1 week ago

Rebrand automation as 'zero-token architecture' to master AI

IT professionals can enhance productivity by rebranding existing automations as 'zero-token architecture' to manage AI costs effectively.
London startup
fromwww.bbc.com
4 days ago

Could a digital twin make you into a 'superworker'?

Digital Richard is an AI twin that assists Richard Skellett in business and personal decision-making, serving as a model for digital twins at Bloor Research.
Artificial intelligence
fromFast Company
5 days ago

The idea that the internet is built for people is crumbling. That has huge implications for your business

The internet is evolving to accommodate software agents that act on behalf of users, changing how websites are designed and interacted with.
DevOps
fromTheregister
1 week ago

Rebrand automation as 'zero-token architecture' to master AI

IT professionals can enhance productivity by rebranding existing automations as 'zero-token architecture' to manage AI costs effectively.
Careers
fromComputerWeekly.com
22 hours ago

Business leaders marked down on AI workforce strategy | Computer Weekly

31% of workers expect their jobs to change drastically or disappear by 2030, highlighting a significant shift in workforce expectations.
UX design
fromMedium
16 hours ago

Product design in 2026: the beginning of a fantastic voyage?

Designers now have the opportunity to redefine their influence and role within companies, moving beyond traditional constraints.
fromCMSWire.com
1 day ago

10 Marketing Buzzwords That Need to Go in 2026

CMSWire's Marketing & Customer Experience Leadership channel is the go-to hub for actionable research, editorial and opinion for CMOs, aspiring CMOs and today's customer experience innovators.
Marketing
Information security
fromSecuritymagazine
1 day ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
Mental health
fromSmashing Magazine
1 day ago

Session Timeouts: The Overlooked Accessibility Barrier In Authentication Design - Smashing Magazine

Poor session timeouts create significant accessibility barriers for users with disabilities, impacting their online experiences and tasks.
London startup
fromBusiness Matters
4 days ago

Should Every SME Have a PAT Testing Qualification on the Team in 2026?

SMEs can reduce costs and ensure compliance by training in-house staff for PAT testing instead of outsourcing.
Marketing tech
fromExchangewire
4 days ago

Agentic Advertising Needs Interoperability, Standardisation and Adoption to Thrive

The ad industry is transitioning to agentic advertising, promising automation and efficiency but requiring careful planning to avoid potential pitfalls.
Agile
fromdzone.com
3 days ago

Rethinking Risk in Agile Software Development

Agile must integrate risk management into workflows to avoid hidden risks and instability in complex software systems.
Web frameworks
fromInfoQ
4 days ago

Speed at Scale: Optimizing the Largest CX Platform Out There

Optimizing performance in customer experience platforms involves addressing challenges rather than focusing solely on the latest technologies.
#scale-computing
Software development
fromTechzine Global
4 days ago

Scale sets edge platform's software ever more free from hardware constraints

Scale Computing is reducing hardware requirements for its software, allowing more flexibility for partners and customers in choosing hardware platforms.
Scala
fromTechzine Global
6 days ago

New Scale Computing gets new Velocity Partner Program

Scale Computing revamps its partner program to address market changes and strengthen relationships with partners amid industry challenges.
Software development
fromTechzine Global
4 days ago

Scale sets edge platform's software ever more free from hardware constraints

Scale Computing is reducing hardware requirements for its software, allowing more flexibility for partners and customers in choosing hardware platforms.
Scala
fromTechzine Global
6 days ago

New Scale Computing gets new Velocity Partner Program

Scale Computing revamps its partner program to address market changes and strengthen relationships with partners amid industry challenges.
EU data protection
fromwww.theguardian.com
4 days ago

US tech firms successfully lobbied EU to keep datacentre emissions secret

US tech companies influenced EU regulations to conceal environmental impacts of datacentres, limiting public access to crucial data.
SF politics
fromwww.businessinsider.com
5 days ago

