Produced by:

Blog posts by Kevin Jakoby

CPU cooling is the unsung hero of computer design. Without it, the various components inside a desktop or laptop computer would eventually overheat and stop working.   As a CPU operates, its...

Two-factor authentication (2FA) is a simple yet effective security measure. It works by using two different methods to confirm a user’s identity. Instead of just asking for a username and password...

Dell Technologies has just released its first data management product, the Dell Data Lakehouse. It’s designed to help your customers eliminate data silos, accelerate insights and democratize data...

Bluetooth trackers like Tile and Apple’s AirTag have become popular accessories for those who want to keep track of easy-to-lose items. If there’s a tracker on the keychain of your missing car keys...

Artificial Intelligence (AI) and Generative AI (GenAI) can be a double-edged sword. On the one hand, this emerging tech holds transformative potential, rewriting the book on data analytics,...

Newsletters

The ETP newsletter

Get the ETP newsletter in your inbox every week and read enterprise technology news, trends and guidance that can help drive successful business outcomes.


All newsletter subscriptions are subject to The Channel Company's terms of service and privacy policy.