Remove Applications Remove Construction Remove CTO Remove Database Administration
article thumbnail

Roles and Responsibilities

The Programmer's Paradox

To do this, there must be a ‘universal view’ of the data not just an application specific one. The most popular method of sharing large data-sets is via a common relational database, so the underlying schema for this needs careful thought and consideration or it will be unusable across the whole set of systems.

article thumbnail

AI Is Changing Security — 5 Predictions from Cortex

Palo Alto Networks

In the past, threat detection systems could be trained effectively on existing examples of individual techniques, but new variations in the way the malware was constructed and delivered would need to be captured individually over time. Similar capabilities will simplify tasks across the security operations center (SOC).