Karen Avery
How to Improve Your IT Security Policy: A Six Sigma Approach
You have a security policy. But is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...
How to Improve Your IT Security Policy: A Six Sigma Approach – 2
You have a security policy. but is it effective? For many companies, chances are the answer is no; more likely, it is slowing down service, increasing costs and disrupting...
Latest Posts
Jedox CTO Vladislav Maličević on AI Strategies in the Enterprise
I spoke with Vladislav “Vlado” Maličević, CTO of Jedox, about the 5 key points for companies to consider as they build out their artificial...
Cisco Live 2023: Cross-Product Integration
At Cisco’s global user event, Cisco Live, held recently in Las Vegas, Cisco didn’t launch several new routers, switches, and security devices as is...
Best Artificial Intelligence Software 2023
The demand for artificial intelligence software (AI) has increased significantly in recent years, and organizations of all sizes are adopting artificial intelligence to stay...
Informatica CEO Amit Walia on ‘Guardrails’ for Generative AI
I spoke with Amita Walia, CEO of Informatica, about the challenges that companies face with scaling artificial intelligence, including the need for ethics and...
What Is a Large Language Model?
A large language model (LLM) is a type of artificial intelligence model that has been trained through deep learning algorithms to recognize, generate, translate,...