February 02, 2021
The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all identity theft attacks as well as aid in security operations analysis of potential threats. Read more â¶
As people around the world receive their Covid-19 vaccinations, we look at the role IT has played in the rollout. Read more â¶
Rules engines and the rules-based formulation of analytics logic can prove useful for IoT digital twin application development, especially in scenarios where data analysts lack object-oriented programming experience. Given the wider trend to short-cut via low-code & no-code, what accelerators should we think about using next? Read more â¶