In the past 6 months Generative AI has exploded, most notably via OpenAI’s “ChatGPT.” In recent years, the fields of Machine Learning (ML) and Deep Learning (DL) have gained significant attention and have become buzzwords in the technology industry (Generative AI is a...
Blogs
EmpowHER 2023: Insights From an Inspiring Women in Leadership Panel
Converge held its third annual EmpowHER Women in Leadership event, hosted by Jessica Geis, VP of Client Experiences for Converge Technology Solutions. The inspiring event brought together a panel of remarkable women from diverse backgrounds to share their experiences,...
Pre-Implementation Checklist for Successful Database Activity Monitoring
Security teams use database activity monitoring (DAM) to see what is happening with their critical data assets and to detect anomalies that can indicate misuse, theft, or tampering. As a process, DAM involves “observing, identifying, and reporting a database’s...
Tips for Getting IAM Implementation Right
A well-known quote says a “rose by any other name would smell just as sweet.” That may be true for some things, but it leaves too much to chance for cybersecurity. Establishing known identities is crucial to securing users, data, and devices. Identity and access...
How Synching Managed Providers Leads to Better Results
If you work with third-party IT and cybersecurity service providers, you already know how they can help you hurdle the challenges and costs of sourcing, retaining, and training in-house teams. The ease and efficiency delivered by managed service providers (MSPs) and...
An Effective Combination for Boosting App Performance: APM and ARM
In the realm of app performance, modern businesses face the challenge of delivering more functionality, performance, and scalability with a leaner and more cost-efficient infrastructure. Adopting microservices instead of monolithic apps has been a positive step for...
A Strong Data Protection Program Starts With These 9 Cornerstones
The quest for strong data security has all the elements of a cliffhanger Hollywood movie. Bad guys, good guys, treasure, chaos, and misadventure are all part of protecting data in a digital world. Businesses and organizations have data, bad guys want it, and nearly...
Carbon, Costs and Computation: The Compelling Case for Liquid Cooling
Today’s data- and processing-intensive applications continually need more processing power, and more processing power means more computing, more servers, higher density in data centers, and, ultimately, more energy usage. Computers create heat and lots of it....