Most Recent Articles

Agility Versus Security: Is Finding a Compromise Still Necessary in 2019? Agility Versus Security: Is Finding a Compromise Still Necessary in 2019? Agility Versus Security: Is Finding a Compromise Still Necessary in 2019? Agility Versus Security: Is Finding a Compromise Still Necessary in 2019?

It’s time to have a look at agility and security methods, their strength, weaknesses and historical uses, and the newer approaches that...
Five Programming Tools for 2020 and Beyond Five Programming Tools for 2020 and Beyond Five Programming Tools for 2020 and Beyond Five Programming Tools for 2020 and Beyond

The digital universe is changing. What new tools should programmers familiarize themselves with to keep up with the times?
IoT and Drug Adherence: Different Approaches to Connected Solutions IoT and Drug Adherence: Different Approaches to Connected Solutions IoT and Drug Adherence: Different Approaches to Connected Solutions IoT and Drug Adherence: Different Approaches to Connected Solutions

Learn how IoT innovations provide new ways to track and foster prescription compliance.
Azure Week: Key Learnings and Deep Expertise From the Azure Experts Azure Week: Key Learnings and Deep Expertise From the Azure Experts Azure Week: Key Learnings and Deep Expertise From the Azure Experts Azure Week: Key Learnings and Deep Expertise From the Azure Experts

Learn more about Azure Week, which will take place online from October 14-18, 2019.
Functional Programming Languages: Past, Present and Future Functional Programming Languages: Past, Present and Future Functional Programming Languages: Past, Present and Future Functional Programming Languages: Past, Present and Future

Learn how functional programming languages emerged from the academic context and are now finding a lot more practical applications.
How Cloud Computing is Changing Cybersecurity How Cloud Computing is Changing Cybersecurity How Cloud Computing is Changing Cybersecurity How Cloud Computing is Changing Cybersecurity

Cloud security is a serious issue; how has the cloud changed the cybersecurity game?
Are Your Enterprise Printers Protected from Cybercriminals? Are Your Enterprise Printers Protected from Cybercriminals? Are Your Enterprise Printers Protected from Cybercriminals? Are Your Enterprise Printers Protected from Cybercriminals?

Learn why enterprise printers have curiously become one of the top concerns for cybersecurity defense.
Can AI Have Biases? Can AI Have Biases? Can AI Have Biases? Can AI Have Biases?

Learn from these seven instances in which AI is deliberately used to exclude certain categories or in which it simply reflects the bias...
Job Role: Machine Learning Engineer Job Role: Machine Learning Engineer Job Role: Machine Learning Engineer Job Role: Machine Learning Engineer

A look at the role of a machine learning engineer
The 5 Most Important Blockchain Programming Languages You Must Learn Before 2020 The 5 Most Important Blockchain Programming Languages You Must Learn Before 2020 The 5 Most Important Blockchain Programming Languages You Must Learn Before 2020 The 5 Most Important Blockchain Programming Languages You Must Learn Before 2020

Don't waste any more time, and learn what programming languages you need to master to work with blockchain as soon as possible.