Laden...
Top Enterprise Technology Stories
The best articles from Foundryâs B2B publications
July 04, 2025
18 famous ERP disasters, dustups, and disappointments
Itâs no wonder ERP has such a bad reputation: The history surrounding the complex and expensive enterprise software market is packed with tales of vendor mudslinging, outrageous hype and epic failures.
Read more
Third-party risk management: How to avoid compliance disaster
If third-party providers violate regulations, they expose their clients to a compliance risk. Third-party risk management (TPRM) is intended to help against this.
CIOs see AI prompting new IT hiring, even as boards push for job cuts
CIOs may soon be on the hook for driving cost efficiencies â and possibly enabling layoffs â with AI. Those who canât tie AI to bottom-line results may have a short shelf life, experts warn.
AiSuite: An open-source AI gateway for unified LLM access
Python project from Andrew Ng provides a streamlined approach to working with multiple LLM providers, addressing a significant pain point in the AI development workflow.
What you need to know about Java wrapper classes
Since Java 21, wrapper classes have played an increasingly sophisticated role in Javaâs type system. Hereâs everything you need to know about updates for virtual threads, pattern matching, and more.
US lets China buy semiconductor design software again
The US has rescinded export curbs on critical chip design tools as part of broader agreement on access to rare earth minerals.
Google to give enterprises control over beta Workspace feature rollouts
The company wants to make sure companies can slow walk the arrival of new beta features.
Apple reaches out to OpenAI, Anthropic to build out Siri technology
The companyâs own home-grown efforts to improve its voice assistant have reportedly fallen short.
HPE finalizes Juniper acquisition, forms new AI-centric networking unit
HPE has finally closed its $14B acquisition of Juniper Networks and is combining it and Aruba into a new HPE Networking business unit with a dual-pronged strategy: AI for networks and networking for AI.
North Korean crypto thieves deploy custom Mac backdoor
Researchers warn that recent attack campaigns against Web3 and crypto startups by a North Korean APT group have leveraged a new family of malware written in niche programming language Nim.
© 2025