This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across
It’s February 14, and Valentine’s Day is already trending on Twitter. It’s estimated that more than 60% of adults will take time today to honor the important relationships in their lives. According to History.com, approximately 150 million cards and
When I think of why technology solution providers should attend Microsoft’s WPC, I decided to pay homage to one of Steve Ballmer’s mantras with my blog title. Last year, at Microsoft’s WPC in Toronto, I was approached by KEMP Technologies (a Microsoft