Tech Blogs

How graph databases improve fraud detection

10/23/2020

A new generation of fraud detection applications is about to eliminate the shortcomings of the current applications. Combatting fraud is an annoying

Academic | An interview with Joshua McKenty, co-founder of OpenStack on the art of contemporary cloud computing

"The fact that my songs take a long time to write is no guarantee of their excellence." - Leonard Cohen...

October 23rd, 2020 Robert Brennan Hart

Need faster application performance? Here are some tips

Every organization thinks that online response times should be faster, and batch elapsed times should be shorter. Performance expectations, no...

October 16th, 2020 Yogi Schulz
social media

Social media causes polarization – so where do we go from here?

The social dilemma described in the recent movie with the same title exists because technology groups think that they are...

October 15th, 2020 Donna Lindskog

Why distributed cloud is the next generation of cloud computing

By David Smith Gartner, Inc. Cloud computing promises that customers will gain advantages from several key propositions: shifting the responsibility...

October 9th, 2020 Gartner

Understanding Canadian cybersecurity laws: Peer-to-peer privacy protection — “Intrusion upon seclusion” and the protection of intimate images (Article 6)

By Melissa Lukings, JD Candidate, Faculty of Law, University of New Brunswick (UNB) AND Dr. Arash Habibi Lashkari, Assistant Professor and...

October 9th, 2020 Blog Admin

A new perspective: How our autistic-majority IT company is weathering the pandemic

Written by Garth Johnson, CEO auticon Canada We had just leased office space in Toronto. We completed a press conference...

October 9th, 2020 Blog Admin

Where are graph databases headed?

Graph databases have matured into mainstream information technology. They are no longer esoteric software that’s just emerging from the lab...

October 2nd, 2020 Yogi Schulz

Migrating an entire university to the cloud, during a pandemic: lessons learned

Written by Jennifer Schaeffer VP of Information Technology and Chief Information Officer, Athabasca University (AU)   It’s said that change...

September 25th, 2020 Blog Admin

Ransomware threats are real. How are you reducing your risk?

Written by Tunde Odeleye Director of penetration testing services for cloud and data centre transformation for Insight Enterprises Being an...

September 24th, 2020 Blog Admin