• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:data

Culturally intelligent tech: Enhancing emotion recognition worldwide

General | May 7, 2024

Culturally intelligent tech: Enhancing emotion recognition worldwide

In a time when technology permeates every aspect of our lives, the advancement of AI...

Top tips: Benefits of data backup and recovery

General | March 28, 2024

Top tips: Benefits of data backup and recovery

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

World Backup Day: Tips for a successful small business backup strategy

General | March 28, 2023

World Backup Day: Tips for a successful small business backup strategy

In today's digital economy, businesses have access to more data than ever. As newer...

Five worthy reads: Your data costs you more than you know

General | September 9, 2022

Five worthy reads: Your data costs you more than you know

Illustration by Dhanwant Kumar Five worthy reads is a regular column on five noteworthy...

Gain insights into user behavior and detect insider threats

Identity and access management | March 6, 2019

Gain insights into user behavior and detect insider threats

A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...

Five worthy reads: Data security is taking the world by storm

General | April 27, 2018

Five worthy reads: Data security is taking the world by storm

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Identity and access management | December 28, 2017

Preparing for the GDPR: Designing Active Directory groups

One aspect of the GDPR is the fact that all users who have access to personal data must be...

Identity and access management | August 24, 2017

Ransomware basics: Part 1

There are many articles on ransomware. Many are trying to convince you that if you buy the...

Securing content located in a distributed file system

ADManager Plus | December 4, 2015

Securing content located in a distributed file system

A distributed file system (DFS) is used to “mask” the location of content that is shared...

General | November 19, 2012

Is Big Data Right for Your Business? President Obama Thinks So.

When I attended Duke University’s Fuqua School of Business in the late 90s, one of my...

NetFlow Analyzer | January 29, 2010

Data storage patterns in NetFlow Analyzer

If you use or are evaluating NetFlow Analyzer, you may want to know how the product stores...