Cosa sono i Data Lake Nel nostro articolo Big Data as a Service abbiamo parlato di come, in conseguenza della tendenza di crescita nella domanda di […]
Perché il LiFi LiFi è una tecnologia di comunicazione wireless che utilizza lo spettro della luce infrarossa e visibile per la comunicazione di dati ad alta […]
Internet ha rivoluzionato il mondo dei computer e delle comunicazioni. L’invenzione del telegrafo, del telefono, della radio e del computer hanno solamente posto le basi per […]
Nel nostro viaggio nelle organizzazioni DevOps, ci occupiamo questa volta della terza iniziale dell’acronimo CALMS (Culture, Automation, Lean, Measurement e Sharing); ci occupiamo della Lean. The […]
In computer science, algorithm means a series of well-defined instructions given to a machine to perform certain actions that allow to solve a certain problem. Normally, […]
The application context of the NIS Directive Cybercrime attacks not only computers and, but also industrial plants and infrastructures. The NIS Directive ¹ qualifies, in art. […]
Traditional centralized architectures for data management see a central organization, recognized by system members, responsible for authorizing and validating all changes to the data. The Distributed […]
As often happens with new technologies, even for the blockchain the intrinsic value does not lie in the technology, but in the organization. It also occurs […]
The 4 tiers of Data Centers The Uptime Institute tier classification is certainly among the most widespread in the world of data centers. The classification establishes […]
Software design is the process of organizing sections of code through its functions, objects, methods and data structures, the general architecture of the system and the […]
Given the inherent difficulty in extracting value from Big Data¹, it is not surprising that most companies can identify current or future challenges or opportunities in […]
Choosing the software architecture consists in making fundamental structural choices that are difficult and expensive to change once implemented. Software architecture consists of the fundamental structures […]
The copper network, born 150 years ago with the commercial telephone service¹, today sees a technological evolution in the integration with fiber optic networks for the […]
One of the reasons for DevOps’1 luck is the focus on resolving the conflict between the development (Dev) and the management (Ops) of information systems. The Dev […]
With whaling, from the English whale (whale), we indicate a phishing1 in which we aim to have a prominent figure, a large fish. With this technique, […]
Summary The concept of the Internet of Things (IoT), provides for the interconnection of various intelligent physical objects (things), such as sensors and actuators, also making […]
Economically quantifying the damage caused by a cyber attack with, perhaps, a loss of data is being studied by all stakeholders in all production sectors. The […]