Venus ransomware has been active since August 2022. The attack campaign targets Remote Desktop services. Which cybersecurity measures should you take to stay safe?...
I’m using the term web3 in a hopeful way with an expansive definition in mind, one that’s not familiar to most people. When I mention web3, it’d be good if you coul...
Low code development is getting a lot of traction. Low code platform development provides a more accessible (and typically a graphical) interface for developing applicat...
Data loss is a highly possible and ugly eventuality that can befall any business. But you can prevent it by backing up your information before the proverbial rainy day....
Snowflake is one of the most popular cloud data warehouses today. In just one decade, the company has grown to more than 6,800 enterprise customers and $1.2 billion in an...
I received outstanding feedback from many folks in updating the Data Product Development canvas including Jon Cooke, Harsha Srivatsa, Craig (Doc) Savage, Melissa Perry, R...
I have done a lot of writing recently about these many referents and the Agile 2 Academy, with whom I am currently working. I’ve stressed the importance of attaining ...
Blockchain is a method for storing data that makes it harder to hack the system. The business blockchain is a distributed, encrypted database that its authorized users ca...
Banks and financial institutions offer great value and convenience to their end users. However, they are notorious for being susceptible to fraudulent attacks such as cr...