In the latest Data Revolution Minute, Ep. 21, Pablo dives into the new collaboration project between Snowflake and Anaconda: SnowPark.
Search Results: open source (2071)
In the latest Enterprise AI Minute, Ep 55, Aaron discusses the ethical concerns around chatbots designed to speak for the deceased.
From supply chain software to workforce changes, future cybersecurity trends require closer looks by companies looking to make their systems more resilient.
In this Enterprise AI Minute, Aaron dives into Google Brain’s new text-to-image tool, “Imagen,” and some of its exciting potential applications.
As supply chain complexity has exploded, CISOs need to map out the risk management strategies for their organizations.
In this Cybersecurity Minute, Chris talks about NIST’s updated C-SCRM Guidance based on tasking from the Cyber Executive Order from the President.
Industries are adopting AI but struggle to see real-world applications. Oracle’s Innovation Lab changed that – driving results in construction
In this Cloud Wars Minute, Aaron Back guest hosts to discuss IBM’s real-time AI solution and how it contributes to the cloud future.
These three undeniable trends in the cloud security space are some of the top areas that organizations should focus on.
In this Cloud Database Battleground moment, Jordan Tigani identifies the top reasons that organizations choose to use SingleStore.
With an abundance of cybersecurity tools, vulnerability management can benefit from simplifying the user experience.
With the rise of Industry Cloud and remote care, FHIR interoperability is a critical component to the future of healthcare.
Cloud computing has led to a paradigm shift involving the increased use of Infrastructure-as-a-Code (IaC) through codification.
With a lack of standards for risk assessment, cybersecurity tools may be leading to more confusion when determining risk prioritization.
As the Cloud Database Battleground event approaches, analyst Wayne Sadin shares a message to the incumbent database vendors.
As a new generation of databases emerge, cloud-native technology is what sets these modern databases apart from those of the past.
As the cybersecurity landscape is rapidly changing, these cybersecurity startups are on the rise with the vast adoption of new technologies.
While there are many aspects of implementing effective application security, a key element is implementing secure software development practices for internal application development activities.
Whereas low-code platforms tend to favor visual programming models, traditional programming involves more hand-coding and customization.
In this episode of Cloud Wars Live, Boville discusses the IBM industry-cloud blitz strategy, focus on 4 heavily regulated industries, & more



















