Rij toevoegen
Element toevoegen
kropper
update
Noorder Kempen Zakelijk
update
Element toevoegen
  • Thuis
  • ...
    • Medisch & Zorg
    • Agrarisch & Landbouw
    • Bouw & Renovatie
    • Detailhandel & Retail
    • Horeca & Toerisme
    • Industrie & Techniek
    • Logistiek & Transport
    • Zakelijke dienstverlening
    • Onderwijs & Vorming
    • ICT & Innovatie
    • Vastgoed
    • Vrije beroepen & Creatieve sector
    • bevolkingsgegevens
September 03.2025
3 Minutes Read

How Tesco's Legal Battle with Broadcom Over VMware Licenses Impacts Retailers

VMware sign overlaid with scissors, symbolizing legal issues.

What Is at Stake for Tesco in Its Legal Battle with Broadcom?

The recent legal actions taken by Tesco against Broadcom have raised concerns that reach far beyond just financial implications. The British supermarket chain has initiated a lawsuit due to a dispute over VMware licenses and support contracts, which threatens the integrity of its extensive IT infrastructure. By acquiring perpetual licenses for VMware products, Tesco believed it had secured a stable foundation for its digital operations, only to find that Broadcom's takeover of VMware has drastically altered the terms of their agreement.

Understanding VMware and Its Importance to Tesco

VMware technology plays a crucial role in Tesco, supporting approximately 40,000 virtual workloads that facilitate everything from checkout systems to logistics management. As retailers increasingly rely on advanced technology for their operations, the consequences of interrupted software support become severe. Without timely updates and security patches from VMware, Tesco risks operational disruptions that could impact its stores and distribution centers.

Legal Precedents: Are Other Companies Facing Similar Challenges?

This situation is not unique to Tesco. Other corporations, including AT&T and Siemens, have also taken legal action against Broadcom for related issues. For instance, a recent ruling by the Hague District Court ordered Broadcom to continue supporting the Dutch authority, Rijkswaterstaat, even after the licensing model changed. These legal precedents indicate a growing trend among companies pushing back against corporate policies that jeopardize their existing contracts and necessitate additional financial burdens.

Understanding the Financial Implications

In Tesco's case, the supermarket is seeking a minimum of £100 million in damages. This figure reflects the potential financial harm arising from the interruption of its IT services. The change from perpetual to subscription-based licensing has provoked threats of double payments for services that, according to Tesco, were already covered by their original agreements. Such disputes highlight the increasing complexity of software licensing in an industry where technology is crucial.

The Shift to Subscription Models: Benefits and Risks

While subscription models like the one introduced by Broadcom offer ongoing service and updates, they can also lead to increased costs—sometimes doubling the expenses for companies accustomed to one-time license fees. According to the latest reports, Rijkswaterstaat expects its annual costs for VMware services to surge from 2.1 million euros to 4 million euros under the new model. As more dissatisfied clients contemplate switching to alternative platforms like Nutanix or OpenStack, they face daunting challenges, particularly concerning migration and training expenses.

What’s Next for Tesco and Broadcom?

In light of ongoing legal disputes, Tesco is likely to continue using its lawsuit as leverage in negotiations with Broadcom. Companies must maintain a vigilant approach to technology contracts, ensuring that they safeguard their interests against policy shifts that could threaten operational continuity. As companies modernize their IT infrastructures, they must weigh the benefits against potential risks of abrupt changes in licensing policies.

Legal action is increasingly seen as a necessary tool for companies desperate to negotiate fair terms in a rapidly changing tech landscape. In this case, failure to preserve existing agreements could leave major corporations vulnerable to operational disruptions that can significantly impact their business.

Call to Action: Stay Informed and Prepared

As companies like Tesco fight to secure their rights and interests in contractual agreements, it's essential for businesses in all sectors to review and understand the implications of their technology contracts. Ensure you have a plan for potential changes and prepare for negotiations to safeguard your operational needs.

