DC: Popular Vendor Articles Posted Week of February 2nd, 2026
Volume 334 Issue 4 - IT News You Can Use
IT News You Can Use
We promote many IT Vendor articles in our daily and weekly newsletters which have 250,000+ subscribers. We track which articles and webinars are the most clicked on. These are the most clicked on vendor IT articles, group by vendor.
Full issue is here: Volume 334, Issue 4
IBM News
IBM: A Glimpse At Computing’s Quantum-Centric Future
StorageNewsletter.com, Friday, January 30th, 2026
Researchers are already combining CPUs, GPUs, and QPUs into demonstrations of quantum-centric supercomputing....more
IBM Releases IBM Storage Ceph 9.0
StorageNewsletter.com, Friday, January 30th, 2026
IBM Storage Ceph can deliver File, Block and Object storage services from within one single technology stack, supporting clients to cut CAPEX and OPEX....more
IBM Says AI Is Insane In The Mainframe As Z17 Sales Surge
The Register, Thursday, January 29th, 2026
IBM’s leader has trumpeted an AI-on-the-mainframe future as generative AI fills in the COBOL gap left by earlier generations of techies....more
Red Hat News
Context As Architecture: A Practical Look At Retrieval-Augmented Generation
Red Hat, Thursday, January 29th, 2026
In a previous article, The strategic choice: Making sense of LLM customization, we explored AI prompting as the first step in adapting large language models (LLMs) to real-world use. Prompting changes how an AI model responds in terms of tone, structure, and conversational behavior without changing what the model knows....more
Friday Five - January 30, 2026
Red Hat, Friday, January 30th, 2026
The Friday Five is a weekly Red Hat blog post with 5 of the week’s top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye....more
How Banco Do Brasil Uses Hyperautomation And Platform Engineering To Drive Efficiency
Red Hat, Thursday, January 29th, 2026
At the recent OpenShift Commons gathering in Atlanta, we had the opportunity to hear from Gustavo Fiuza, IT leader, and Welton Felipe, DevOps engineer, about the remarkable digital transformation at Banco do Brasil....more
Google News
The New Era Of Browsing: Putting Gemini To Work In Chrome
Google, Thursday, January 29th, 2026
From smarter assistance to agentic browsing, discover how the latest AI updates are making Chrome more helpful than ever....more
Gemini In Navigation Is Now Available For Walking And Cycling In Google Maps.
Google, Thursday, January 29th, 2026
Gemini in navigation helps you get things done while driving - it’s like talking to a friend in the passenger seat. Now, it’s launching for walking and cycling....more
Microsoft News
Quantum Computing For All! Microsoft Releases Open Source Tools To Help Get Everyone Up To Speed On The Next-Gen Technology
techradar.pro, Tuesday, January 27th, 2026
Microsoft’s Quantum Development Kit closely integrates widely used development tools...more
ESET News
The Most Common Scams Small Businesses Should Be Aware Of
ESET, Friday, January 30th, 2026
Scams get more sophisticated, and everyone is a target....more
What If? Security Through The Eyes Of An Attacker
ESET, Monday, January 26th, 2026
There’s a version of your company only attackers ever see. It’s time you met it....more
Keyloggers Defined: What To Look For, How They Affect You, And How To Detect And Defeat Them
ESET, Thursday, January 29th, 2026
Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?...more
Salesforce News
How To Write A Mission Statement
Salesforce, Friday, January 30th, 2026
Learn how to craft a mission statement that captures your business, with this quick guide....more
How AI Audience Targeting Is Supercharging SMBs
Salesforce, Monday, January 26th, 2026
AI is changing how small teams connect with customers - and AI audience targeting is up first in the spotlight....more
Semrush And Salesforce: SEO Partners Helping Growing Businesses
Salesforce, Thursday, January 29th, 2026
Connect your SEO tools to your CRM to experience the full power of customer data....more
DDN News
Why Data Reduction Fails For AI Inference Pipelines
DDN, Friday, January 30th, 2026
For more than a decade, data reduction technologies such as deduplication and compression have been marketed as universal solutions to storage cost and scale challenges. In traditional enterprise workloads, those techniques deliver real value....more
Varonis News
Data Discovery Is Not Data Security
Varonis, Thursday, January 29th, 2026
Data discovery has become an important part of every data security program. From prioritizing efforts to tightening permissions to deciding where to place compensating controls, a map of sensitive data helps prioritize remediation of controls and informs detection....more
Exfil Out&Look For Logs: Weaponizing Outlook Add-Ins For Zero-Trace Email Exfiltration
Varonis, Wednesday, January 28th, 2026
