Data Stream

The problem of unstructured data in foundation models [Q&A]

Artificial intelligence is only as good as the data that it has to work with and that means that large volumes of information are needed to train the software in order to get the best results.

Ensuring the quality of data therefore is a key task in any AI implementation. We talked to the CEO of Snorkel AI, Alex Ratner, to find out more about the issues involved and how organizations can overcome them.

By Ian Barker -
machine learning AI

Why AI still needs human intervention [Q&A]

There have been a number of instances lately where the line between artificial intelligence and artificial stupidity has been a pretty thin one. Microsoft's Bing insisting that we're still in 2022, or Google's Bard serving up factual errors, for example.

These problems show that human intervention is still key to getting the best from AI/ML models. We spoke to chief product officer at Tamr, Anthony Deighton, to discuss how organizations can leverage AI/ML while also keeping the key human component of the process.

By Ian Barker -
Business database

Are you planning ahead for the MySQL 5.7 end of life? [Q&A]

The popular database MySQL version 5.7 hits end of life status on the 31st of October 2023, just a few months away.

This means organizations that are running MySQL 5.7 will have to plan ahead on their options for the future. Dave Stokes, technology evangelist at Percona, spoke to us about some of the choices that will need to be made as well as how to get started on the process.

By Ian Barker -
Threat concept

How DevSecOps can mitigate the cyber risks of emerging technologies [Q&A]

The technology world never stands still for very long and as new technologies emerge so too do new threats. With things like quantum computing on the verge of becoming mainstream it's important to understand their security implications.

We spoke to Archie Agarwal, founder and CEO of ThreatModeler to discuss how DevSecOps can help to identify and mitigate these new threats to cloud services.

By Ian Barker -
quantum computing

Is this the year we take quantum threats seriously? [Q&A]

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

By Ian Barker -
Biometric scan

The rise of biometrics for identity verification [Q&A]

As the world increasingly moves away from relying solely on passwords for identity verification, the focus is on alternative technologies. Whether that is passkeys, biometrics or other options, each has its own advantages and adherents.

Ricardo Amper, CEO and founder of next-generation identity verification solution provider Incode, sees biometrics as the key to eliminating discrimination and to creating a world of greater trust. We spoke to him to find out more.

By Ian Barker -
Social Engineering

Combating phishing and social engineering threats [Q&A]

The majority of cyberattacks are made possible by some degree of human error. Phishing emails and social engineering continue to dominate as the most common delivery systems for an attack.

We spoke to Mika Aalto, CEO and co-founder at Hoxhunt, about why a human-focused cyber-strategy is the key to success in combating attacks, about the initiatives that organizations can implement to establish this and how he expects human-related cyber-attacks to evolve.

By Ian Barker -
Prisoner locked-in

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

By Ian Barker -
Reluctant nervous scared online

Why customers are reluctant to share data online and what you can do about it [Q&A]

Brands are increasingly focussed on providing a good digital experience for their customers, yet many people remain reluctant to share their information with websites.

What are the reasons behind this reluctance? And what can enterprises do to overcome it? We talked to Josh Koenig, co-founder and chief strategy officer at SaaS web platform Pantheon, to find out.

By Ian Barker -
Person Protecting Human Figures Forming Circle

Connecting the world: the role of technology in providing humanitarian aid [Q&A]

When a crisis occurs, telecommunications infrastructure can be partially or entirely destroyed, severing the ties between crisis victims and the outside world, and in some cases disconnecting them entirely from their loved ones.

We underestimate the importance of technology until it is taken away, and providing connectivity to affected communities as quickly as possible in times of crisis is extremely important.

By Ian Barker -
home working security

Meeting the challenges of the digital workspace [Q&A]

Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.

Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.

By Ian Barker -
5G circuit board

Why 5G/LTE network security needs a different approach [Q&A]

The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.

Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.

By Ian Barker -
Analyzing data on computer

How analytics can boost the supply chain [Q&A]

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

By Ian Barker -
data protection

Meeting the challenge of protecting data in a changing world [Q&A]

As a report last year showed, the change to working habits over the last few years has gone hand-in-hand with a rise in the theft of data.

We spoke to Cyberhaven CSO, Chris Hodson, to find out how enterprise CISOs can meet this challenge and keep their data safe.

By Ian Barker -
smart city

Smart communities and how they're changing the world [Q&A]

Smart communities and smart cities are set to deliver a number of benefits, including environmental sustainability, reducing the digital divide, and improving people's lives with smarter, personalized and more intuitive services and experiences.

But making them work involves a good deal of technology such as 5G, small cells and distributed antenna systems (DAS), as well as needing partnerships between governments and businesses. We spoke to Brendan O'Reilly, group chief technology officer at BAI Communications to find out more about smart communities and what makes them work.

By Ian Barker -
Load More Articles