Category Archives: Blog

Honeywell’s acquisition of cybersecurity provider sets sights on manufacturing sector’s deep IoT vulnerabilities

The manufacturing sector is rife with unprotected Internet of Things (IoT) sensors and devices, many of them integrated into enterprises’ mission-critical systems. The resulting gaps make operations technology (OT) and information technology (IT) networks vulnerable to devastating cyberattacks. Visibility is key. Shivan Mandalam, director of product management for IoT security at CrowdStrike, told VentureBeat that “it’s […]

Leveraging user-generated social media content with text-mining examples

With nearly 5 billion users worldwide—more than 60% of the global population—social media platforms have become a vast source of data that businesses can leverage for improved customer satisfaction, better marketing strategies and faster overall business growth. Manually processing data at that scale, however, can prove prohibitively costly and time-consuming. One of the best ways […]

Managing your cloud ecosystems: Maintaining workload continuity during worker node upgrades

Planning and managing your cloud ecosystem and environments is critical for reducing production downtime and maintaining a functioning workload. In the “Managing your cloud ecosystems” blog series, we cover different strategies for ensuring that your setup functions smoothly with minimal downtime. To start things off, the first topic in this blog series is ensuring workload […]

2018 Call for Code Winner Project OWL advances its natural disaster communication network

For disaster-prone areas, fragile connectivity remains a major problem, often going offline in critical moments. Aerospace enterprises face a similar challenge when trying to run consistent high-altitude connectivity while operating in remote locations, which can also be very expensive. This is where Project OWL comes into play: developing new technologies to help address these challenges. Formed […]

AWS EC2 instance types: Challenges and best practices for hosting your applications in AWS

When it comes to hosting applications on Amazon Web Services (AWS), one of the most important decisions you will need to make is which Amazon Elastic Compute Cloud (EC2) instance type to choose. EC2 instances are virtual machines that allow you to run your applications on AWS. They come in various sizes and configurations—known as […]

Protect sensitive data in Azure and Microsoft Office while keeping control over your keys

The average cost of a data breach is USD 4.35 million, and 83% of organizations have had more than one breach (of which 45% occur in the cloud). With these increases in the frequency and costs data breaches, an enterprise’s data protection and privacy in the cloud is more important than ever. The data protection needs […]