New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content.
Vector databases don’t just store your data. They find the most meaningful connections within it, driving insights and decisions at scale.
Acquiring cloud infrastructure is easy, but controlling cost and usage is hard. Here’s how open-source project Cloud Custodian flipped the script with policy as code.
Biometric authentication isn’t invulnerable, but it’s significantly more secure than traditional passwords. Here’s why.
A headless data architecture can unlock unparalleled data access across your entire organization. It starts with a shift left.
In the beginning, we identified two major types of software supply chain attacks and nine minor types. The world keeps insisting on a broader definition.
Look no further than the recent forkings of Redis and Terraform to see where the true power lies in the land of open source.
With digital maps and vast databases, there’s no limit to how rich and real-time maps can get. Accuracy and consistency will come from a system of unique identifiers called GERS.
The extract, transform, and load phases of ETL typically involve multiple tasks, each of which can be executed independently. This means you can develop each task as a microservice.
You can’t just fire up a web browser and explore all your APIs running in production. We need discovery tools built for APIs.
vCluster creates lightweight virtual Kubernetes clusters within physical Kubernetes host clusters, dramatically reducing resource consumption—and increasing agility and control.
For effective API security, build a collaborative defense across development, operations, and business teams and take advantage of these proven strategies for strengthening defenses.
A headless data architecture means no longer having to coordinate multiple copies of data and being free to use whatever processing or query engine is most suitable for the job. Here’s how it works.
Apache Iceberg provides an open table format for interoperability across data lakes, showing the importance of a true open standard.
The license for Oracle JDK 17 will revert to the Oracle Technology Network License Agreement in September, and users will have some decisions to make.
Take advantage of an operational data store to consolidate data from across your organization and transform it for use in real time.
Success with a multi-tenant architecture requires the close alignment of design, use case, and underlying technology. Let’s dive into the key design patterns, their benefits, and their challenges.
New platform product supports transactional, analytical, and AI workloads.
The Kubernetes open source project should serve as the blueprint for the way in which we develop, govern, fund, and support AI projects.
Importing, transforming, and validating data from unmanaged external sources is a messy, complex process. A data exchange platform can help.
Kubernetes started as one of many tools for container orchestration. Ten years later it’s the leading platform for cloud-native applications.
Three programming languages have remained the top choices for developers for nearly 30 years, and will for the foreseeable future.
More flexible and more efficient than REST, GraphQL enables a more streamlined API architecture. Use GraphQL with Ballerina and Choreo for seamless integration.
You can learn a lot about programming from AI assistants. Take advantage of these tips and techniques to improve your experience.
Five key innovations that increased the performance, availability, and cost-efficiency of the engine at the heart of Confluent’s managed Apache Kafka service.
Even if generative AI hides SQL behind the curtain, it will continue to play a critical role in how we interact with and use data.
Grafana creator Torkel Ödegaard traces the open-source project’s journey to help developers visualize what’s going on inside distributed cloud-native infrastructure.
Python developers still prefer Django but are exploring alternative frameworks to draw on specific features or adapt to changing project demands.
The license changes of Redis and Elasticsearch may harken the end of open-source projects backed by solo vendors. Let’s work through what that means.
Repatriation is one route to cost savings. Switching development patterns from long-running services to WebAssembly-powered serverless functions is another.
Enterprise workflows desperately need what iPhone and Android users have enjoyed for years—ready access to files wherever and whenever they’re needed, regardless of where the files are physically located.
Upstreaming can improve your code, simplify development, and lighten your maintenance burden. Follow these best practices when donating code and reap the benefits.
How the CAKES stack, centered on Kubernetes, addresses API, networking, security, and compliance challenges while speeding up delivery and lowering costs.
How Apache Arrow, Apache Parquet, Arrow Flight, and DataFusion bring enhanced data processing capabilities to large volumes of time series and other data.
How WSO2’s Ballerina language and Choreo platform can be used to quickly develop, test, and deploy partner-specific EDI processing modules.
Like customer retention, developer retention comes down to not annoying your end user. But the approach is completely different.
A relatively obscure desktop Linux project hints at a containerized OS future that makes perfect sense for enterprise computing.
Java Development Kit 22 contains an average number of new features, but is better than average in other ways. Let’s take a look.
The best map data and the most advanced mapping features have been proprietary. The Overture Maps Foundation aims to change that.
Deploying software to large fleets of Linux-based devices is a complex and critical process that requires careful planning and automated execution. Start with these best practices.
Sensor data and IoT applications have special requirements that might be better served by a specialized database. Here’s what to consider.
Open source doesn’t have a security problem. It has a distribution problem.
TiDB is a prime example of an intrinsically scalable and reliable distributed SQL database architecture. Here’s how it works.
Everyone seems to agree that Kubernetes is too expensive to run. The problem is the way we build applications.
So many programming languages have come and gone, but SQL remains. And it has a bright future still.
Passkeys have many advantages over passwords for IT organizations. The user experience is far better too.
We live in a world in motion. Stream processing allows us to record events in the real world so that we can take action or make predictions that will drive better business outcomes.
The productivity gains low-code gives developers come primarily from the ability to reuse abstractions at the component or module level, reducing the time needed to develop customized software.
To avoid unnecessary cloud costs, you need to optimize the code that runs on top of the infrastructure. Defining cost as an SLO paves the way.
Kubernetes thrives in centralized data centers, but raises size, scalability, security, and interoperability concerns in distributed edge deployments. Here are some strategies to address them.
Sponsored Links