Advertisement

What Is a Wide Column Database?

Wide column databases, or column family databases, refers to a category of NoSQL databases that works well for storing enormous amounts of data that can be collected. Its architecture uses persistent, sparse matrix, multi-dimensional mapping (row-value, column-value, and timestamp) in a tabular format meant for massive scalability (over and above the petabyte scale). Column family […]

How to Support Identity Governance with AI

Click to learn more about author Jackson Shaw. The software industry has hyped up the use of artificial intelligence (AI) for years, and security – especially the identity governance and administration (IGA) sector – is no exception. As such, the question then becomes not whether a software is AI-enabled, but rather, what value is it really providing […]

Implementing a Cloud Data Strategy

At a time when most major companies are showing a long-range commitment to “data-driven culture,” data is considered the most prized asset. An Enterprise Data Strategy, along with aligned technology and business goals, can significantly contribute to the core performance metrics of a business. The underlying principles of an Enterprise Data Strategy comprise a multi-step […]

The Future of Digital Currencies and Data Management

Click to learn more about author Stuart Tarmy. Interest in digital currencies (and, more specifically, cryptocurrency) has risen in the last year, due in part to the interest in touch-free financial transactions caused by the pandemic, rising mainstream business interest in cryptocurrency potential, and the momentum of private initiatives like bitcoin and Facebook’s Diem (previously […]

What Is a Document Database?

Document databases refers to a category of  NoSQL that represents data in a tree structure, where paths or branches connect data values or leaves. Frequently, document stores use XML and JSON formats stores. There are few practical limits to the number of paths, fields, values, or types of data that can be added to specific […]

Cybersecurity in Cryptocurrency: Risks to Be Considered

Click to learn more about author Ben Hartwig. Blockchain has grown rapidly in recent years, but cryptocurrency is not immune to security attacks. There are still cybersecurity risks to be aware of. Some cryptocurrencies have already been the victim of ransomware attacks and other security breaches by hackers. ZenCash and Ethereum Classic have both lost […]

Data Architecture: One Size Does Not Fit All

There has never been a time when more options were available to stand up a process-driven and/or platform-driven Data Architecture. In recent years, some companies find themselves with an embarrassment of riches, having every tool known to humankind. Using tools à la carte, with a different tool for each solution, works for some organizations. Other […]