What Is Cloud Data Integration?
Greg Mooney | | Cloud | IT Insights
When everyone on a business team has access to all the data the individual members handle, the team is better positioned to achieve its corporate objectives.
Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.
Greg Mooney | | Cloud | IT Insights
When everyone on a business team has access to all the data the individual members handle, the team is better positioned to achieve its corporate objectives.
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Greg Mooney | | Automation | File Transfer | Security
Electronic file transfer, abbreviated EFT is a procedure that follows an electronic format and protocol to exchange different types of data files.
One of the favorite techniques for faster software delivery is the so-called continuous integration and deployment, or CI/CD for short.
Greg Mooney | | Security
The right to privacy for individuals impacts just about every industry, and education is no different.
Greg Mooney | | File Transfer | Security
Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.
Greg Mooney | | File Transfer | Security
Keeping files and data secure when more users are working remotely is, of course, a concern. That's why a SaaS managed file transfer solution is critical.
Today marks System Administration Appreciation Day 2020, which means it is time to celebrate all the hard and rigorous work of SysAdmins.
Greg Mooney | | Security
What does the new merger of GoAnywhere and Globalscape mean for the managed file transfer market?
Greg Mooney | | Security
Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.