Generative Data Intelligence

Tag: Corporations

Bitmain Antminer E3 ASIC vs the Ethereum mining community

Recently, there was a lot of talk about ASIC, Ethereum, video cards (GPU), AMD and Intel, all in the same breath and all...

How Zendesk and GoCardless place customer support at the heart of their international expansion strategies

If you’re big enough – or growing fast enough – to be developing your international business strategy, eventually you’re going to bump up...

From The Comodo Think Tank: Is the CPU computer from your own computer being used for evil?

Reading Time: 1 minuteThat’s the question that Comodo Director of Technology Fatih Orhan put forth in a new byline article just...

Reach #3: Anna Schlegel, NetApp’s Head of Globalization

In Reach #3, Vasco chats with Anna Schlegel, Head of Globalization at NetApp.You need to remove language as part of the equation… I’m...

Happy New Year 2015! A Letter From Vasco

The following is a letter from Vasco Pedro, CEO of Unbabel. It was written to the team but applies to everyone involved with...

Hollywood Whodunit: Who Hacked Sony?

Reading Time: 3 minutesMysteries are the most popular genre in books, movies and films. Everyone loves to solve a mystery and we now...

Firewall Fundamentals

Reading Time: 2 minutesAt their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you...

OpenSSL Updates Fix Critical Security Vulnerabilities.

Reading Time: 1 minuteOpenSSL, the popular open source implementation of the SSL protocol, has released updates patching nine issues that including several critical...

Cyber War: View Cyber Attacks in Progress

Reading Time: 1 minuteNorse, an internet security firm, monitors internet traffic to identify cyber-attacks in progress. They have created have a very cool...

Cyberwar: US to Battle Chinese Military in Court

Reading Time: 2 minutesThe so called cyberwar between the US and China is about to take an interesting turn that could have significant...

Hacktivism a Growing Concern for IT

Reading Time: 3 minutesThe very existence of the United States as a nation can be traced back to a protest movement against taxes....

Hackers: Why They Do It

Reading Time: 4 minutesNetworks and personal computers are under continuous assault from hackers. The types of attacks vary widely  in complexity and severity,...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?