Varonis Threat Labs reveals how Outlook add-ins in Microsoft 365 can be exploited to exfiltrate sensitive email data without leaving forensic traces....more
KnowBe4 News
CyberheistNews Vol 16 #04 The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access
KnowBe4, Tuesday, January 27th, 2026
KnowBe4 Threat Labs recently examined a sophisticated dual-vector campaign that demonstrates the real-world exploitation chain following credential compromise....more
SentinelOne News
The Good, The Bad And The Ugly In Cybersecurity - Week 5
SentinelOne, Friday, January 30th, 2026
A U.S. federal grand jury has charged 31 defendants for their roles in an ATM jackpotting operation linked to Venezuela’s Tren de Aragua gang....more
Okta News
Agentic Rag On Cloud Platforms: The Future Of RAG
Okta, Friday, January 30th, 2026
Traditional RAG works very well for static searches within a document; however, when it comes to dynamic real-world applications, it falls short....more
AI Security: When Agents Control Physical Systems, IAM Becomes Safety Infrastructure
Okta, Thursday, January 29th, 2026
In mid-September 2025 Chinese state actors weaponized Claude Codeopens in a new tab to conduct the first documented large-scale autonomous cyberattack. The operation targeted large tech companies, financial institutions, chemical manufacturing companies, and government agencies....more
F5 News
Classifier-Based Vs. LLM-Driven Guardrails: What Actually Works At AI Runtime
F5, Wednesday, January 28th, 2026
Not all AI guardrails work the same way. That difference is becoming harder to ignore. As organizations add enforcement at inference, meaning the moment a model processes a prompt and generates a response, two approaches are often conflated....more
Why Sub-Optimal Application Delivery Architecture Costs More Than You Think
F5, Thursday, January 29th, 2026
Applications are at the core of business. They power customer experiences, employee productivity, and revenue-generating digital services. At the same time, the architectures for delivering these applications often have not kept pace with how applications are built, deployed, and consumed today....more
MCP: The Key To AI-Ready Application Delivery
F5, Monday, January 26th, 2026
Modern applications are evolving quickly. AI-powered components embedded directly into the user experience complicate what used to be a predictable flow of web and API traffic....more
CrowdStrike News
Data Protection Day 2026: From Compliance To Resilience
CrowdStrike, Wednesday, January 28th, 2026
The AI era is redefining data protection. As identity abuse and global cyber threats accelerate, data protection must evolve from a legal formality to operational resilience....more
How Agentic Tool Chain Attacks Threaten AI Agent Security
CrowdStrike, Friday, January 30th, 2026
AI agents are rapidly transforming enterprise operations. Unlike traditional software that follows fixed code paths, AI agents interpret prompts, form plans, select tools, and react to results in a continuous loop. At the heart of this capability is the agent’s ability to actively select and execute capabilities based on natural language descriptions, schemas, and examples....more
Barracuda Networks News
Onboarding Success: Ways Organizations Can Empower New Employees To Build Security Confidence
Barracuda Networks, Tuesday, January 27th, 2026
Organizations must prioritize cybersecurity awareness from the first day of onboarding to empower employees and build their security confidence....more
Malware Brief: New Wave Of Botnets Driving DDoS Chaos
Barracuda Networks, Thursday, January 29th, 2026
The botnet ecosystem continues to evolve rapidly, fueled by a flood of poorly secured consumer and small‑office hardware. Everything from routers and webcams to unauthorized Android TV streaming devices - often shipped with unvetted apps or hidden remote‑access features - has become part of a global substrate powering persistent DDoS operations....more
What Is Data Gravity And Why Does It Matter?
Barracuda Networks, Wednesday, January 28th, 2026
Most people don’t think about data gravity until something breaks-like a stalled restore, an unexpected cloud bill or a stalled application migration. The term has been around since 2010, but it’s still considered a niche term that is used primarily in cloud architecture, data engineering, data backup, and disaster recovery conversations....more
About Data Connectors
Since 1999, Data Connectors has been facilitating relationships between senior executives who are looking for solutions and the vendors who provide them. Our community encompasses more than 650,000 professionals.
We produce this daily curation of industry news and events as a value to our community for free.
Upgrade to a Paid substack subscription to receive additional valuable posts. You will be supporting the community and will allow us to produce this service and to develop additional services.

