Search
722 search results for “Security”
722 search results for “Security”
Blog Post
Navigating the World of Recommendation Systems
Linkedin Introduction The volume of information available online has surged significantly due to the development...April 23, 2025Blog Post
Gen AI is a Game Changer for Coding (Part 3)
Linkedin Is Gen AI the way forward for app modernization? Part 3 – Modernizing legacy systems to leverage...April 22, 2025Blog Post
Introduction to Vibe Coding: Programming with ideas and Gen AI
Linkedin The concept of Vibe Coding can be explained as an approach that emphasizes the...April 16, 2025Blog Post
Gen AI is a Game Changer for Coding (Part 2)
Linkedin Is Gen AI the way forward for app modernization? Part 2 – Remediating issues—bugs, vulnerabilities,...April 15, 2025Blog Post
Enterprise Scale Landing Zone Design
Linkedin This blog provides a structured approach to designing an enterprise-scale landing zone in the...April 11, 2025Blog Post
Implementing Minimally Viable Data Governance: A Pragmatic Approach
Linkedin I wanted to put together a quick guide on how to implement Minimally Viable...March 27, 2025Blog Post
Customer Experience: A case for Digital Immune Systems
Linkedin Imagine it is Friday night and after a long week of hard work you...March 24, 2025Blog Post
Data Governance Frameworks – A Comparison
Linkedin This is week 4 of a 4-week series on data governance frameworks, their structure,...March 20, 2025Blog Post
Adaptive Cloud with Azure Arc: The Future of Unified, Resilient, and Secure Cloud Operations
Linkedin As businesses undergo digital transformation, they increasingly operate in a hybrid and multi-cloud world....March 18, 2025Blog Post
Data Governance Frameworks -The ISO 38505
Data Governance Frameworks -The ISO 38505Mar 13, 2025Fred Krimmelbein Linkedin This is week 3 of...March 13, 2025
Load more