Making the most of MLOps

Making the most of MLOps

Maria KorolovMay 26, 2022

When companies first start deploying artificial intelligence and building machine learning projects, the focus tends to be on theory. Is…

Latest Appearances

Metaverse presentations: OpenSimulator Community Conference
Dec 15, 2021

Metaverse presentations: OpenSimulator Community Conference

Maria Korolov was one of the organizers of the ninth annual OpenSimulator Community Conference this December, held virtually. She gave a talk about the metaverse, about the current state of the OpenSim ecosystem, and moderated a panel about creativity in OpenSim.
Informa Webinar: Doing More IT With Less
Oct 27, 2021

Informa Webinar: Doing More IT With Less

Maria Korolov was a panelist at “Doing More IT With Less: Economizing and Innovating in Today’s Enterprise IT Organization,” an Informa virtual event on Wednesday, Oct. 27 sponsored by DarkReading, InformationWeek, Data Center Knowledge, ITProToday, NetworkComputing, and other Informa publications. She spoke on the topic “The practicalities of implementing SASE.”
MetaStellar video: Setting up a WordPress website with DreamHost in 15 minutes
Oct 7, 2021

MetaStellar video: Setting up a WordPress website with DreamHost in 15 minutes

In a segment for MetaStellar’s YouTube channel, Maria Korolov does a quick overview of using DreamHost to set up a brand new WordPress website.
IDG Zero Trust Webinar
Sep 21, 2021

IDG Zero Trust Webinar

Maria Korolov was a guest on IDG’s zero trust webinar, “VPN vs SSO vs ZTNA — Designing Access for an Anytime, Anywhere World.”
MetaStellar Interview: How we launched in a pandemic
Aug 5, 2021

MetaStellar Interview: How we launched in a pandemic

Maria Korolov talks with the co-hosts of Long-Lost Friends, a show on the MetaStellar YouTube channel, about how MetaStellar was launched.
BrightTalk cybersecurity panel
Oct 23, 2020

BrightTalk cybersecurity panel

On Oct. 13, Maria Korolov moderated a BrightTalk panel, “Protecting Critical Infrastructure from Cyberattacks During Global Disruption.”  Watch the webinar on-demand here.
CIO Magazine New Reality Event
Sep 15, 2020

CIO Magazine New Reality Event

On Sep. 15, Maria Korolov was a speaker at a CIO magazine virtual event, “The New Business Process Mandate: AI & Automation.” Watch the on-demand session by clicking here.
Look Left podcast
May 12, 2020

Look Left podcast

On May 12, Maria Korolov was a guest on the Look Left Marketing podcast to talk about her career in journalism.  Listen to the podcast by clicking here.
IDG Tech Talk: CCPA Revisited
Feb 18, 2020

IDG Tech Talk: CCPA Revisited

On Feb. 21, Maria Korolov was a guest on IDG Tech Talk to answer reader and viewer questions about the California Consumer Privacy Act.  Watch the show on YouTube by clicking here.
InformaTech’s Cybersecurity Bootcamp
Oct 23, 2019

InformaTech’s Cybersecurity Bootcamp

On Oct. 23, 2019, Maria Korolov was a guest speaker at InformaTech’s Cybersecurity Bootcamp, talking about securing the virtual data center.  See her presentation for free and download the slides here.
IDG Tech Talk: CCPA
Sep 6, 2019

IDG Tech Talk: CCPA

On Sep. 6, 2019, Maria Korolov was a guest on IDG Tech Talk to talk about how the California Consumer Privacy Act will affect businesses  Watch the show on YouTube by clicking here.

Latest AI articles

Making the most of MLOps

Making the most of MLOps

May 26, 2022

When companies first start deploying artificial intelligence and building machine learning projects, the focus tends to be on theory. Is there a model that can provide the necessary results? How can it be built? How can it be trained? But the tools that data scientists use to create these proofs of concept often don’t translate well into production systems. As a result, it can take more than nine months on average to deploy an AI or ML solution, according to IDC data. “We…

6 business risks of shortchanging AI ethics and governance

6 business risks of shortchanging AI ethics and governance

May 17, 2022
Factors inherent to artificial intelligence and its implementation can have dire ramifications for your company if ethics and governance aren’t baked into your AI strategy.
How SASE uses AI

How SASE uses AI

Apr 18, 2022
SASE vendors are applying AI and machine learning to the network- and security-related data they collect to sharpen analytics, tighten security and boost performance.
Why businesses should know the importance of data quality

Why businesses should know the importance of data quality

Apr 13, 2022
Data quality, building data trust and identifying bias are critical for organizations to confidently make decisions based on the data they collect.

