Artificial Intelligence Explained

Artificial Intelligence or AI refers to computers, computer controlled machines or software that simulate human intelligence. Features of AI include decision making, reasoning, learning and...

Augmented Analytics Explained

Augmented Analytics, just like the application of Augmented Reality, is meant to assist and guide the users in analysing the data by giving more insights to data processing and providing automation...

Augmented Reality (AR) Explained

Augmented Reality (AR) is a technology that overlays digital information onto the real world, creating an interactive experience. Imagine looking through your phone's camera and seeing...

Authorised Push Payment Fraud Explained

An Authorised Push Payment (APP) is an electronic funds transfer initiated by you, the payer, and sent to a recipient's account. The key thing to understand is that although you authorised the...

Backup Appliance

A backup appliance, sometimes referred to as a purpose-built backup appliance (PBBA), is a hardware device pre-installed with backup software and preconfigured with hardware and connectivity...

Bitcoin Exchange Explained

A Bitcoin exchange is an online platform or marketplace where traders are able to buy and sell Bitcoins using altcoins, alternative cryptocurrencies to Bitcoin, or real-world currency. Since Bitcoin...

Bug Bounty Explained

Bug bounty programs are initiated by developers and vendors with the aim to reward or compensate individuals who can find and report bugs, exploits and/or vulnerabilities within their software,...

Business Analytics Explained

Business Analytics (BA) is the process whereby an organisation’s data is explored and analysed with results used to understand business performance and/or used to assist in making business...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or...

CDP

Continuous Data Protection or CDP is a process for protecting data that provides more granularity than traditional backup. CDP monitors primary data and tracks every change to that data in real...

© Asia Online Publishing Group Sdn Bhd 2022
Powered by