In-Memory Queries

In-Memory Queries Explained   Traditionally relational databased used disk to process data for a query operation. In effect, this meant that if a query was run against a large database, the...

Insider Threats Explained

Insider threats are security threats to business information systems that come from people within their own organisation. The source of an insider threat comes from existing employees, former...

Integrated Data Protection

Data protection refers to the safeguarding of information from being affected by losses, stolen, compromise or corrupted systems. With data coming from various sources today, data protection is...

Integrated Systems

Integrated Systems , is a generic term which is used to describe the close physical grouping of the core elements of a datacentre in a software-centric architecture. Integrated systems bring...

IoT Analytics Explained

Internet of Things (IoT) analytics is the practice of gathering data from connected devices and analysing that data to gather insights or aid decision-making. Typically associated with...

IT Vendor Lock-In Explained

Vendor lock-in is a situation in which IT departments are unable to easily switch or migrate to different/newer technologies or services provided by a different vendor due to various reasons, such...

Layered Endpoint Protection Explained

Layered endpoint protection explained Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as...

Layered Protection Explained

Layered protection for IT security essentially looks at how one protects themselves from threats through sequential layers. Also referred to as Layered Security, it is a way of having multiple...

Location Data Explained

  Location data  carries geographic information. Any device that has a GPS signal to identify its location can provide location data. This data comes from mobile devices,...

Machine Data Explained

Machine data is any and all digital information created by computers, mobile phones, embedded systems and other networked devices. Machine data comes in an overwhelming array of unpredictable...

© Asia Online Publishing Group Sdn Bhd 2017
Powered by