Sat.Nov 18, 2017 - Fri.Nov 24, 2017

How Artificial Intelligence is Making Big Data Better Than Ever


The concept of Big Data is a relatively new one. It denotes the availability of vast volumes and sources of data, which were not available before. By itself, Big Data is powerful, and when combined with Artificial Intelligence and machine learning, the opportunities presented by this combination are just endless. As big data moves to the […]. Artificial Intelligence Big Data

Three Factors to Better Understand Digital Transformation

Social, Agile and Transformation

Digital transformation is not just about applying cloud, mobile, and social technologies or experimenting with emerging technologies like AI, blockchain, or IoT.

Deep learning – when should it be used?

Eric D. Brown

“When should I use deep learning?” ” I get asked that question constantly. The answer to this question is both complicated and simplistic at the same time.

How to diagnose cloud performance issues

David Linthicum

Is your public cloud-based workload too slow? You don’t know where to look first? Here are some quick guidelines for diagnosing the root cause of most performance issues. I’ve found that many people in IT who can quickly diagnose issues with traditional systems have trouble diagnosing cloud-based system. Because they don’t have a deep understanding of what’s in a public cloud, such as Amazon Web Services or Microsoft Azure, and believe that it’s a black box.

How To 161

More Trending

If You’re Still Doing These Tasks Manually, You’re Out of the Loop


Making changes to the way you do business can seem scary, but some new technologies could help you get work done significantly faster — particularly if you focus on automation. Below, we’ll look at several tasks you can automate to save time. Ordering Office Supplies Restocking your office supplies is tedious, and if you […].


Understanding the value of your customer: CLV 101


At some point, almost every company faces questions like How good are the customers that we acquire? How do they differ from each other? How much can we spend to encourage their first or next transaction? As a measure that determines the amount of profit a customer brings over the.

Retail 109

The legal quagmire of creativity in artificial intelligence

Computer Weekly

AI holds the promise to solve problems beyond the scope of human imagination. But if an AI can create, who owns its work

How to Help Your Small IT Team Keep Up with Business Expansion

IT Toolbox

So what is the best approach to help your small IT team get accustomed to new developments

Scaling Amazon ElastiCache for Redis with Online Cluster Resizing

All Things Distributed

Amazon ElastiCache embodies much of what makes fast data a reality for customers looking to process high volume data at incredible rates, faster than traditional databases can manage.

Can Blockchain Supercharge the Gig Economy?


Countless words have been written in recent years about the rise of the ‘gig economy’. As the natural evolution of the freelance model, the gig economy is based on short-term and temporary jobs handled by contractors and other independent workers.


GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

5 Ways VoIP Can Increase Productivity

IT Toolbox

Businesses of all sizes and types are consistently striving to increase profits. Companies can reach this goal in a variety of ways—reduce overhead spending and waste, increase workforce efficiency—but one reliable way is to increase productivity in the workplace. One often-overlooked way to increase productivity is to use the benefits of voice over IP (VoIP) telephony.

VOIP 141

The Value of a Personalized Experience

Perficient - Digital Transformation

Google likes to put interesting statistics. While you can’t plan your business around this stat, you can see where the market’s going and what you need to do in your own digital channels. Reminder.

Tools 69

5 Insights on Infrastructure Cyber Attacks


To state the value of technology at this point would be a needless redundancy, but for as great a resource as the world of cyber information is, it also leaves crucial infrastructure vulnerable in a way that it has never been before. Without question this (relatively speaking) new threat is.

IR35 reforms: Consultation on private sector roll-out confirmed in Autumn Budget 2017

Computer Weekly

The government has confirmed it is preparing to consult on whether or not to roll out the controversial IR35 tax avoidance reforms to the private sector

Budget 197

UDP: Output Processing

IT Toolbox

When an application program generates UDP output, it transfers control to the operating system and eventually calls procedure udpsend to send the UDP datagram

CIOs as “Chief Investment Officer”: How to Measure IT Performance and Assess IT Investment Right?

Future of CIO

Continually accelerating changes in IT digitalization requires faster responses and better performance metrics.

How to keep graph databases both flexible and secure


Graph databases are now common within a range of industries such as life sciences, healthcare, financial services, government and intelligence. Graphs are particularly valuable in these sectors because of the complex nature of the data and need for powerful, yet flexible data analytics.

Use GDPR to future-proof business models

Computer Weekly

Businesses should look beyond compliance with new data regulations to ensure that their business processes and models are in line with future requirements, advises a privacy innovation expert

Data 187


IT Toolbox

Exotic "bit vectors" become everyday decimals

Groups 131

Happy Thanksgiving with “Positive Thinking”

Future of CIO

Share insight and be mindful to celebrate Thanksgiving. It’s another Thanksgiving Day approaching, it’s not just the time for shopping or relaxing, but also the time to recharging and doing some introspection. It is not just the time to gain a few pounds but also doing more PONDERING.

Can Data Explain Why Online Slots Are Succeeding Against Tech-heavy Rivals?


If you think for a moment about the world of computers and gaming, your mind might initially drift to the perceived glitz and glamor of the latest releases that showcase 4K graphics, or perhaps even the might of the PS VR, which hints at console gaming being ready to move into.

MPs press Theresa May to explain why alleged hacker Lauri Love is being extradited to US

Computer Weekly

MPs question the attorney general and prime minister about why alleged hacker Lauri Love is to be extradited to the US, when at least 13 other hackers have been tried for US hacking offences in the UK


Consumer WLAN, Device Company PHICOMM Comes to the US

IT Toolbox

Every now and then it’s fun for a WLAN professional to venture down-tier to the consumer end of life to see what’s shaking there. In the enterprise world, big-dollar access points typically do client access and not much else (you Meraki fans stay quiet, I sense you cursing me for that statement). But down in the consumer range, it’s hard to find “just an access point&rdquo

CIOs as “Chief Innovation Officer”: Three Management in Innovation Management

Future of CIO

The definition of innovation is simple, it is about transforming novel idea and achieving its business value. It is about gaining benefit by doing something different.

Which is the bigger data threat: Breaches … or your users?

IT Manager Daily

Quick, which is more of a risk to data: keyloggers or phishing? That’s the question Google engineers and researchers from Berkeley teamed up to answer, and their results might confirm some of your worst fears.

Study 52

Geospatial Commission announced in Budget to open up OS data

Computer Weekly

Chancellor of the exchequer Philip Hammond announced in his November 2017 budget a £40m Geospatial Commission to open up Ordnance Survey data to stoke new business for small companies

Budget 176

Six Security Practices to Teach Employees

IT Toolbox

Patching and regular system updates matter for strong enterprise security. So does proactive threat detection, end-to-end encryption and good planning, among many other best practices. But no matter how strong your security stance, there always is a weak link in the chain: human error. Employees are the biggest threat for enterprise security, and that fact will remain no matter