News
-
19 Aug 2025 / AI Technologies
Grammarly's new AI agents target professionals, students
The new AI agent features include a plagiarism checker, citation finder and the ability to predict reactions to the content users create.
-
19 Aug 2025 / Patient access
How patients are using generative AI to find a doctor
With more patients using generative AI to find a doctor, clinics and hospitals need to dial into online reputation management to ensure AI generates accurate information.
-
19 Aug 2025 / Data Management Strategies
Alation unveils agentic AI-powered query capabilities
By accessing a knowledge layer consisting of curated data products and metadata, Chat with Your Data provides more accurate responses than the vendor's previous capabilities.
-
19 Aug 2025 / Data Management Strategies
Confluent joins agentic AI fray with Streaming Agents
The vendor's new environment for developing agents includes tool calling via model context protocol and connections with key sources such as LLMs and vector databases.
-
18 Aug 2025 / Data breaches
Microsoft-owned company settles MOVEit lawsuit for $8.5M
A Massachusetts judge preliminarily approved a multimillion-dollar settlement over a 1.2 million-record data breach at Nuance Communications stemming from 2023 MOVEit software exploits.
-
18 Aug 2025 / Policy & regulation
Breaking down uninsured numbers under Trump's spending law
The newly signed One Big Beautiful Bill Act will increase the uninsured rate in the U.S., especially as the law prompts changes to Medicaid and Health Insurance Marketplace policy.
Technology Insights
-
Use ssh-keygen to generate new key pairs: A full tutorial
Use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more.
-
19 Aug 2025 / AI Technologies
AI vs. machine learning vs. deep learning: Key differences
Artificial intelligence, machine learning and deep learning are terms often used interchangeably, but they aren't the same. Understand the differences and how each is used.
-
19 Aug 2025 / Data Management Strategies
10 essential data management roles for 2025
These 10 essential data management roles are commonly part of the teams that organizations rely on to ensure their data is accurate, governed and accessible.
-
15 Aug 2025 / Network Security
SSH tunneling explained: A tutorial on SSH port forwarding
SSH tunneling creates secure encrypted connections through private and untrusted networks, enabling remote access, bypassing restrictions and protecting sensitive data transfers.
Topics Covered
- App Architecture
- AWS
- Business Analytics
- CIO
- Cloud Computing
- Content Management
- Customer Experience
- Data Backup
- Data Center
- Data Management
- Disaster Recovery
- Enterprise AI
- Enterprise Desktop
- ERP
- Health IT
- Healthcare Payers
- Healthtech Analytics
- HealthtechSecurity
- HRSoftware
- IoT Agenda
- IT Channel
- IT Operations
- Mobile Computing
- Networking
- Oracle
- Patient Engagement
- Pharma Life Sciences
- Rev Cycle Management
- SAP
- Security
- Software Quality
- Storage
- Sustainability and ESG
- Unified Communications
- Virtual Desktop
- Virtual Healthcare
- VMware
- WhatIs
- Windows Server