Automated Digital Revolution While the exact moment it began is up for debate (opinions vary wildly on the matter, from the late 1940s to the early 1980s), the digital revolution continues to have a profound effect on our present-day society.
Traditional Enterprise Storage Back in 2003, Chris Pinkham and Benjamin Black, two engineers working for Amazon.com, proposed a dramatic overhaul of the company’s computing infrastructure. In a paper written for CEO Jeff Bezos, the pair envisioned a new system that
Best Practices in Disaster Recovery Hope for the best, prepare for the worst, and expect to be surprised. While that bit of proverbial wisdom certainly isn’t new, it seems almost tailor made for anyone dealing with disaster recovery (DR) in
Tech Energy Sector We’ve discussed here in the past how cleantech (a blanket term that includes technologies that affect recycling, renewable energy, transportation, and others) is moving energy efficiency into the cloud, and how there are many very well-known technology
Improving Endpoint Security Bottom Line: Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have cybersecurity goal for next year. Cyberattacks are growing
Smart Pills and IoT It stands to reason that the medical industry would be the most likely place for groundbreaking and disruptive tech advancement. An aging baby boomer population—a huge slice of America as we know it—is seeking to prolong
Are you a CxO or Thought leader working with a reputable company and looking for free profile exposure? If so, get in touch!
Click here to explore Interactive Map with Localized Data In recent years, we’ve seen a bipartisan focus on criminal justice reform in the U.S., but to measure progress—and understand the breadth of the issue—we need data on who is being incarcerated
Securing Multi-Cloud Manufacturing Systems Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing
Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal breaches. In other instances, hackers
Digital Infrastructure National Interest When the Internet was born, it promised a form of democracy and guarantee that everybody could be part and setup their company to contribute and make the Internet better. Today – a few giants from one