The COVID-19 pandemic remains fresh in our memories as it affected many aspects of our lives. Cyberspace is no exception. With the imperative need to stay safe, individua...
An interview with Brenden Bartholomew, President of Vector Aerial, on the use of drones in both military and civilian contexts, as well as a discussion about how Drone AI...
In the first part here, I discussed missing, outdated and unobserved data, data that is costly to produce, as well as dirty, unbalanced and unstructured data. This second...
Every business wants to be competitive. But most organizations ignore digital transformation. Who can blame them? Digital transformation (DX) is not simple. In fact, it i...
Announcements As cybersecurity risks evolve, it’s more important than ever for organizations to be aware of emerging threats and developments. In the four-day Comb...
Every business wants to be competitive. It is not uncommon for most organizations to ignore digital transformation and stick to their old business ways. And who can blame...
IT administrators have used failure metrics for decades to track the reliability and performance of their infrastructure, whether it be PC hardware, networks, or servers....
How to fix various data issues in a few simple steps? In this first part, I discuss missing, outdated and unobserved data, data that is costly to produce, as well as dirt...
Announcements Achieving endpoint visibility to ward off the threat of a breach has never been more important than it is in the age of data proliferation and hybrid workpl...