Data center executives fret over the industry's increasingly toxic public image

The data center industry faces backlash over environmental and economic concerns, threatening major projects and requiring better public relations efforts.
#ai-adoption
Business intelligence
fromNew Relic
5 days ago

The Agentic Shift: Key Takeaways from IDC Directions 2026

The focus has shifted from AI experimentation to enterprise-wide adoption, emphasizing the importance of agentic observability in the evolving agent economy.
Business intelligence
fromNew Relic
5 days ago

The Agentic Shift: Key Takeaways from IDC Directions 2026

The focus has shifted from AI experimentation to enterprise-wide adoption, emphasizing the importance of agentic observability in the evolving agent economy.
Philosophy
fromApaonline
5 days ago

The Paradox of China's Crypto Regulation and Capital Going Global (Part 2)

China's crypto capital expands globally despite domestic regulatory tightening, focusing on infrastructure and sovereign digital currency rather than token-based financialization.
fromInfoQ
1 day ago

Engineering Stable, Secure and Scalable Platforms: A Conversation with Matthew Liste

I was always a tinkerer, I guess. I grew up in the age where computers were not ubiquitous or common. An experience as a kid was instrumental in how my career happened.
DevOps
European startups
fromTechzine Global
1 day ago

Cisco Sovereign Critical Infrastructure now available in Europe

Cisco launches Sovereign Critical Infrastructure across EMEA, enabling organizations to innovate while maintaining control over their data and infrastructure.
Careers
fromSecuritymagazine
1 day ago

Advance Your Cybersecurity Career

Degrees and certifications in cybersecurity indicate foundational knowledge but hands-on experience and skills are more critical for success.
Information security
fromBusiness Matters
4 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Software development
fromInfoQ
5 days ago

Platform as a Product: Delivering Value While Balancing Competing Priorities

Software platforms should be treated as products, requiring a balance of engineering, design, usability, and value for success.
Marketing tech
fromExchangewire
5 days ago

Shinka Achieves SOC 2 Type II Certification

Shinka achieved SOC 2 Type II certification, demonstrating its commitment to security and compliance as it scales globally.
DevOps
fromComputerWeekly.com
1 day ago

Storage implications of a modern IT architecture | Computer Weekly

Organizations are increasingly using containers to modernize applications and manage both cloud-native and traditional workloads with Kubernetes.
European startups
fromTechzine Global
1 day ago

Siemens warns EU regulations are slowing down AI investments

Siemens warns that European AI regulations may hinder investments, pushing spending to the US and China if not adjusted.
Artificial intelligence
fromWIRED
1 day ago

Tech CEOs Think AI Will Let Them Be Everywhere at Once

Billionaire CEOs are advancing personal AI projects despite corporate resistance to AI adoption and consumer skepticism about its benefits.
DevOps
fromwww.bankingdive.com
1 day ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
Information security
fromHarvard Gazette
3 days ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
Marketing tech
fromDigiday
1 week ago

While AI is building the web faster than ever, accessibility can't be left behind

AI has accelerated marketing processes, but speed can compromise accessibility, impacting customer experience and conversion rates for people with disabilities.
Information security
fromDevOps.com
3 days ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
DevOps
fromComputerWeekly.com
4 days ago

AI, energy, and the new rules of cloud sustainability competition | Computer Weekly

Cloud providers offer sustainability metrics, but lack standardization makes it difficult for enterprises to compare workloads effectively.
UX design
fromFast Company
2 weeks ago

3 things to consider when choosing a software development partner

Client assumptions in vendor selection significantly influence project outcomes, often more than technology choices.
Software development
fromZDNET
5 days ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
DevOps
fromSecuritymagazine
5 days ago

Democratized Software, Democratized Risk: Who's Accountable When Everyone Codes?

AI-driven coding tools enable non-technical teams to create software, but they introduce vulnerabilities and require clear ownership and governance.
Information security
fromComputerWeekly.com
5 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Software development
fromInfoWorld
6 days ago

Where will developer wisdom come from?

