Jeremy Poteet

Hacker Log: Pathway to Successful Site Attack

A few fairly simple practices would have prevented my successful attack on eWEEKs OpenHack site. The bottom line is that application security can be attained, but it must be...

Latest Posts

What is Data Mining?

As IT departments and businesses across all sectors handle larger quantities of raw data, processes have been created to turn this data into useful...

AIOps Provides a Path To Fully Autonomous Networks

If you’re an IT professional, you’ve heard of AIOps or artificial intelligence for IT operations. The term, originally devised by Gartner in 2017, describes...

How to Know If Your Company Needs a Digital Experience Platform (DXP)

Modern companies must provide a comprehensive digital experience for prospective and existing customers across multiple platforms. Consumers have multiple touchpoints with digital brands, from...

How Dell’s OEM Strategy Addresses the Current Market

Although the concept of original equipment manufacturers (OEMs) is deeply embedded in tech industry and culture, most people focus on the OEM relationships between...

4 Benefits of Digital Transformation

The benefits of digital transformation derive from the combination of its two key building blocks, technology and people, though there's debate about which plays...