Christine Taylor

The Threat of Shadow IT: Protecting Data from Loss and Exposure

The term “Shadow IT” screams spy stories: secret agents chasing each other through the streets of Munich and mysterious organizations disrupting global data flows. Well, the second image...

Protecting Container Data from Itself

Containers are virtualized but not by hypervisors. They can be deployed to a VM but are not VMs. Both containers and VMs use server/host OS as the bottom...

Artificial Intelligence Impacts Business: the AI-Business Revolution

Artificial intelligence and business, it seems, is a marriage that is all but inevitable. Artificial intelligence is intelligence built into computing systems, or as MIT professor Marvin...

AI and Logistics is Transforming Business

Artificial intelligence and logistics is the perfect union for businesses seeking a competitive edge – and a necessary combination for companies hoping to compete in the future. Let's...

Machine Learning vs. Deep Learning

Machine learning vs. deep learning isn’t exactly a boxing knockout – deep learning is a subset of machine learning, and both are subsets of artificial intelligence (AI)....

Data Structure

                Data structures are computer programs that optimize how a computing process manages information in memory. Data structures often build on each other to create new structures, and programmers can adopt those structures...

Unstructured Data

Unstructured data represents 85% or more of corporate data. Textual unstructured data includes word processing, presentations, video and audio files, email, chat, and social media postings. Machine...

Big Data Architecture

Big data architecture is the foundation for big data analytics. Think of big data architecture as an architectural blueprint of a large campus or office building. Architects...

Cloud Computing and Service Level Agreements (SLAs)

A service level agreement (SLA) is a technical services performance contract. SLAs can be internal between an in-house IT team and end-users, or can be external between...

Cloud Computing Governance and Compliance

Cloud computing governance and compliance is critically important for a key reason: cloud computing impacts so many aspects of our business and personal lives. As consumers, we...

Latest Articles