false

Muhammad Raza

Muhammad Raza is a technology writer who specializes in cybersecurity, software development and machine learning and AI.  

Learn 3 Min Read

The Environmental Impact of AI

Today, AI is everywhere — and it’s powerful. But what powers artificial intelligence? Natural resources like water and electricity. Get the full picture here.
Learn 3 Min Read

AI Ethics in Business & Organizations

When AI and business meet, good things can happen — but we should consider the negative side, too. Read on to see how to adopt AT ethically and sustainably.
Learn 3 Min Read

What Is Intelligent Automation?

Intelligent automation is smarter than more traditional forms of IT automation. Take a look at what intelligent automation can do for you today.
Learn 3 Min Read

What Is Public Key Infrastructure (PKI)?

A full introduction to PKI: Public Key Infrastructure (PKI) is the cryptography framework used to protect and authenticate digital communications.
Learn 3 Min Read

What Are Foundation Models in AI?

A Foundation Model is a general class of AI models trained on large data assets at scale. See how these models work & how essential they are to achieving AGI.
Learn 4 Min Read

What Is AI Infrastructure?

AI infrastructure is to the technology stack that runs AI workloads. Learn all about this important topic here.
Learn 3 Min Read

Threat Assessments & How To Assess a Cyberthreat

To respond to threats effectively, you need to understand what damage that threat can cause. Threat assessments are a crucial part of any cybersecurity strategy.
Learn 4 Min Read

Log Monitoring with AI: What Makes Monitoring Intelligent?

Monitoring log data offers so many benefits and proactive approaches in your organization. Understand what using AI for log monitoring can do, too.
Learn 4 Min Read

Introduction to Virtualized Security

Virtualized security is the term for how to secure your virtualized, VM-based IT environments. Get the full story here.
Learn 4 Min Read

Software-Oriented Architecture (SOA) Defined

Learn how software oriented architecture works, including its key features and characteristics. We’ll also look at how to solve common SOA limitations.
Learn 4 Min Read

Asset & Application Discovery: How It Works

Protecting and securing your IT assets starts with knowing what IT assets you have. Learn how IT asset discovery works here.
Learn 3 Min Read

Intelligent Applications Explained

Intelligent Applications are a Top 10 Strategic Tech Trend from Gartner. Learn how an app can become intelligent — and what that means for business.
Learn 5 Min Read

Network Traffic & Network Congestion: The Complete Guide

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
Learn 4 Min Read

Secure By Design: What Makes Software SbD

As the digital landscape continues to evolve, new cyber threats continue to emerge. It’s imperative to have safeguards in place early on in the product development process. That’s where Secure by Design comes in.
Learn 4 Min Read

Information Retrieval & Intelligence: How It Works for AI

A long-standing activity in information systems, information retrieval (IR) is totally changing the game for AI. Get the full story here.
Learn 3 Min Read

Adversarial Machine Learning & Attacks on AIs

AI and ML are very useful tools, except when we realize just how vulnerable to attack they are. Learn all about adversarial attacks on ML and AI here.
Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.
Learn 5 Min Read

How Data Architecture Determines How Your Data Can Be Used

Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.