Latest Cybersecurity articles

7 machine identity management best practices

7 machine identity management best practices

May 24, 2022

Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to secure them often fall short. Cybercriminals and other threat actors have been quick to take advantage. Cyberattacks that involved the misuse of machine identities increased by 1,600% over the last five years, according to a report released last spring by cybersecurity vendor Venafi. Research firm Gartner named machine identity as one of the top cybersecurity trends of the year, in a report released last fall. In 2020, 50% of cloud security failures resulted from inadequate management of…

Fantastic Open Source Cybersecurity Tools and Where to Find Them

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022
Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.
Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022
And it is not the only company to take hardware security seriously.
Machine Identity Management: A Fast-Growing Frontier of Security

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022
Attackers are getting better at compromising machine identities, as billions of new devices and services are introduced to the network.

Latest Networking articles

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Apr 7, 2022

Demand for secure access service edge (SASE) has grown tremendously during the pandemic. As adoption picks up, vendors are promising feature-rich and integrated SASE solutions. Customers have different needs when it comes to SASE, however, and it’s not always easy to understand what a SASE provider is offering. As an approach, SASE combines networking and security into a scalable cloud service that fits with the remote and hybrid work models companies use today. Potential benefits include easier network and security management, flexibility to scale up or down as business needs require, and lower costs. Functionally, the five main pillars of SASE are SD-WAN,…

10 ways IT can navigate the chip shortage

10 ways IT can navigate the chip shortage

Mar 23, 2022
Buying used gear, extending the life of existing IT equipment, and considering cloud alternatives are among the tactics industry watchers recommend for dealing with the ongoing semiconductor shortage.
Gartner: SSE is SASE minus the SD-WAN

Gartner: SSE is SASE minus the SD-WAN

Mar 7, 2022
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.
Top 10 outages of 2021

Top 10 outages of 2021

Jan 31, 2022
Cisco-owned network intelligence company ThousandEyes reveals the 10 biggest outages of 2021.

Latest Blog Posts

AI tools to create cool illustrations

May 17, 2021
AI tools to create cool illustrations

Writing is all about the text. But marketing and promotion is often all about the images. Whether you’re sharing with your audience on Twitter, Facebook, Instagram or your own blog, cool images make a big difference. At MetaStellar, we’re always…

15 free mind map tools for writers

May 10, 2021
15 free mind map tools for writers

A few days ago I wrote about how to use the free online app Miro to plot out a story. That’s all well and good if you already have an idea for a plot, and now just need to fine-tune…

How to use Miro for story plotting

May 3, 2021
How to use Miro for story plotting

A year ago, when the pandemic first hit, I wrote an article for CIO magazine about how to manage software development teams when you can’t meet in person. Many of the managers I spoke to said that they replaced the…

The best free* books to help you battle procrastination

Feb 28, 2021
The best free* books to help you battle procrastination

Last month, I posted an article about a bunch of ways writers can use to beat procrastination. But maybe you want to go deeper on the topic. Here are seven books on Amazon with over a 100 positive reviews that…

28 ways to beat procrastination for writers

Jan 7, 2021
28 ways to beat procrastination for writers

Have you ever stared at your screen or typewriter or notebook and couldn’t force yourself to write? You had the time block set aside for writing, and you can’t force yourself to get started. Maybe you didn’t even make it…

Where to find low-cost, pre-made covers for spec fic books

Dec 17, 2020
Where to find low-cost, pre-made covers for spec fic books

According to WrittenWordMedia’s 2019 author survey, more than 75 percent of successful book authors — those making $60,000 a year or more from their writing — use professional designers for their book covers.  But they tend to spend between $100…