Darren Chinen
How Malwarebytes Uses Big Data and DevOps to Protect Millions of Computers Around the World
BY Darren ChinenDarren Chinen

I’ve been around data (and now big data) for the last 20 years, working at companies like Apple, GoPro, Roku, and Malwarebytes. And one thing I’ve learned is that we’re all on a big data journey.  In my current role at Malwarebytes, I lead the Data and Artificial Intelligence team. Malwarebytes is 100% focused on creating the best disinfection and protection solutions to combat the world’s most harmful internet threats, and my team’s mission is to leverage big data technologies to harness the vast amounts of data we process to deliver key insights that give us sustainable competitive advantages. More on that below! Malwarebytes recently celebrated its 10-year anniversary. During these ten years, we’ve built a relationship of trust with our customers, which include consumers as well as … [Read More]

Strategically Growing BMC License usage collection utility
BY Gomati MahabalGomati Mahabal

Technology companies invest significantly in their products to solve problems for customers. As customers leverage product capabilities, at times they lose track of license compliance: whether they comply with software licenses they purchased from vendors. … [Read More...]

What is AI-as-a-Service? AIaaS Explained
BY Chrissy KiddChrissy Kidd

We’ve all heard of IaaS and SaaS before. These terms have become ubiquitous for infrastructure-as-a-service and software-as-a-service. Another variant is PaaS, short for platform-as-a-Service. Today, most companies are using at least one type of “as a … [Read More...]

Jobs-as-Code: The Power of Shifting Left
BY Tina SturgisTina Sturgis

What’s the number one goal for every developer that works in today’s digital business? The answer is pretty simple: to build better business applications faster. But as I speak with IT pros from all kinds of companies at our events, I often hear, “Sure, but … [Read More...]

Can We Say “Agile” and “Db2 for IBM z/OS” in the Same Sentence?
BY Jim DeeJim Dee

The term “DevOps” is occupying a lot of space in articles, presentations, and blogs lately. But it doesn’t apply to the mainframe or Db2 on z/OS… or does it? As Db2 DBAs, we’re too busy keeping the lights on to worry about a trend that affects only … [Read More...]

Real Time vs Batch Processing vs Stream Processing: What’s The Difference?
BY Laura ShiffLaura Shiff

With the constant rate of current innovations, developers can expect to analyze terabytes and even petabytes of data in any given period of time. While this allows advantages far beyond what we can see, it can be difficult to know the best way to accelerate … [Read More...]

AWS Linear Learner: Using Amazon SageMaker for Logistic Regression
BY Walker RoweWalker Rowe

In the last blog post we showed you how to use Amazon SageMaker. So read that one before you read this one because there we show screen prints and explain how to use the graphical interface of the product, including its hosted Jupyter Notebooks feature. We … [Read More...]

Six Key Capabilities to Look for in a Managed File Transfer Solution
BY Robby DickRobby Dick

Let’s talk about your 24x7x365 business—that’s right, your business is always on. You may go home at 5pm (on a good day), but there are critical business functions happening all the time. And many of these business functions include the transfer of a file. For … [Read More...]

To Patch or Not to Patch: The Latest on Fighting the Spectre and Meltdown Vulnerabilities
BY Antonio VargasAntonio Vargas

A few months ago, we wrote about the Spectre and Meltdown vulnerabilities discovered in Intel processors and how to address them: primarily, by deploying software patches. But recently, the plot thickened. Microsoft’s Meltdown patch actually made the original … [Read More...]

Cryptojackers Are Stealing Your Electrons
BY Scott N. SchoberScott N. Schober

Currency, in all its forms, has thieves that take what is not theirs. Cryptocurrency is no different. The fact that bitcoins are not a physical currency does not stop cybercriminals from stealing them, but these are not the same as cryptojackers. Cryptojackers … [Read More...]

The Basics of IT Virtualization
BY Joe HertvikJoe Hertvik

IT virtualization is the creation of a virtual—rather than a physical—version of an IT device or resource. Many people think of virtualization only in terms of virtual machines (VMs), where one physical machine hosts many VMs running different operating system … [Read More...]