In this article, President and Chief Executive Officer at Blueprint Software Systems, Dan Shimmerman discusses process discovery. Dan addresses recent findings uncovered in a survey conducted by Blueprint Software Systems regarding process discovery tools and what businesses can do to drive digital transformation.
All Posts by this author
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Eva Pittas, co-founder and COO of Laika.
We spoke with Laura Baldwin, President at O’Reilly and Mike Loukides, VP of Emerging Tech at O’Reilly about the latest trends in data and AI careers. Which certifications are most associated with a rise in salary, why should companies invest in upskilling and internal employee training?
A recent survey released by Datanyze showed that MySQL gained 15.46% market share while MongoDB has a market share of 4.13%. Why is MySQL better? In this blog, we will help you understand the seven best reasons to choose MySQL for your business application.
PostgreSQL 14 has more than 200 improvements and new features, but broadly they fall into four areas: Performance, Observability, Security and Convenience. For developers, what is there to look forward to in this new version? Let’s look at them in some more detail.
SD-WAN is gaining real traction because the value it can bring to organisations of all shapes and sizes is becoming increasingly clear. It fuels greater agility, productivity and resilience, but how many solutions are truly security-first? Tim Mercer, CEO of disruptive cloud specialist Vapour, explores…
To increase your readiness — and boost your security teams’ confidence — it’s important to move beyond formulating static incident response plans and instead leverage transitory crisis simulation pieces of training to mimic the effects of a real-world attack closely.
The slow, hidden build-up of operational and security issues must be addressed before it can cause real issues. Dennis Mastin, DevOps Solution Engineering, CyberArk discusses the importance of secrets management, risks presented by security management sprawl, and how to manage this vulnerability.
Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.
The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.
Getting a digital product started on, developed, and published to the world is a huge task. As much as 70 percent of digital transformations fail. Even if they succeed, up to 90 percent of newly launched products end up with a desperately low market adoption rate.
In this article Raja Rao, Head of Growth Marketing at Redis discusses breaking down complex problems using first principles and DBLess (databaseless) architecture. DBLess architecture provides an alternative to traditional thinking. Should you try a proof-of-concept?
Malware is every company’s worst nightmare and in 2021, cyberattacks are on the rise. We spoke with Bryan Patton, CISSP and Quest Strategic Systems Consultant about ransomware, how to protect your team against it, what to do after an attack, and why we’ve seen a spike in ransomware.
There’s an inescapable logic to data modernization, given that the cloud offers you new ways to deploy, distribute, and access your data. If you want to exploit those capabilities, your applications and data storage will change. There couldn’t be a better time to modernize your data models to match their new environments.