Building a Cloud-Native, AI-Ready Data Architecture: Distributed SQL Databases For Dummies (2nd Edition)
Brought to you by YugabyteDB
Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.
Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence
Brought to you by YugabyteDB
In this Security Strategist podcast, CoreView’s Rob Edmondson breaks down the most critical Microsoft 365 security risks and explains how organisations can harden their tenants before attackers exploit the gaps.
We examine Island’s Q1 2026 campaign that turned a focused enterprise security conversation into coordinated cross-channel momentum.
We take a closer look at Apex winner Uniphore’s podcast on composable CDPs, first-party data, and AI-ready marketing architecture.
We take a closer look at Vespa.ai’s Vanguard-winning podcast on AI-native search, personalisation, and digital commerce.
Growth has shifted into a part of the journey your CDP wasn't designed to reach—though most teams haven't recognized it yet.
Why modern marketing is slowing down at the exact moment it needs to speed up
We look at NVIDIA’s planned investment in IREN and what the partnership means for large-scale AI infrastructure expansion.
'Frankenstein Data' is derailing insurance AI, but Stibo System's MDM delivers the governed data foundation for scalable Enterprise AI success.
India's first $1.1B space unicorn, Skyroot Aerospace (backed by Blackrock, GIC, Sherpalo), is exploring orbital AI data centres and private satellite constellations to boost enterprise autonomy.
We examine why decentralisation is shifting governance, identity, and operational pressure onto people across modern enterprise systems.
A report on shifting jobs, rising expectations, and why the AI story doesn’t quite add up
People no longer want to “search” your site—they expect to ask a question and get a clear, confident answer that feels like a ChatGPT-style response, not a list of blue links.
Most teams can assemble a retrieval-augmented generation (RAG) pipeline. With today’s tools, it’s relatively straightforward to connect internal content to a large language model (LLM) and generate grounded answers.
Servier is scaling AI across pharma R&D, but its real advantage lies in data consolidation, governance, and execution at scale.
However the Hantavirus cruise ship outbreak exposes not only gaps in the public health response but in the technology infrastructure that underpins real time disease surveillance.
AI fraud detection is advancing fast, but explainability is now the real barrier to adoption.
Data sovereignty now underpins enterprise resilience, shaping how organisations control data, secure AI systems, and recover from disruption.
We announce the Q1 2026 Impact Index winners and highlight the work that stood out for real enterprise impact.
Most extortion-style cyberattacks follow a recognizable sequence. Attackers breach networks, encrypt essential files, and demand payment. Money is almost always requested in cryptocurrency because it resists tracking.
The discussion highlights a total lack of port security and network authentication, famously exploited by R2-D2 to gain administrative control over complex systems through simple physical links.
We examine what the Mythos breach reveals about AI access control and why enterprise security models may not be ready
Discover upcoming events shaping the world of enterprise tech
Get the latest insights, analysis and tech news delivered straight to your inbox