CATEGORY

TECHNOLOGY

Consent Phishing: What It Is, And How To Defend Yourself

Consent phishing, what it is, and how to defend yourself. The "consensus phishing" is the latest hacker gimmick: the user himself opens the doors...

IT Security Trends: What Security Officers Will Have To Prepare For In 2021

2020 was not only a turbulent year from the IT security perspective. Security officers will continue to be busy securing existing remote workplaces in...

Making Unstructured Data Usable – This Is How It Works!

Numbers and data sets don't even cover half of an organization's knowledge. Companies can gain new insights and make better decisions by looking at...

Big Data And Social Research: Methodological And Theoretical Implications

The progressive use of big data in social research must be supported by plural and interdisciplinary epistemological framework, which allows to include new data...

Multi-Cloud Management: The Top 5 Database Capabilities

Multi-cloud environments are impractical without transparent, flexible, and high-performance database platforms. A database for multi-cloud management should bring these five key skills. Multi-cloud computing is...

5G – The BackBone For Digitization?

Each previous generation of cellular technology has enabled new types of applications that have enriched and changed our lives. The new generation of mobile...

3D-printing And The Future Of Housing

According to the United Nations Habitat, "by 2030, three billion people will need improved housing." Given that governments around the world are focused on...