Cloud News & Articles

The promise of pair programming: Fewer defects, faster dev cycles

Using a single computer and keyboard, two developers sit side by side and jointly analyze the project at hand, strategizing and combining strengths to solve problems faster and expand their skill sets. Called pair programming, it's an ill-advised…

Building your own SaaS billing system not for the faint of heart

A technology company Laurie Fleet worked with several years ago had some of the best computer engineers in the world, so it was a no-brainer to company finance leaders to use in-house talent to build its software as a service subscription billing…

Investing in too many cybersecurity tools could hurt defenses

Editor's note: The following is a guest article from Samuel Bocetta, a former Department of Defense security analyst and technical writer focused on network security and open source applications. Overinvesting in cybersecurity tools can hurt…

'More complex by the day': Leaders turn to automation to sustain IT efficiency

Dive Brief: Automating part of IT teams' workflow will help leaders sustain the effectiveness of their work even as tech spend budgets dwindle, said 72% of decision makers in a report from software company LogicMonitor. The report surveyed 500…

Paradigm shift left VPNs, edge security awaiting long-term strategy

Dive Brief: Edge security company Akamai was in the process of redesigning its office space into a more open concept, when COVID-19 eliminated the office environment entirely, said Maha Pula, VP of Solutions Engineering at Akamai, while speaking…

The Growing Need to Consolidate Multi-Tenant Environments

Over the past four months, countless businesses and universities have scrambled to the cloud to enable their employees and students to work remotely during the global coronavirus pandemic. Managed service providers (MSPs) and IT service providers…

5 charts that show the impact, and cost, of data breaches

When a data breach occurs, an organization's primary goal is to stop the bleeding of an unauthorized intrusion.  But on average, data breaches usually last 280 days, according to IBM's Cost of a Data Breach report in partnership with Ponemon…

Pandemic paradox: Businesses want more IT at lower costs

Dive Brief: Before COVID-19, improving operational excellence was a business priority for most companies, according to a survey of 100 IT leaders from Apptio conducted between March and June 2020. But amid disruption, executives' priorities…

The Remote Playbook: Navigating the virtual job fair scene

The Remote Playbook is a regular column for people who manage and oversee remote teams. As a remote worker, CIO Dive's Roberto Torres can help shed light on the issues and trends impacting the management relationship. Want to read more on a…

IBM offers 1K paid internships to prepare diverse students for STEM careers

Dive Brief: Creating diversity in the technology field can begin with preparing students for STEM careers at an early age, according to IBM. The tech giant is offering 1,000 paid internships to students and graduates of its Pathways in Technology…

Keurig Dr Pepper leans on Google Cloud to host data footprint

Dive Brief: Keurig Dr Pepper is tapping Google Cloud to host its "data footprint" as part of a multiyear agreement, Google announced Tuesday. The companies began working on the project in December 2019.  The beverage company will shift to virtual…

How engineering leaders can enable high-performing, connected remote teams

Editor's note: The following is a guest article from Hector Aguilar, president of technology at identity and access management company Okta. We're now months into our new normal of remote work. While we were well-equipped at Okta to handle…