Consent Phishing: What It Is, And How To Defend Yourself
Consent phishing, what it is, and how to defend yourself. The "consensus phishing" is the latest hacker gimmick: the user himself opens the doors...
IT Security Trends: What Security Officers Will Have To Prepare For...
2020 was not only a turbulent year from the IT security perspective. Security officers will continue to be busy securing existing remote workplaces in...
Making Unstructured Data Usable – This Is How It Works!
Numbers and data sets don't even cover half of an organization's knowledge. Companies can gain new insights and make better decisions by looking at...
Big Data And Social Research: Methodological And Theoretical Implications
The progressive use of big data in social research must be supported by plural and interdisciplinary epistemological framework, which allows to include new data...
Multi-Cloud Management: The Top 5 Database Capabilities
Multi-cloud environments are impractical without transparent, flexible, and high-performance database platforms. A database for multi-cloud management should bring these five key skills.Multi-cloud computing is...
5G – The BackBone For Digitization?
Each previous generation of cellular technology has enabled new types of applications that have enriched and changed our lives. The new generation of mobile...
3D-printing And The Future Of Housing
According to the United Nations Habitat, "by 2030, three billion people will need improved housing." Given that governments around the world are focused on...
Why Amazon And Google Know Us Better Than We Do
Artificial intelligence is already in significantly more everyday objects than we think. Intelligent algorithms filter and control our purchasing behavior - and also make...
Even More AI On The IPhone
A few years ago, artificial intelligence was still a dream of the future. In the 80s, Knight Rider was one of the most popular...
Hybrid Cloud Backup – More Security And Flexibility
Replication In The Cloud Shows Its Strengths, Particularly In The Case Of Ransomware Attacks For backup & recovery, many companies trust their own data centers...