Medisch & Zorg

2 Views

0 Comments

Write A Comment

*
*
Related Posts All Posts
10.31.2025

Navigating the AI Startup Landscape: From Fake Buzz to Real Growth

Update From Hype to Reality: Navigating the AI Startup Landscape The excitement surrounding artificial intelligence (AI) is palpable. European startups raising €3 billion in the first half of 2025 is a testament to the transformative potential of AI. Yet, amidst the fervor, a critical question emerges: How much of this investment is genuine and how much is merely smoke and mirrors? As the phrase "AI First" becomes ubiquitous, entrepreneurs and consumers alike must discern meaningful innovations from hollow promises. The Problem with 'Fake AI' This phenomenon isn't new; technology hypes often lead to an influx of companies using buzzworthy terms to attract funding without substantial backing. Startups labeling themselves as AI-driven may merely gloss over traditional processes with AI-like functionalities, leading to skepticism in the market. A glaring example includes Builder.ai, which claimed revolutionary capabilities but faltered when scrutinized due to relying on extensive manual code generation. The term 'Fake AI' describes this troubling trend, where the tech world confuses marketing gimmicks with actual AI advancements. Such practices can lead to disillusionment among investors and customers, who may feel misled when expectations do not match the delivered product. Identifying Genuine Innovations: What to Look For Recognizing which AI startups are worth the hype involves assessing their foundational value. Startups that fearlessly confront real-world problems and provide innovative solutions grounded in data and technology are the ones most likely to succeed. These companies understand the importance of building on a robust technological foundation that includes critical elements such as infrastructure, talent acquisition, and ethical data management. Investors are advised to seek startups with clear, well-defined AI applications. Understanding the unique value propositions and how proposed solutions leverage AI effectively are key factors in identifying potential winners in this evolving landscape. The Importance of Infrastructure and Talent in AI Development To flourish, AI startups require fertile ground, which includes strong infrastructure and skilled talent. Low-code platforms and collaborations with established AI experts can help nascent companies navigate the early stages while ensuring they maintain a competitive edge. Coupled with effective funding strategies, successful AI ventures also need a focused approach that prioritizes specific sectors or niches over generic solutions. Furthermore, if you're an aspiring entrepreneur in the AI realm, it's crucial to invest in acquiring data responsibly and ensuring its quality; a misstep in data management can impair the efficacy of AI models and taint your outcomes. Adopting a forward-thinking strategy, including regular audits and iterative feedback, can boost performance and reliability in delivering AI solutions. Genuine Progress: The Need for Ethical Considerations In the quest for success, ethical considerations must not take a backseat. Startups that prioritize accountability, privacy, and fairness stand to build trust. Engaging with regulatory frameworks and proactively addressing ethical dilemmas will not only enhance credibility but also shield companies from potential repercussions including fines and brand damage. The moral responsibility that accompanies AI development cannot be understated. By being transparent and striving for ethical integrity in their operations, AI startups can foster meaningful connections with stakeholders and clients alike. The Blooming Landscape of AI Solutions As more genuine AI solutions emerge, businesses within sectors such as healthcare, finance, and logistics are poised to benefit. With applications ranging from predictive analytics to personalized customer experiences, the potential applications of AI are almost limitless. Embracing this new frontier entails being vigilant about discerning the true from the false and engaging with innovations that promise authentic value. AI, while still in its early stages, demonstrates the capacity to revolutionize industries when properly harnessed. As an entrepreneur, your challenge lies in cultivating genuine AI prospects that will ultimately define the future growth of your venture. Final Thoughts: Seizing the AI Opportunity The AI sector is ripe with opportunity, but success entails more than just financial backing; it requires a commitment to innovation, ethical practices, and the establishment of a strong value proposition. By focusing on creating genuine solutions and using the right strategies to tackle challenges head-on, startups can extract real growth from the hype. As you consider your journey in this vibrant landscape, remember: not all flowers bloom alike. Embrace the true potential of AI and strive to cultivate solutions that will thrive in the marketplace.

10.29.2025

Revolutionizing Cybersecurity: Understanding Cortex AgentiX AI Update

Update Transforming Security with AI: The Launch of Cortex AgentiX Palo Alto Networks has just made headlines with its latest updates, prominently featuring its new Cortex AgentiX platform. This innovative upgrade not only revitalizes its security offerings but also takes a significant leap forward in automating and enhancing cybersecurity measures. As industry leaders highlight, AgentiX represents the next iteration of Security Orchestration, Automation, and Response (SOAR), making automated investigations more efficient and effective. Understanding the New Features of Cortex AgentiX Cortex AgentiX is poised to replace the older Cortex XSOAR. The platform is designed to be more intuitive and powerful, allowing for the integration of customizable AI agents tailored to specific cybersecurity tasks. Palo Alto's CEO, Nikesh Arora, emphasized the importance of this transition, stating that AgentiX can conduct automated investigations by leveraging AI and machine learning capabilities. Businesses can choose from existing agents focused on Threat Intelligence, Email Investigation, and more while enjoying the freedom to build their own using a straightforward no-code environment. AI-Driven Solutions for Modern Cyber Threats The shift towards AI-driven technology is imperative as the digital landscape evolves. The transformation stems from a need for more robust security measures. Cortex AgentiX has been engineered using data from over 1.2 billion real-world playbooks, ensuring that it can handle both known and unknown threats effectively. With the ability to analyze vast amounts of data swiftly, it empowers security teams to respond to incidents more proactively, thus minimizing risks. Cloud Security Enhancements: Cortex Cloud 2.0 Accompanying the launch of Cortex AgentiX is the upgraded Cortex Cloud 2.0. This release underscores the growing complexities of cloud security, addressing challenges faced by organizations in managing hybrid environments. A crucial feature of this update is the integrated Cortex AgentiX, which allows security personnel to delegate mundane tasks to AI agents. By optimizing processes, Cortex Cloud 2.0 ensures that skilled professionals can focus on more significant threats. Prisma AIRS 2.0: Securing AI Technologies Additionally, Palo Alto Networks unveiled Prisma AIRS 2.0, aimed at maintaining the security of AI technologies used by clients. With the integration of capabilities gained from the acquisition of Protect AI, this platform is focused on inspecting AI models and their applications. This proactive stance ensures not only the defense of AI-operated systems but also the detection and mitigation of potential vulnerabilities from their inception to deployment. A Security Platform for the Future Palo Alto Networks envisions AgentiX as an 'industry platform,' designed not only for their own ecosystems but also capable of connecting smoothly with other platforms. This open approach enables organizations to enhance their security across multiple environments, which is vital as businesses increasingly rely on diverse technologies. Conclusion: Embracing Change for Enhanced Security As cybersecurity threats evolve, so must our approaches to defending against them. The updated platforms by Palo Alto Networks lay a strong foundation for organizations to build upon. With the ability to create customized automated processes and an emphasis on AI, businesses can capitalize on these advancements to bolster their security posture. The advancements made with AgentiX, Cortex Cloud 2.0, and Prisma AIRS 2.0 collectively signify an exciting era where AI not only assists but revolutionizes the way we think about cybersecurity. If you are curious about integrating advanced AI solutions into your security framework or want to stay informed about the latest in cybersecurity technology, now is the perfect time to explore these new offerings and how they can benefit your organization. Take charge of your cybersecurity strategy today!

