Learn from the recent major outage affecting IT and Security teams worldwide. Discover essential steps for rigorous system assessments, risk management, and business continuity planning to enhance your organization's security posture.
Uncover the risks of openwashing in AI tools like ChatGPT. Learn about the Linux Foundation's new tools for ensuring model transparency and protecting your interests.
We’re excited to add new new expert consultancy offerings focused on helping data-driven companies unleash the velocity and power of modern data-centric systems at scale. Our goal for this practice is to make life easier…
Agile methodologies are now recognized as a structured way to work through ambiguous and complex software problems with evolving solution requirements. Practices such as sprints, backlogs, timeboxing, scrum, can be applied in a variety of…
The recent news from Wall Street about the merger of two of the original “big data” companies, Cloudera and Hortonworks (now called “Cloudera”) made a lot of noise across the Big Tech Finance marketplace, certainly here in Silicon Valley. But…
The good news about modern virtualization technologies like KVM (Kernel-based Virtual Machine) and containers (e.g., LXC) is that you get almost limitless options for spinup and teardown of clusters, machines, networks and so on. That’s also the bad…
Note: This is part two of a two-part series on Amazon EKS. ICYMI, here's a comprehensive intro overview get you up top speed on EKS: “Ten things to know about Kubernetes on AWS”.) By this…
Note: This is part one of a two-part series on Amazon EKS; to see a more in-depth review and recommendations, see Part II: “Figuring out if Kubernetes on AWS (EKS) is right for you”
This is true: big data is cheaper and faster, but harder; data scientists have the skills, and are in great demand. True, but only partially. Yes, data scientists make a huge difference, but if only they have the…
A new tool is available for those who would benefit from automated penetration testing and who don’t have the internal know-how or resources to deal with the problem of security testing for their web or…
What comes after Big Data? Bigger data. Demands on data scientists are growing even faster. They need to the resources and tools to make ever more effective use of their time. Expanding Data Engineering holds…
By this time the swarm of emails related to GDPR (General Data Protection Regulation) has slowed down since it first went into effect on 25 May 2018. From this date, non-compliance with the regulation may…
GDPR - it’s a new buzzword we keep hearing nowadays. While it was initially addressed towards big players like Facebook, Google and LinkedIn - it also affects small businesses. If you’ve had the chance to…
The boundaries are blurring between software-as-a-service and application design. It’s not just about the consistency in separation of the front end of the back end. For your SaaS platform the best practices for well structured code apply as much…