Cloud-centric Architecture Explained

Cloud-centric architecture refers to an approach to building IT infrastructure (e.g. data centres) where public, private and hybrid cloud becomes the core of the architecture. This is driven by a...

Cobot Explained

Cobots, or simply collaborative robots, are robots or machines that are intended to be used alongside human users within close proximity, allowing humans to make their work easier and faster. In...

Cognitive Automation Explained

Cognitive automation is the use of AI techniques, such as machine learning, cognitive computing, speech recognition and natural language processing to automate business processes that are normally...

Content Delivery Network (CDN) Explained

A Content Delivery Network or CDN refers to the geographically distributed series of servers that act in the middle of a central/origin server and end-users, virtually reducing the distance that...

Continuous Data Protection

Continuous Data Protection or CDP is a process for protecting data that provides more granularity than traditional backup. CDP monitors primary data and tracks every change to that data in real...

Credential Stuffing Explained

Credential stuffing is a cyber attack technique whereby an attacker uses compromised credentials or login information on different services in order to gain unauthorized access into a user’s...

Cryptojacking Explained

With the dawn of cryptocurrency, a new form of hijacking has emerged. A way to steal power and resources from a computer to be used for bitcoin mining. Cryptojacking, can be done on any device that...

Cyber Safety Explained

Cyber Safety refers to the safe and responsible use of ICT.   Cyber Safety is not just about keeping systems and data safe, but its about using IT systems responsibly and treating...

© Asia Online Publishing Group Sdn Bhd 2022
Powered by