Agentic coding allows software creation without traditional developer wisdom, relying instead on AI like Claude Code for implementation and problem-solving.
DevOps
fromNextgov.com
5 days ago

How to scale value without scaling complexity

Platform-as-a-Service has become essential for software delivery, enabling teams to manage complexity and improve efficiency.
#ai-governance
DevOps
fromInfoWorld
5 days ago

The agent tier: Rethinking runtime architecture for context-driven enterprise workflows

Digital workflows in large enterprises struggle to adapt to contextual variations, leading to increased complexity and challenges in customer onboarding processes.
Marketing tech
fromForbes
3 weeks ago

Automation Promised Efficiency, But It Also Removed Differentiation

Marketing automation has improved efficiency but led to a lack of differentiation in brand messaging and identity.
DevOps
fromDevOps.com
6 days ago

FinOps Isn't Slowing You Down - It's Fixing Your Pipeline - DevOps.com

Cost visibility should be integrated into DevOps workflows to manage cloud efficiency effectively.
fromwww.bbc.com
1 month ago

Race on to establish globally recognised 'AI-free' logo

AI is creating significant disruption and competing definitions of what is 'human made' are confusing consumers. A universal definition is essential to build trust, clarification and confidence. Without standardization, consumers face confusion distinguishing between genuinely human-made products and those using AI, undermining the credibility of the entire certification movement.
Graphic design
#digital-sovereignty
DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Information security
fromInfoQ
4 weeks ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
fromZDNET
1 month ago
EU data protection

How digitally sovereign are you? Red Hat can help measure that

DevOps
fromFortune
1 week ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Information security
fromInfoQ
4 weeks ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
fromZDNET
1 month ago
EU data protection

How digitally sovereign are you? Red Hat can help measure that

London startup
fromFortune
1 month ago

UL Solutions rolls out a new standard to fill a gap in AI regulation: 'Innovation without safety is failure' | Fortune

UL Solutions launches its first AI product certification standard (UL 3115) to ensure AI-embedded products are safe, robust, and human-controlled, addressing the lack of government oversight in rapidly evolving AI technology.
Information security
fromComputerWeekly.com
3 weeks ago

Platformisation or platform theatre? Navigating cyber consolidation | Computer Weekly

Consolidation in enterprise security is necessary but can introduce risks like single points of failure and integration issues.
Business
fromHelen Min
1 month ago

Software isn't dying, but it is becoming more honest - Helen Min

SaaS's subscription-based billing model is evolving beyond fixed seat-based pricing toward usage-based and outcome-based billing models that better align costs with actual value delivered.
E-Commerce
fromBusiness Matters
1 month ago

Supplier Verification: A Practical Guide for Smarter Global Sourcing

Supplier verification is a strategic necessity in global trade, requiring thorough assessment of legal status, production capability, quality systems, financial stability, and regulatory compliance before establishing business relationships.
European startups
fromComputerworld
1 month ago

European companies warn EU leaders: reduced reliance on US tech could hurt profitability

European companies warn that EU technological sovereignty initiatives risk reducing profitability and competitiveness while creating costly, complicated transitions from established US technology platforms.
DevOps
fromInfoWorld
3 weeks ago

How to build an enterprise-grade MCP registry

MCP registries are essential for integrating AI agents with enterprise systems, requiring semantic discovery, governance, and developer-friendly controls.
Software development
fromInfoQ
1 month ago

QCon London 2026: SBOMs Move From Best Practice to Legal Obligation as CRA Enforcement Looms

Software teams must urgently adopt SBOMs due to imminent regulatory requirements in the US and Europe, with enforcement beginning September 2026 and full compliance required by December 2027.
fromNextgov.com
2 months ago

Trust, trade and the new data diplomacy

Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
World news
Information security
fromThe Hacker News
1 month ago

Why Security Validation Is Becoming Agentic

Security validation tools operate in silos while attackers exploit interconnected systems, creating a structural blind spot that Agentic Exposure Validation can address through continuous, autonomous, context-aware assessment.
fromBusiness Matters
2 months ago

