Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading to higher churn. The study also reveals major security gaps: over half of Windows and Android devices in healthcare lag five OS updates, and many education devices remain unencrypted. Despite a surge in government Windows deployments, Macs with M‑series chips run significantly cooler than Intel‑based PCs.

Absa Group booked a R2.4 billion (≈$126 million) software impairment for 2025, far exceeding the R179 million (≈$9 million) written off a year earlier. The write‑down reflects accelerated obsolescence as AI, cloud adoption and faster technology cycles render legacy platforms uneconomic. Absa’s IT spend...

Benin’s Ministry of Digital and Digitalization has issued a World Bank‑funded request for proposals to conduct a technical, economic and legal feasibility study on a secondary national data centre. The study, due by March 27, 2026, will explore locating the backup facility...

DH2i announced the general availability of DxEnterprise v26.0 and DxOperator v2, upgrades that bring advanced high‑availability, disaster‑recovery and resilience features to SQL Server on Windows, Linux and Kubernetes. DxEnterprise adds default database‑level health monitoring, automatic quorum enforcement to avoid split‑brain, and stronger...

Enterprise infrastructure costs are climbing 10‑20% as AI‑driven demand monopolizes GPU, high‑bandwidth memory, and flash production. Commodity components like standard RAM and HDDs face shrinking supply, extending lead times and shortening quote validity. The price pressure is expected to persist...
Enterprises across North America are moving from legacy data centres to cloud platforms at an unprecedented pace. The primary driver is a clear commercial imperative: avoid hidden cost spikes during a rushed data‑centre exit. Sequencing migration before decommissioning lets organisations...

Microsoft will cease trusting kernel drivers signed through the long‑deprecated cross‑signed root program, requiring all drivers to be certified via the Windows Hardware Compatibility Program (WHCP). The change rolls out in an "evaluation mode" with the April 2026 Windows Update, allowing...
Accenture’s new report, The Age of Co‑Intelligence, warns that the rapid scaling of AI agents threatens enterprise accountability, with 60 agents reshaping over half of U.S. work hours. The study flags $6 billion in potential revenue gains but warns that governance...

During the week of March 23‑27, several channel vendors announced senior leadership changes aimed at strengthening AI‑driven security, scaling SaaS revenue, and expanding federal cloud compliance. 7AI named Israel Barak as chief information security officer to accelerate AI‑enabled SOC operations. JumpCloud,...

Log management is becoming a strategic pillar for enterprises, with the global market projected to grow from $3.7 billion in 2025 to nearly $8 billion by 2030 at a 16% CAGR. The practice spans collection, aggregation, normalization, storage, analysis, and reporting, supporting...

Pinterest reduced its compute expenses by re‑architecting how it moves workloads across Kubernetes clusters. The company built a central scheduler that dynamically shifts jobs between on‑prem, cloud, and spot‑instance environments based on real‑time demand. Predictive scaling and workload profiling let...

Virgin Media Business Wholesale announced a major milestone in its Project Spark network transformation, completing national upgrades to its high‑capacity core, metro and MPLS layers. The new National High‑Capacity Services core now spans 23 sites, supporting 83% of demand, while...
Consulting firms are expanding ethical AI services as enterprises adopt tools such as Google Search Live and Meta's $10 billion AI data center, intensifying data‑privacy challenges. Reports of long‑lasting cookies and regulatory push‑backs underline the urgency for privacy‑focused digital transformation.
Databricks has rolled out Lakewatch, an open‑agentic SIEM that leverages generative AI to automate threat detection and response. The company says the service can slash total cost of ownership by as much as 80% while keeping years of hot, queryable...
Google announced that it now expects quantum computers capable of breaking RSA encryption by 2029, accelerating the industry‑wide post‑quantum cryptography rollout to that year. The shift tightens timelines for governments and enterprises to adopt quantum‑resistant algorithms amid growing AI‑driven data...

Infrastructure as Code (IaC) has become the operational standard for enterprises, with the global market hitting $2.2 billion in 2025 and projected to surpass $12 billion by 2032. IaC replaces manual provisioning with version‑controlled code, delivering consistency, speed, security, and cost efficiency....