10.27.2025

NIS2 Forces Companies to Prioritize Supply Chain Cybersecurity: Are You Ready?

Update The Growing Threat: Cybersecurity and the Supply ChainThis year has shown just how vulnerable supply chains are to cyberattacks, with British retailers like Marks & Spencer and Co-op suffering significant losses. These incidents highlight a critical lesson: cybersecurity doesn’t stop at your front door. In today's interconnected world, organizations in the Netherlands and beyond must acknowledge that their security relies heavily on their entire ecosystem, including suppliers, service providers, and other third-party players.As cybercriminals evolve, they are no longer breaking in through the front but instead are sneaking in through the backdoor of inadequately secured supply chains. This reality poses a serious risk to businesses, as a failing in one segment of the supply chain can lead to catastrophic consequences for the entire operation.NIS2 Directive: A New Approach to ResponsibilityThe introduction of the NIS2 Directive emphasizes supply chain accountability, which mandates businesses in essential sectors, like energy and healthcare, to ensure robust cybersecurity not just internally but across their supply chains. The era of merely securing one’s own systems is over.NIS2 requires organizations to have a clear understanding of who has access to their systems, what rights these external parties possess, and how that access is secured. However, many companies struggle with this, often lacking proper monitoring and established agreements with third-party vendors.Understanding Hidden Threats within Supply ChainsIn a recent study by Arctic Wolf, a staggering 62% of new clients encountered previously undetected threats linked to their suppliers, often stemming from unauthorized access, outdated software, or abnormal network activity. For instance, retailers Jumbo and HEMA faced significant disruptions due to a ransomware attack on Blue Yonder, a software provider responsible for their supply chain management. The incident starkly illustrated that vulnerabilities can arise from a company’s partners rather than from direct attacks.AI’s Role in Amplifying Supply Chain RisksAs technology evolves, so do the risks. With the rise of generative AI, attackers find new ways to blend in and manipulate unsuspecting employees. Phishing attacks become increasingly convincing, while deepfake technology can impersonate trusted figures, leading to disastrous security breaches. Organizations with teams working remotely are especially susceptible to these tactics, making the need for rigorous training and heightened awareness among all staff paramount.Evolving from Basic Security Measures to Comprehensive StrategiesImplementing basic security practices like multi-factor authentication and regular penetration tests is essential, but they only scratch the surface of what is needed. Companies must pivot to instill a culture of security that extends throughout the supply chain. This includes clearly defined policies that dictate how external parties can access systems, protocols for the vetting of third parties, and real-time monitoring to detect unusual behavior.By fostering collaboration across the supply chain, organizations can not only meet compliance requirements under NIS2 but enhance their overall resilience to cyber threats.What Lies Ahead: Strategic Adaptations for Supply Chain SecurityThe goals of the NIS2 Directive signal a shift in how organizations must strategize their cybersecurity efforts. As outlined by Bitsight and EY, companies are encouraged to conduct thorough assessments of their suppliers and implement security measures that reflect the level of risk each presents. Regular audits, clear incident reporting, and continuous monitoring of digital landscapes are essential steps toward creating a resilient supply chain.Organizations must remain agile, ready to adapt to evolving threats, and take a proactive stance on cybersecurity. As the landscape changes, so too must their strategies to safeguard not just their internal operations but the entire ecosystem within which they operate.

Terms of Service

Privacy Policy

Core Modal Title

Sorry, no results found

You Might Find These Articles Interesting

T
Please Check Your Email
We Will Be Following Up Shortly
*
*
*