Sorry, we couldn't find any posts. Please try a different search.

POPULAR

How Artificial Intelligence Is Revolutionizing Business

How Artificial Intelligence Is Revolutionizing Business

Artificial Intelligence Revolution 84% of respondents say AI will enable them to obtain or sustain a competitive advantage. 83% believe ...
First Things First. What Are Microservices?

First Things First. What Are Microservices?

Innovation with Microservices Microservices are an engineering approach and architectural style of computing that is becoming extremely important for organizations ...
Bob Waters

Artificial or Augmented Intelligence: Talks with Intel’s Chief Data Scientist, Bob Rogers

Artificial or Augmented Intelligence I recently sat down with Bob Rogers. Bob is Intel’s Chief Data Scientist for Analytics and ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
How to Start Incorporating Machine Learning in Enterprises

How to Start Incorporating Machine Learning in Enterprises

Incorporating Machine Learning in Enterprises The world is long past the Industrial Revolution, and now we are experiencing an era ...
Why Open Source Technology is the Key to Any Collaboration Ecosystem

Why Open Source Technology is the Key to Any Collaboration Ecosystem

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely ...
THE AGE OF DATA: THE ERA OF HOMO DIGITUS

THE AGE OF DATA: THE ERA OF HOMO DIGITUS

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s ...
Chris Gerva

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
Part 2: Strategies for Securing Mobile Devices in a Cloud-based World

Part 2: Strategies for Securing Mobile Devices in a Cloud-based World

Part 2: Strategies for Securing Mobile Devices With workplace mobility now a way of life and companies investing in cloud-based ...
Cloud Data Migration

Big Data: Drawing Insight From Security Breaches

Insight From Security Breaches In the past, security breaches were viewed as a single event occurring at a certain point ...