Tags » Enterprise

The "Other" Value Levers of Automation - Part 4 - Traceability

Computers are far better at keeping records than humans and good logs are a crucial part of getting value from automating anything. Sometimes this aspect of automation gets lumped in with logging, but there is a difference between recording events and providing traceability. 619 more words

DevOps

Google beefs up 2-step verification with physical USB Security Key option in Chrome

Google today announced it is beefing up its two-step verification feature with Security Key, a physical USB second factor that only works after verifying the login site is truly a Google website. 389 more words

Business

Snowflake Computing Emerges From Stealth With $26M In Funding To Modernize The Data Warehouse

Snowflake Computing came out of stealth today and announced $26M in Series B funding. They hope to modernize the data warehouse by creating a cloud-based system that can process both structured and semi-structured data in a single system, giving their customers what they believe to be the best of both worlds. 490 more words

TC

Snowflake has raised $26M to manage all your data in its cloud

Snowflake Computing, the enterprise-focused startup with former longtime Microsoft executive Bob Muglia at its helm, is coming clean today about all the venture funding it’s been sitting on: a cool $26 million since starting in 2012, including a new $20 million round. 268 more words

Business

A Colourful District

CREA-Zone cluster event

The Research + Enterprise Department is involved in the CREA- Zone cluster project which brings together partners from Belgium, France and the Netherlands all of whom are delivering Interreg funded projects. 726 more words

All

Star Trek: TNG Season 3 "Captain's Holiday" and "Tin Man"

I’m going through “Star Trek: The Next Generation” and reviewing every episode, complete with commentary and a grade from A-F. I’ve also included a score and comment from my wife, who has never seen the show before. 815 more words

Star Trek

Tracking (and Thwarting) the Latest Mobile Threats

Our world has only recently taken a dive into another dimension; one which many security experts say we are not ready to venture into.

It has, however, become inevitable that we will dive head-first in this new direction of… 915 more words

Mobile Application Development