Consistency Enables Findability
The professionals who work to uncover security vulnerabilities in hardware must find a common language for categorizing them. That is the entire purpose of […]
The professionals who work to uncover security vulnerabilities in hardware must find a common language for categorizing them. That is the entire purpose of […]
Reports of data breaches seem to arrive in the news every day. This latest data breach isn’t merely the loss of data; it could […]
Data privacy has always been important. It’s why people put locks on filing cabinets and rent safety deposit boxes. As more of our data […]
It is the end of the year and budgets for next year are in the preparation phase. It is never a surprise when IT […]
Cybersecurity can feel like an annoying gnat as each and every day there are a variety of headlines describing every possibly entity that has […]
Open has many meanings. Open source is software with the source code included. The software developers who support the open source concept believe that by […]
The National Information Standards Organization (NISO) 2020 calendar of educational events contains some real gems. If you are a member, your development budget won’t take […]
Edge computing is the practice of processing data near the edge of the network where the data is being generated, instead of in a centralized data processing […]
The new year predictions run the gamut from both ends of the spectrum, but the one that caught my eye included predictions on how […]
Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment. The general goal or benefit of any cloud migration is to […]