Data Tokenization (for Data Security). What is it?

Data Tokenization (for Data Security). What is it?

Data Tokenization (for Data Security). What is it? APR, 2023 by Andrew Walker.    Author Andrew Walker Andrew Walker is a software architect with 10+ years of experience. Andrew is passionate about his craft, and he loves using his skills to design enterprise...
Big Data File Formats Untangled

Big Data File Formats Untangled

Big Data File Formats Untangled FEB, 2023 by Jane Temov.   Author Jane Temov Jane Temov is an IT Environments Evangelist at Enov8, specializing in IT and Test Environment Management, Test Data Management, Data Security, Disaster Recovery, Release Management,...
Software Security Anti-Patterns

Software Security Anti-Patterns

Software Security Anti-Patterns NOV, 2022 by Eric Boersma *Original OCT 2019   Author Eric Boersma This post was written by Eric Boersma. Eric is a software developer and development manager who’s done everything from IT security in pharmaceuticals to...
What Is Data Fabrication in TDM

What Is Data Fabrication in TDM

What Is Data Fabrication in TDM AUG, 2022 by Carlos Schults. *Update from 15 Mar 2021 Author Carlos Schults This post was written by Carlos Schults. Carlos is a .NET software developer with experience in both desktop and web development, and he’s now trying his hand...