Why Tolerance Management Is a Business-Critical Skill in Modern Manufacturing

We are now in a time of manufacturing where precision is more than a technical necessity; it's a business requirement. The more complex, globally dispersed and demanding things get, the less slack remains in the system. Under these circumstances tolerance management has become a decisive competence and affects competitiveness not only in terms of controlling costs, ensuring quality and improving production efficiency but also for long term market success.
Business
Marketing tech
fromExchangewire
1 month ago

The Stack: Digital Rules Tighten

Streaming and social media face intensified regulatory pressure on age verification and content oversight, while advertising and retail sectors achieve record revenues.
EU data protection
fromTechzine Global
2 months ago

Trusted Tech Alliance establishes five principles for secure technology

Sixteen global tech companies formed the Trusted Tech Alliance to embed transparency, security, and data protection across the entire technology stack.
Information security
fromTechzine Global
1 month ago

Sovereign: the new normal for AI and cloud native (and how to make it work)

Sovereign cloud and AI deployments require organizations to maintain complete control over data location, infrastructure operations, and access, fundamentally changing Kubernetes operational requirements and threat models.
Software development
fromDevOps.com
1 month ago

Can QA Reignite its Purpose in the Agentic Code Generation Era? - DevOps.com

AI now generates 41% of all code with 84% of developers adopting it, requiring deterministic execution, isolated environments, and convergent correctness signals for effective agentic QA.
fromInfoWorld
1 month ago

Cloud sovereignty isn't a toggle feature

Sovereignty, locality, and 'alternative cloud' strategies are often treated as simple settings in hyperscaler consoles. Pick a region, check a compliance box, and move on. IT consultancy Coinerella posted about replacing a typical US-centric startup baseline with a 'Made in the EU' stack. They treat sovereignty as an architectural posture and an operating model that can save money.
EU data protection
fromInfoQ
2 months ago

Developers Can Improve the ESG Aspects of Software By Tackling Early Ethical Debt

Olimpiu Pop: Hello everybody. I'm Olimpiu Pop, an InfoQ editor, and I have in front of me Erica Pisani, one of the track hosts of QCon London 2025, and a very important track in my opinion. One that is important in general, but even more important these days. And the name of the track was performance and sustainability, which seems to be two opposing words. So, Erica, please introduce yourself.
Software development
DevOps
fromComputerWeekly.com
1 month ago

Platformisation without illusion: Separating integration from theatre | Computer Weekly

Platform consolidation promises reduced complexity but risks concentrating critical failures; CISOs must engineer platforms as resilient infrastructure with architectural sovereignty, not trust them by default.
fromDevOps.com
2 months ago

How AI Is Expanding Who Gets to Build Infrastructure - DevOps.com

Baron traces the origin story back to his time building high-scale systems at Instana (which exited to IBM in 2020), where the reality of "always-on" platforms made one thing obvious: the tooling we rely on is often too low-level, too rigid, and too disconnected from real-world use cases. That gap has only widened as environments have exploded in complexity-more cloud providers, more managed services, more hybrid setups, more internal APIs, and "gillions" of tools stitched together into brittle workflows.
Software development
fromSecuritymagazine
2 months ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
Artificial intelligence
fromDevOps.com
2 months ago

When Open Networks Meet AI Coding: A Tsunami of Smart Enterprise Apps - DevOps.com

Telcos are exposing programmable network APIs while AI code-generation accelerates development, enabling rapid creation of network-aware enterprise applications.
Information security
fromTechzine Global
2 months ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
DevOps
fromComputerWeekly.com
1 month ago

Open cyber standards key to cross-platform integration | Computer Weekly

Open standards enable interoperability across platforms and vendors, providing the balance between operational efficiency and functional flexibility while preventing vendor lock-in.
Information security
fromNextgov.com
2 months ago

NIST releases a new draft cybersecurity framework for systems that never stop moving

Transportation cybersecurity lags behind other critical infrastructure sectors, creating evacuation and public-safety risks as transit systems become more digitalized.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
[ Load more ]