Skip to main content
false
Muhammad Raza

Muhammad Raza is a technology writer who specializes in cybersecurity, software development and machine learning and AI.  

Learn 4 Min Read

AI Tools & Vendors for The Enterprise

Looking for AI tools for the enterprise? Read on for the full story about AI and software for business use cases.
Learn 5 Min Read

What Are Feedback Loops?

Today, feedback loops are commonplace in IT, business, and plenty of other domains, too. But what exactly are they meant to do — and how do they work?
Learn 9 Min Read

What is Malware Detection?

Detecting malware isn't easy: there's so many types, so many places to look. Learn the best techniques to use today.
Learn 3 Min Read

What Is Hacktivism?

Hacktivism — hacking with the purpose of activism — is on the rise globally. Get the full story on what it means and how it differs from real social activism here.
Learn 1 Min Read

What Is Zero Touch In IT?

With a goal of zero human intervention, Zero Touch is the automation of resource provisioning, device management, and a whole range of ITOps processes.
Learn 6 Min Read

What Is Federated Analytics?

Federated analytics is the approach for data analysis that happens locally on devices, instead of moving data to a central location. Learn more here.
Learn 3 Min Read

The Environmental Impact of AI

Today, AI is everywhere — and it’s powerful. But what powers artificial intelligence? Natural resources like water and electricity. Get the full picture here.
Learn 4 Min Read

Low Code vs. No Code: What’s The Difference?

When it comes to coding and software/app development, two related trends appeal to certain business users: low code and no code programming platforms.
Learn 3 Min Read

AI Ethics in Business & Organizations

When AI and business meet, good things can happen — but we should consider the negative side, too. Read on to see how to adopt AT ethically and sustainably.
Learn 3 Min Read

What Is Intelligent Automation?

Intelligent automation is smarter than more traditional forms of IT automation. Take a look at what intelligent automation can do for you today.
Learn 3 Min Read

What Is Public Key Infrastructure (PKI)?

A full introduction to PKI: Public Key Infrastructure (PKI) is the cryptography framework used to protect and authenticate digital communications.
Learn 3 Min Read

What Are Foundation Models in AI?

A Foundation Model is a general class of AI models trained on large data assets at scale. See how these models work & how essential they are to achieving AGI.
Learn 4 Min Read

What Is AI Infrastructure?

AI infrastructure is to the technology stack that runs AI workloads. Learn all about this important topic here.
Learn 3 Min Read

Threat Assessments & How To Assess a Cyberthreat

To respond to threats effectively, you need to understand what damage that threat can cause. Threat assessments are a crucial part of any cybersecurity strategy.
Learn 2 Min Read

Log Monitoring with AI: What Makes Monitoring Intelligent?

Monitoring log data offers so many benefits and proactive approaches in your organization. Understand what using AI for log monitoring can do, too.
Learn 4 Min Read

Introduction to Virtualized Security

Virtualized security is the term for how to secure your virtualized, VM-based IT environments. Get the full story here.
Learn 4 Min Read

Software-Oriented Architecture (SOA) Defined

Learn how software oriented architecture works, including its key features and characteristics. We’ll also look at how to solve common SOA limitations.
Learn 4 Min Read

Asset & Application Discovery: How It Works

Protecting and securing your IT assets starts with knowing what IT assets you have. Learn how IT asset discovery works here.