Author Archives: Lucian Systems

How does data deduplication work?

Recent years have witnessed an explosion in the proliferation of self-storage units. These large, warehouse units have sprung up nationally as a booming industry because of one reason—the average person now has more possessions than they know what to do with. The same basic situation also plagues the world of IT. We’re in the midst […]

Q&A: Airport Security Trends with Dolores Alemán, Frost & Sullivan Analyst

In this CloudTweaks interview, we delve into the evolving landscape of airport security with Dolores Alemán, a seasoned Research Analyst at Frost & Sullivan. Dolores brings a wealth of expertise to the table. Specializing in commercial and physical security technologies, her insights are particularly relevant in today’s increasingly digital and security-conscious world. In a recent […]

Networks unchained: the shift toward intent-based autonomous operations

Telecommunications industry, a cornerstone of global connectivity, has been going through a technological renaissance for some time, driven by innovations such as 5G, IoT, cloud computing and AI. As a result, networks have become increasingly hard to manage. There is a need for automation to handle routine tasks, monitor network health and respond to issues in […]

Customer experience examples that drive value

Organizations that provide an excellent customer experience (CX) can improve sales revenues by 2 to 7 percent and profitability by 1 to 2 percent, according to McKinsey. It’s no surprise. Focusing on good CX can increase customer satisfaction and drive more meaningful customer interactions, ultimately increasing sales and customer retention. As such, more organizations are […]

What Is a Cloud Workload Protection Platform (CWPP)?

A Cloud Workload Protection Platform (CWPP) is a security solution designed specifically for protecting cloud workloads, including virtual machines, containers, and serverless functions. They offer a range of capabilities such as monitoring, threat detection, vulnerability management, and compliance enforcement. CWPPs differ from traditional security measures in their ability to adapt to the dynamic nature of […]

Penetration testing methodologies and standards

The online space continues to grow rapidly, opening more opportunities for cyberattacks to occur within a computer system, network, or web application. To mitigate and prepare for such risks, penetration testing is a necessary step in finding security vulnerabilities that an attacker might use. What is penetration testing? A penetration test, or “pen test,” is […]

Electric Flying Cars Racing: New Heights with AI & AR

The field of motorsport is undergoing a seismic shift, driven by the relentless march of technology. This transformation, exemplified by new racing design and technology, is not merely an evolution in speed and competition; it represents a confluence of advanced technologies like Artificial Intelligence (AI), the Internet of Things (IoT), and groundbreaking engineering. I’m Ronald […]

Examples of IBM assisting insurance companies in implementing generative AI-based solutions

IBM works with our insurance clients through different fronts, and data from the IBM Institute for Business Value (IBV) identified three key imperatives that guide insurer management decisions: Adopt digital transformation to enable insurers to deliver new products, to drive revenue growth and improve customer experience. Improve core productivity (business and IT) while reducing cost. […]