Trending Topics

Professional Services

Insight is the new GOLD

My children will never face the challenges that I did. No television, no personal cell phones, and don’t ask me about my first computer (which…

April 17, 2024 4 minute read
Extend Magellan with transformers

Extend Magellan with transformers

Under the umbrella that is Artificial Intelligence (AI), Natural Language Processing (NLP) has come a long way from symbolic AI emerging in the mid-1950’s, through…

5 minute read

Machine learning in cybersecurity

Machine learning in cybersecurity

Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…

5 minute read

Decomposing the database for microservices

Decomposing the database for microservices

There are many ways to extract functionality into microservices. However, we need to address the elephant in the room—namely, what do we do about our…

5 minute read

Moving from monolith to microservices

Moving from monolith to microservices

We are on the cusp of a revolution in application architecture. According to IDC (International Data Corporation), by 2022, 90 percent of all new applications…

4 minute read

Performance considerations for cloud services provisioning: Value-added services

Performance considerations for cloud services provisioning: Value-added services

In our first blog, I discussed performance parameters for cloud services that were specific to infrastructure. Apart from infrastructure services, though, cloud providers also provide…

3 minute read

Performance considerations for cloud services provisioning: Infrastructure services

Performance considerations for cloud services provisioning: Infrastructure services

In the competitive business world, the responsiveness of business applications plays a vital role in business success. As volumes of business users and transactions grow,…

4 minute read

Managing your digital assets

Managing your digital assets

You’ve no doubt spent lots of time and money creating and curating high-quality digital assets. Now the question is: How do you manage the growing…

2 minute read

Regain control over your corporate data

Regain control over your corporate data

In today’s global economy, business success and growth are affected by rapid changes in market requirements, short innovation cycles and rising demands for internal and…

3 minute read

How to effectively deliver virtual training

How to effectively deliver virtual training

COVID-19 has significantly altered how we deliver and consume training. With companies moving to remote work, many employees are now balancing work and responsibilities at…

3 minute read

Enrich EIM solutions with business intelligence

Enrich EIM solutions with business intelligence

Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…

5 minute read

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

6 minute read

NIST Privacy Framework – The Communicate function

NIST Privacy Framework – The Communicate function

In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this segment, I’m going to focus…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.