Emma Crockett

Emma Crockett is a writer for Datamation and Enterprise Storage Forum based in Nashville, Tennessee. She writes research-based articles about data science and data storage. When she is not writing, she is searching for the best lattes in Nashville and playing with her dog, Dante.

Cloud Security Market Q&A With Parag Bajaria of Qualys

Enterprise cloud use cases are changing and expanding, and companies are now realizing new security challenges that need to be resolved.  Cloud security solutions can include everything from new security tools to more...

Artificial Intelligence (AI) in Supply Chains

Applying artificial intelligence (AI) is one way supply chain professionals are solving key issues and improving global operations.  AI-enhanced tools are being used throughout supply chains to increase efficiency, reduce the impact of...

Best Open Source Software List

Open source software is software that is released under a license that allows companies the right to use, study, change, and distribute the software for any purpose. Open source software can also...

What is a Thin Client? Types, Uses & Examples

A thin client is a computer system used to run applications where most of the actual processing is done on a remote server linked over a network. The local machine, the thin client,...

How to Segment Your Network: 7 Steps

Network segmentation can be a great way to prevent single points of failure within your network. Learn how to implement it now.

Data Management Q&A With Young Pham of CI&T

As businesses grow, their data load increases significantly, making data management a priority for any organization. Data management can include cloud and on-premises data storage, a data security strategy, and protection of...

How to Conduct Data Classification: 6 Steps

Effective data classification can be challenging to implement. We've outlined the essential steps to make the process easier for you.

IT Security Policy: Definition, Types & How to Create One

IT security policies are organizations' guidelines for how to implement and operate secure technology & data. Read our ultimate guide now.

Structured vs. Unstructured Data: Key Differences Explained

Structured data consists of clearly defined data types with patterns that make them easily searchable, while unstructured data—“everything else”—is composed of data that is usually not as easily searchable, including formats like...

100 Top Artificial Intelligence (AI) Companies in 2023

As artificial intelligence (AI) has become a growing force in business, today’s top AI companies are leaders in this emerging technology. Often leveraging cloud computing and edge computing, AI companies mix and...

10 Best Dashboard Software and Tools for 2023

Dashboard software enables business users to create a visually compelling report from a wide array of metrics and big data trends. These business intelligence (BI) dashboard tools — with pie charts and...

Data Science Q&A With Aakanksha Joshi of IBM

Companies are using data science to study their data and make better business decisions through programming, modeling, data analytics, visualization, machine learning (ML), and artificial intelligence (AI). Armonk, New York-based IBM is a...

Latest Articles