722 search results for “Security”

722 search results for “Security”

Blog Post

Navigating the World of Recommendation Systems

Linkedin Introduction The volume of information available online has surged significantly due to the development...April 23, 2025
Blog Post

Gen AI is a Game Changer for Coding (Part 3)

Linkedin Is Gen AI the way forward for app modernization? Part 3 – Modernizing legacy systems to leverage...April 22, 2025
Blog Post

Introduction to Vibe Coding: Programming with ideas and Gen AI

Linkedin The concept of Vibe Coding can be explained as an approach that emphasizes the...April 16, 2025
Blog Post

Gen AI is a Game Changer for Coding (Part 2)

Linkedin Is Gen AI the way forward for app modernization? Part 2 – Remediating issues—bugs, vulnerabilities,...April 15, 2025
Blog Post

Enterprise Scale Landing Zone Design

Linkedin This blog provides a structured approach to designing an enterprise-scale landing zone in the...April 11, 2025
Blog Post

Implementing Minimally Viable Data Governance: A Pragmatic Approach

Linkedin I wanted to put together a quick guide on how to implement Minimally Viable...March 27, 2025
Blog Post

Customer Experience: A case for Digital Immune Systems

Linkedin Imagine it is Friday night and after a long week of hard work you...March 24, 2025
Blog Post

Data Governance Frameworks – A Comparison

Linkedin This is week 4 of a 4-week series on data governance frameworks, their structure,...March 20, 2025
Blog Post

Adaptive Cloud with Azure Arc: The Future of Unified, Resilient, and Secure Cloud Operations

Linkedin As businesses undergo digital transformation, they increasingly operate in a hybrid and multi-cloud world....March 18, 2025
Blog Post

Data Governance Frameworks -The ISO 38505

Data Governance Frameworks -The ISO 38505Mar 13, 2025Fred Krimmelbein Linkedin This is week 3 of...March 13, 2025
Load more
Show 10/722