Your personal laptop is already an *agentic browsing lab*. Two “quiet” tools in Chrome can now *take actions* (not just answer questions): open tabs, click, read pages, fill forms, send messages, and run multi-step workflows—with you shifting from operator → supervisor. Shashi’s...

Use of AI Triples for Product and Enterprise Innovation in 2026 https://t.co/3CNiNbURdd From my latest global CIO survey. The use of AI gets far more strategic this year. https://t.co/3xIOumQeI3
The European Parliament voted to postpone key provisions of the EU AI Act, moving high‑risk AI obligations to 2 December 2027 and sector‑specific rules to 2 August 2028, while granting a watermarking deadline of 2 November 2026. Analysts stress that the delay does not relieve enterprises;...
Workspaces have dissolved into networks of temporary environments. What matters is trusted connectivity, device integrity, and consistent security policies that follow people across locations and contexts.
The panel explored how health systems can achieve operational resilience during EHR downtime, emphasizing that resilience is an organization‑wide capability rather than just an IT issue. CIOs Chris Akeroy (Lee Health) and Stuart James (Christus Health) highlighted the need for...
RT AI value doesn't live in slideware or labs. It shows up when agents are embedded in day-to-day work, governed like core systems, and held to the same standards as any critical operation. #AgenticAI #EnterpriseAI @Star_CIO https://t.co/VtuS5rQ0ZG

Defense Department IT leaders are urging the Pentagon to replace fragmented service‑level cyber workforce tools with a single enterprise system. Senior officials from the Marine Corps, Army and Air Force highlighted that current separate platforms duplicate effort, hinder talent mobility,...

Veritone announced a multi‑year agreement to migrate its core AI workloads, including aiWARE, Data Refinery, and Data Marketplace, to Oracle Cloud Infrastructure. The move aims to boost performance, security, and global scalability as the company tackles massive unstructured data volumes....

Telstra announced it will integrate the Apache Flink stream‑processing engine with its existing Kafka‑based event streaming platform, launching the project in the coming months. The pairing, delivered through Confluent’s managed services, aims to boost real‑time analytics across Telstra’s network observability...
Residents of Lee, Massachusetts have pushed back against a utility's smart‑meter deployment, prompting scrutiny of how utilities manage digital infrastructure projects. Details of the dispute were not disclosed, but the controversy underscores broader governance challenges for CIOs in the utility...

#CIOChat Q4: Endgame: If more IT workloads consume tokens, budgeting shifts from fixed to variable, a major $ issue. How are CIOs adapting financial models like FinOps for AI, chargebacks, or automated guardrails? How do you manage volatility while still enabling...

Power Usage Effectiveness (PUE) is the standard metric that gauges how much of a data center’s total power consumption actually serves IT equipment versus supporting infrastructure. It is calculated by dividing total facility power by IT equipment power, with a...
Seat based pricing breaks when AI agents do more of the work than humans. CIOs should be pushing vendors toward outcome and usage models. #FinOps #CIO https://t.co/QCJX9x5Zwh

Implementing Edge Computing shifts technical control from distant clouds back to the jurisdictional origin of the data. Localized architecture simplifies compliance since distributed intelligence enables fast action without risking exposure in transit. Microblog @antgrasso https://t.co/wiyi1BXs1i
In this episode, Dr. Tommy Korn, Sharp Healthcare’s Chief Spatial Computing Officer and practicing ophthalmologist, explains how the health system is leveraging Apple Vision Pro devices to give clinicians "superpowers" through spatial computing. He outlines the dual role of his...
RT Inside IT, many teams are still running pre-AI agile and DevOps playbooks while sprinkling in copilots and vibe coding. That mismatch will quietly cap your AI ROI until you redesign roles, rituals, and pipelines. #AI #Agile #DevOps @Star_CIO https://t.co/rZYa7HdIa8
The #Edge of Resilience: How @DataCore is Redefining Data #Sovereignty and #Security in the Distributed Era https://t.co/VcNT9l9r0h
LiteLLM, an open‑source large language model framework, was hit by a malicious supply‑chain attack that injected compromised code into its dependencies. SAP LeanIX’s security team identified the breach within hours and executed a coordinated response that isolated the threat and...
Security researchers have uncovered a new class of prompt‑injection attacks, dubbed “Disregard That!”, that can commandeer the context window of large language models. The technique can force chatbots to send fraudulent messages, such as a £45 ($57) transfer request to...

