I am a content maven, skilled writer, and experienced editor who specializes in producing high-quality marketing content for tech. I'm also a big fan of the Oxford comma.
WhiteSource Customer Success Story - Open Raven
Customer case study video with Mark Curphey, founder of OWASP.
Hitting Snooze on Alert Fatigue in Application Security
Don’t hit snooze on security alerts! While alert fatigue is a problem in application security, it can be avoided. Learn how automation can help you remediate vulnerabilities and prevent alert fatigue
The Maturation Of The Data Industry: Then, Now And In The Future
(Ghostwriter) First, there were data lakes, then data warehouses and now data platforms. The key commonality is data. Data deserves its own category in the infrastructure architecture, and, adopting a term we’ve heard from our customers, we’ve been calling it “dataware.”
Why Manually Tracking Open Source Components Is Futile
Open source code is found in almost every proprietary software offering on the market and is estimated to make up on average 60%-80% of all software codebases in 2020.
Learn why managing your open source usage manually is a losing proposition and how an automated solution can help.
Copy and Paste Code: How to Lose Your Job Using Open Source Code
Have you ever wondered whether it’s ok to copy and paste code from an open source project? The short answer is no. Read on for the reasons why.
Comparing SCA Solutions: WhiteSource, Synopsys, Snyk, and Sonatype
This article analyses and compares the most popular software composition analysis (SCA) tools: WhiteSource, Synopsys/Black Duck, Snyk, and Sonatype.
AI and ML: Harnessing the Next Big Thing in Information Security
(Ghostwriter) If you want to harness the full potential of AI/ML for cybersecurity, due diligence is required. Understanding your needs and asking the right questions up front ensures you’re buying the right tool for your enterprise.
Hailed as the “next big thing” in the information security space, artificial intelligence (AI) and machine learning (ML) are poised to disrupt the cybersecurity industry. If you believe everything you read, AI and ML is the miracle solution coming to save the day. No more exha...
AI/ML in Security: Know What You’re Buying
(Ghostwriter) Marketing for information security products is filled with buzzwords of the day, especially when looking at artificial intelligence and machine learning. Even by themselves, AI/ML are hard words to define, so how do decision-makers untangle the marketing jargon to really understand what they are buying? Before purchasing a security solution, decision-makers need to look under the covers at what security vendors are offering in the way of artificial intelligence and machine learning.
Cutting Through the Jargon of AI & ML: 5 Key Issues
(Ghostwriter) Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it.
When looking at the artificial intelligence (AI) and machine learning (ML) components of information security products, it's easy to get overwhelmed by the glut of marketing buzzwords. As a decision maker, how do you cut through the jargon to fully understand what you're purchasing?
The key is in asking the right questions before purchasing.
Do Versions Matter?
(Ghostwriter) By William Peterson, MapR
Naming is hard. Once you’ve chosen a name and your product or solution is out the door, it’s still not over. What do you call the next version?
In a Consolidating Market, MapR Delivers Today
(Ghostwriter for CEO) Recently Cloudera and Hortonworks announced their merger.
The merger is not a surprise as Hortonworks M&A rumors have circulated for years. Cloudera and Hortonworks bet on commodity Hadoop and haven't differentiated themselves enough in the market. They have seen their growth stall and have been very capital intensive businesses. Hadoop alone isn't enough to support the demands of advanced analytics and AI/ML. Simply put, commodity Hadoop falls short of today's customer needs when it comes to...
Data and Containers and the Keys to Success
(Ghostwriter) In the beginning, workloads, tools, and requirements for big data were simple because big data wasn’t really all that big. When we hit 5TB of data, however, things got complicated. Large data sets weren’t well suited to traditional storage like NAS, and large sequential reading of terabytes of data didn’t work well with traditional shared storage.
As big data evolved, the analytics tools graduated from custom code like MapReduce, Hive, and Pig to tools like Spark, Python, and Tensorflow, whic...
Why Infosec Practitioners are Evolving into Data Scientists
(Ghostwriter) Data scientists and information security practitioners have long operated in their own independent spheres of influence. When you look at their responsibilities, however, you begin to see they are more alike than different.
Global Data Fabric Takes on the Diversity of Data Types
(Ghostwriter) Life is a journey, but getting to your data shouldn’t have to be.
Data is the lifeblood of most businesses, but many organizations aren’t taking full advantage of their data because it’s complex, globally distributed and hard to access.
From high-resolution sensors on the edge to industrial IoT devices, the growth in unstructured data is exploding. There are more data sources emitting more data than ever before. This diversity of data types causes new silos to appear for specific kinds of pro...
Data Convergence: The Role of Machine Learning in Retail
(Ghostwriter) Big-data driven changes are sweeping through the retail industry. Though the retail sector is no stranger to big data, much of the focus has been on analyzing historical data. While this has been useful in creating efficiencies and identifying consumer trends, retailers need to go further if they want to remain competitive and increase their margins. Using artificial intelligence (AI) and machine learning in real time is the key to unlocking deeper insights in all aspects of retail operations...