Back
Image Alt

Blog

Cities have evolved massively in the past century. More and more people migrated from small villages to big and smart cities, which has led to authorities and private companies investing in automation and innovation. Where are we now? Well, there

Internet of Things (IoT) is no longer a novelty in the business world, and more companies are considering an IoT strategy in order to remain competitive on the market. In fact, according to a survey, only 9% of companies admitted

We all live in the digital era where social media, internet-connected devices, and cloud computing are fast becoming vital elements in our lives. Just think that only a few years ago backing up data was not a difficult task. But

Cybersecurity is one of the most debated topics in the past years. There’s no doubt that it is a serious challenge for any company. Not long ago I decided to start documenting around data breaches costs, the top industries targeted

The age of digital transformation means that more and more organizations are choosing to move their workloads onto the cloud. In fact, it is projected that by the year 2020, 83% of enterprise workloads will be in the cloud.Why are

Cities have evolved massively in the past century. More and more people migrated from small villages to big and smart cities, which has led to authorities and private companies investing in automation and innovation. Where are we now? Well, there

Internet of Things (IoT) is no longer a novelty in the business world, and more companies are considering an IoT strategy in order to remain competitive on the market. In fact, according to a survey, only 9% of companies admitted

We all live in the digital era where social media, internet-connected devices, and cloud computing are fast becoming vital elements in our lives. Just think that only a few years ago backing up data was not a difficult task. But

Cybersecurity is one of the most debated topics in the past years. There’s no doubt that it is a serious challenge for any company. Not long ago I decided to start documenting around data breaches costs, the top industries targeted

The age of digital transformation means that more and more organizations are choosing to move their workloads onto the cloud. In fact, it is projected that by the year 2020, 83% of enterprise workloads will be in the cloud.Why are

We often hear about security breaches that companies of all sizes experience. What are the consequences of a security breach? Well, it depends. A significant attack on a company’s data can lead to even bankruptcy. Why is this happening? In

The Gartner report from April 2018, An I&O Leader’s Guide to Serverless Computing, shows that by 2020, more than 20% of global enterprises will have deployed serverless computing technologies. Let’s look to see what all this buzz around going serverless

Artificial Intelligence (AI) is here. And AI is fast becoming an integral part of how businesses operate across the world. Many are apprehensive of the change however and are fearful that AI will replace jobs. Although, research has shown us

It’s been a while since the first app appeared on the market. Now we have millions of applications available for a wide range of tasks. Would you like to monitor your diet? No worries, you have a bunch of apps

With cloud computing, you get the full package: secure data and applications accessible any time, anywhere and from any device. But that’s not all: you also benefit from increased efficiency, scalability, and faster deployments. So there is really no surprise

As we enter the second quarter of 2019, I noticed an increasing interest in the blockchain technology across all industries. So it was not surprising to find out that the global blockchain market size is expected to grow more than

A while ago I started extensive research on Virtual Reality topic. You might have seen the first part of my work, and now I am ready to share the second part with my readers. Virtual Reality caught my attention when

We know the world through our senses, and sometimes it is limited to our perception. But it seems like technology changed that. With the latest technology advancements, we are not limited anymore by our perception and imagination. Yes, I am

According to the latest reports and analysis, phishing is the most common type of security breaches. It seems like 90%+ of cyber attacks start with a phish. This phenomenon is huge, and we should all be careful with our personal

Machine Learning started its journey as a simple technology, with simple algorithms. Now, when we hear about this concept, we think about something more complex, and that’s what we should do. The skeptics would say that technology invaded our lives.

Ricks mailing list
Get the latest content first.
We respect your privacy.