There’s no such thing as bad data, Pablo Moreno argues, but it’s up to humans to govern AI-generated output to drive long-term data value
Search Results: open source (2084)
Pablo Moreno explains the different states of data, and the best strategies for securing each one.
Security leaders need to be mindful of the range of activities relating to building secure software.
In the latest Data Revolution Minute, Ep. 21, Pablo dives into the new collaboration project between Snowflake and Anaconda: SnowPark.
In the latest Enterprise AI Minute, Ep 55, Aaron discusses the ethical concerns around chatbots designed to speak for the deceased.
From supply chain software to workforce changes, future cybersecurity trends require closer looks by companies looking to make their systems more resilient.
In this Enterprise AI Minute, Aaron dives into Google Brain’s new text-to-image tool, “Imagen,” and some of its exciting potential applications.
As supply chain complexity has exploded, CISOs need to map out the risk management strategies for their organizations.
In this Cybersecurity Minute, Chris talks about NIST’s updated C-SCRM Guidance based on tasking from the Cyber Executive Order from the President.
Industries are adopting AI but struggle to see real-world applications. Oracle’s Innovation Lab changed that – driving results in construction
In this Cloud Wars Minute, Aaron Back guest hosts to discuss IBM’s real-time AI solution and how it contributes to the cloud future.
These three undeniable trends in the cloud security space are some of the top areas that organizations should focus on.
In this Cloud Database Battleground moment, Jordan Tigani identifies the top reasons that organizations choose to use SingleStore.
With an abundance of cybersecurity tools, vulnerability management can benefit from simplifying the user experience.
With the rise of Industry Cloud and remote care, FHIR interoperability is a critical component to the future of healthcare.
Cloud computing has led to a paradigm shift involving the increased use of Infrastructure-as-a-Code (IaC) through codification.
With a lack of standards for risk assessment, cybersecurity tools may be leading to more confusion when determining risk prioritization.
As the Cloud Database Battleground event approaches, analyst Wayne Sadin shares a message to the incumbent database vendors.
As a new generation of databases emerge, cloud-native technology is what sets these modern databases apart from those of the past.
As the cybersecurity landscape is rapidly changing, these cybersecurity startups are on the rise with the vast adoption of new technologies.



