Data sovereignty has moved from a niche compliance checkbox to a core business priority, expanding beyond traditional sensitive records to include email addresses, logs, and metadata. Executives now demand real‑time visibility into where data originates, travels, and resides, as illustrated...

Morgan Stanley has deployed a GitOps workflow powered by Flux to operate 500 production Kubernetes clusters, hosting roughly 100,000 containers on 2,000 nodes. The bank needed a unified, auditable process to meet stringent regulatory and security mandates while scaling its...

The long‑standing 1‑to‑3‑times implementation cost rule for IT service management (ITSM) tools is being challenged by AI‑driven digital workers. By automating catalog configuration, incident analysis, knowledge‑base creation, and documentation, these agents can slash the labor‑intensive phases of deployment. Organizations that...
A ransomware intrusion crippled Foster City’s computer systems, leading the city council to declare a state of emergency. The incident unfolded as more than 40,000 cybersecurity professionals gathered at the RSAC conference in San Francisco, turning the breach into a...

Microsoft announced that Azure is now validating NVIDIA’s next‑generation AI supercomputer, the Vera Rubin NVL72, marking one of the first hyperscaler tests of this rack‑scale platform. The system, slated for a 2026 launch, promises lower cost‑per‑token for large‑scale model training...

The article outlines a Terraform‑driven approach to building a zero‑trust Oracle Kubernetes Engine (OKE) cluster. It replaces overlay networking with OCI VCN‑Native CNI, deploys a private control plane without a public IP, and enables AMD SEV confidential computing for memory...

Enterprises now run a heterogeneous mix of permanent, burstable and edge Kubernetes clusters, plus occasional Docker hosts, creating a "multi‑everything" landscape. This diversity fuels configuration drift, fragmented access controls, and bespoke upgrade processes that scale linearly with each new environment....
Ledger’s Donjon research team demonstrated that attackers can retrieve PINs, encrypted storage and crypto‑wallet seed phrases from Android phones that are turned off. The flaw, present in MediaTek processors paired with Trustonic’s Trusted Execution Environment, impacts roughly one‑quarter of Android...
Info-Tech Research Group released two new reports warning that accelerating AI workloads are exposing structural limits in enterprise application delivery and infrastructure operations. The findings highlight technical debt, skill shortages and integration complexity as the top barriers to scaling AI,...
Pedro R. Buhigas, CIO of Kodiak Gas Services, sold 13,942 shares for $777,000, trimming his holding by roughly a quarter. The sale follows a year in which the company generated $1.31 B in revenue and posted strong cash flow, prompting analysts...
The inside track on how boards evaluate their CIOs https://t.co/8L46WRgbUF Also: The vast majority of CIOs are now expected to be board-ready.
Jaguar Land Rover (JLR) embarked on a SAP S/4HANA migration to replace a legacy ERP and create a future‑proof, agile foundation. The project centered on a Clean Core strategy, keeping the system as standard as possible while using a governance...

Entro Security unveiled Agentic Governance & Administration (AGA), a new platform pillar designed to govern AI agents and non‑human identities across enterprise systems. AGA tackles the shortcomings of traditional Identity Governance and Administration tools, which were built for people and...

The rise of connected cars, smart homes, wearables and industrial IoT is stretching authentication beyond the traditional web browser. Regulators such as UNECE WP.29 and the U.S. IoT labeling program are imposing baseline security requirements for vehicle software and consumer...

Osmium Data Group warns that using US‑owned cloud providers for backups undermines European data‑sovereignty, even when the physical datacenter sits in the EU. The firm evaluated four source‑and‑destination scenarios, ranking a Europe‑owned source and datacenter as highest compliance, while a...