Blog
Read the latest from our dedicated experts.
An Effective Combination for Boosting App Performance: APM and ARM
In the realm of app performance, modern businesses face the challenge of delivering more functionality,...
A Strong Data Protection Program Starts With These 9 Cornerstones
The quest for strong data security has all the elements of a cliffhanger Hollywood movie. Bad guys, good...
Carbon, Costs and Computation: The Compelling Case for Liquid Cooling
Today’s data- and processing-intensive applications continually need more processing power, and more...
Innovation in the Face of Adversity: A Data Scientist’s Reflection on the Development of America’s first At-Home Covid-19 Test Kit
It's hard to believe that it was around this time only three years ago that the world as we knew it changed...
TLS 1.3 Securely Raises the Speed Limit on the Internet Highway
What started as important is now vital. Protecting end-to-end web-based communications was important in 1983...
2022 Pentesting: A Red Team Review
The ever-changing threat landscape is a popular topic for cybersecurity resources. An astonishing number of...
Follow Us
Recent Posts
Unleashing the Power of the Cloud: Beyond a Migration
The pace of technology innovation is driving organizations, large and small, to continually seek ways to stay ahead of the competition and remain agile. One key transformation reshaping technology across the globe is the migration of workloads to the public cloud....
Bridging the Gap Between Infrastructure and Artificial Intelligence
I sat down with Converge’s Vice President of Engineered Solutions Darren Livingston and Senior Director of AI and AppDev Dr. Jonathan Gough to discuss how they’ve managed to bridge the gap between infrastructure and artificial intelligence (AI) when designing and...
Inside the 2024 Red Team Penetration Testing Report
In the unending barrage of cyber attacks, keeping pace with current threats is paramount. A proactive approach that includes penetration testing raises the bar higher, finding exploitable weaknesses before attackers can exploit them. Our report condenses 12 months of...