Category Archives: Blog

Scalable, Cost-Effective Disaster Recovery in the Cloud

Should disaster strike, business continuity can require more than just periodic data backups. A full recovery that meets the business’s recovery time objectives (RTOs) must also include the infrastructure, operating systems, applications, and configurations used to process their data. The growing threats of ransomware highlight the need to be able to perform a full point-in-time […]

Ongoing Concerns over Tether

Tether (USDT) is a type of cryptocurrency known as a stable-coin. It’s price is pegged to $1 USD, with the cash to back the currency held in a reserve bank account. As of October 2021, USDT was worth more than $68 billion, the fifth-largest cryptocurrency by market capitalization. The idea of stable-coins is, unsurprisingly, to […]

Healthcare Data Security: Why It Matters

Today, electronic healthcare data exists at every point along a patient’s journey. So frequently is it being processed, accessed, and shared between multiple providers, that we’d be forgiven for forgetting the highly sensitive and confidential nature of this information, and for taking data security for granted. Healthcare data not only contains medical information, but also […]

Measure and Improve Your Application Resilience with AWS Resilience Hub

I am excited to announce the immediate availability of AWS Resilience Hub, a new AWS service designed to help you define, track, and manage the resilience of your applications. You are building and managing resilient applications to serve your customers. Building distributed systems is hard; maintaining them in an operational state is even harder. The […]

Artificial Intelligence Communism

Our technological innovation and progress (especially in the digital space) continues to accelerate unbounded. Google has recently announced there ascension to “quantum supremacy” with the unveiling of it’s brand new Sycamore chip. In a paper published in Nature, the Silicon Valley giant claimed to have made a major breakthrough in the field of quantum computing […]