SAP’s new product, the SAP Datasphere, is a business data fabric architecture that provides data federation, data lakes, and data warehouses while preserving context.
Search Results: cloud database (1120)
CEO Safra Catz and CTO Larry Ellison have recently laid out a new strategy for Oracle that includes artificial intelligence and machine learning.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.
Revolut tapped Couchbase software to help it fight evolving fraud attacks. The app it developed fought fraud and much more, netting millions in savings.
Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.
AI and automation can protect against financial and reputational losses from data theft and ransomware in financial software, writes Bill Doerrfeld.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
A data governance framework is critical for an organization’s cybersecurity strategy. Frank Domizio explains why.
Data security strategy must go beyond securing a company’s data and employees to protect every data channel and counterparty. Wayne Sadin presents guidelines for managing third-party data risks.
Kieron Allen reviews a Databricks Lakehouse platform extension that lets developers build apps leveraging Databricks and Visual Studio functionality.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Bob Evans shares how SAP is taking on the ultimate transformation, after Hasso Plattner, Founder and Chairman, steps down from the company.
A power shift is taking place at SAP as founder and chairman Hasso Plattner steps down, allowing CEO Christian Klein to fully takeover as the single driving force behind SAP.
GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.
Prof. Wil van der Aalst explores current and potential use case for the latest form of the process mining technology he invented. He sees a bright future in supply chains and manufacturing.
The “object centric” upgrade to process mining that Celonis launched last year streamlines analysis of both internal and supply chain apps.
AI collects a lot of data, but it’s hard for many people to utilize, which is where augmented reality as a real-time, on-prem interface could supercharge its utility.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.