Slides: Moving from a Relational Model to NoSQL from DATAVERSITY To view just the On Demand recording of this presentation, click HERE>> This webinar is sponsored by: About the Webinar Businesses are quickly moving to NoSQL databases to power their modern applications. However, a technology migration involves risk, especially if you have to change your […]
Webinar: Moving from a Relational Model to NoSQL
To view just the slides from this presentation, click HERE>> This webinar is sponsored by: About the Webinar Businesses are quickly moving to NoSQL databases to power their modern applications. However, a technology migration involves risk, especially if you have to change your data model. What if you could host a relatively unmodified RDBMS schema […]
Cyberwarfare, Ethical Hacking, and Ransomware: 2021 Predictions
Click to learn more about author Casey Ellis. Although there was an increase in cyberattacks and misinformation in 2020 as malicious actors sought to capitalize on the pandemic and presidential election, this new threat landscape also led to a business boom for crowdsourced security as organizations looked for ways to strengthen their security posture. As […]
What Can Enterprises Do After a Ransomware Attack?
Click to learn more about author Evelyn Johnson. There were 199.7 million ransomware attacks in just the last four months. That’s nearly 25 attacks per second. The recent surge in cybercrime is being attributed to the increased digitization caused by the COVID-19 pandemic. Businesses have moved online in the last few months, and online criminals […]
What Is Data Preparation?
Data preparation describes the process of getting data ready for use in analytics. In the past, data preparation was a time-consuming task handled by the IT team, involving “data extraction, transformation and loading (ETL), access to data warehouses and data marts, and lots of complicated massaging and manipulation of data across other data sources,” says […]
The Three Most Dangerous Ransomware Delivery Vectors: RDP, VPN, and Phishing
Click to learn more about author Gerry Grealish. Successful attacks using ransomware have proliferated so much that some security researchers are developing viable second careers as “ransomware negotiators,” bargaining with attackers who hold corporate data hostage. Creative — and convincing — ransomware approaches have flourished during the lockdown era, with industry experts noting a 72 […]
2021: Three Game-Changing Data Modeling Perspectives
Click to learn more about author Thomas Frisendal. Common wisdom has it that we humans can only focus on three things at a time. So, I had to cut down my January 2021 list of things of importance in Data Modeling in this new, fine year (I hope)! Looking at them from above, as we […]
Why Is It Such a Challenge to Integrate Security into DevOps?
Click to learn more about author Anastasios Arampatzis. DevOps is transforming how organizations develop software faster. DevOps utilizes agile methodologies to integrate and streamline the software development and operations process. The result is faster time to market and a more efficient development process. However, DevOps processes are challenging the way security integrates with fast development […]
2021 Predictions: Powering Web 3.0, Lean AI, Post-COVID Business, and More
Click to learn more about author Manjusha Madabushi. It’ll be difficult for the events of any New Year to match the astronomical changes that took place over the past 12 months. Nevertheless, 2021 will surely see a number of developments that, although less momentous, will prove highly significant for the core areas of Data Management […]
Graph Databases: Updates on Their Growing Popularity
Graph databases became recognized as a database design in 2006, when Tim Bernes-Lee developed the concept of a huge database called the “linked data.” This concept became the basis of graph storage, and could display how organizations, people, and items or entities are associated, or “interconnected” with one another, and the nature of the relationships. […]