7 on-the-ground big data strategies for 2021

7 on-the-ground big data strategies for 2021

Don’t forget the routine tasks that make big data work for your company. Image: Vasyl Dolmatov/iStockphoto While most companies have focused on training staff and understanding big data technologies, a majority have yet to focus on the more routine tasks surrounding big data—such as, how to ensure that everyone who is supposed to have access to the data does, that corporate investments are appropriately portfolioed so the company has visibility of its entire big data…

Read More

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 2 – Docker Blog

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 2 – Docker Blog

It’s end of year round up time! The first post in this series covered the number 10-6 most viewed Docker blog posts. If you were wondering what the #1 most viewed blog post of the year was, then keep reading. The suspense will soon be over…  5) How to Develop Inside a Container Using Visual Studio Code Remote Containers VS Code is another beloved tool. This guest post from Docker Community Leader Jochen Zehnder included…

Read More

“One for the Books”: Health IT Leaders Share Their Biggest Takeaways from 2020 | healthsystemcio.com

“One for the Books”: Health IT Leaders Share Their Biggest Takeaways from 2020 | healthsystemcio.com

Saad Chaudhry, CIO, Luminis Health Ryan Witt, Managing Director, Healthcare, Proofpoint It goes without saying that the Covid-19 pandemic affected every major industry. Some — like restaurants and airlines — suffered, while others (like home gyms and tent vendors) thrived. For healthcare IT, however, it proved to be the ultimate litmus test. And while some organizations passed with flying colors, for many, the need to rapidly shift to virtual health and remote work uncovered a…

Read More

Every connectivity lesson shapes a life in public safety

Every connectivity lesson shapes a life in public safety

Every connectivity lesson shapes a life in public safety | 2020-12-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Closing the cyber skills gap requires a culture of continuous learning

Closing the cyber skills gap requires a culture of continuous learning

Closing the cyber skills gap requires a culture of continuous learning | 2020-12-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Cybersecurity: 4 key areas that IT leaders need to address

Cybersecurity: 4 key areas that IT leaders need to address

Collaboration between organizations and even countries might be the only way to have a positive impact on cybercrime, according to one expert. Image: Getty Images/iStockphoto Ken Xie, founder, chairman of the board and CEO at Fortinet, does not pull any punches in his World Economic Forum commentary Four key challenges for cybersecurity leaders. He starts the post with these points: Cybersecurity must be built into every product and system; Achieving this will pose four challenges for…

Read More

Top Ten Insights – Lessons from Teaching Cybersecurity: Week 13

Top Ten Insights – Lessons from Teaching Cybersecurity: Week 13

As I mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python course aimed at high school students that I’m teaching weekly….

Read More

Acceso Remoto Seguro: Por que hay que hacerlo bien

Acceso Remoto Seguro: Por que hay que hacerlo bien

Con la llegada de COVID-19  las organizaciones de todo el mundo fueron obligadas a hacer la transición de sus empleados a trabajar desde casa, en un momento en que la infraestructura de red de las organizaciones es más compleja que nunca. Esta complejidad no es única de los entornos de IT. De hecho, las máquinas […]… Read More The post Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien appeared first…

Read More

Sovereign citizens: Threats and law enforcement responses

Sovereign citizens: Threats and law enforcement responses

Sovereign citizens: Threats and law enforcement responses | 2020-12-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Boosting gender diversity in cybersecurity

Boosting gender diversity in cybersecurity

Boosting gender diversity in cybersecurity | 2020-12-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2,450 2,451 2,452 2,453 2,454 2,541