Given the fact that if you’re human, you’re biased, how can we take bias out of the hiring equation so that it’s not a factor? Can artificial intelligence help us accomplish that? More >
Limor Kessem, executive security advisor for IBM Security, says it’s critical to identify Web pages that are being used to trick end users into giving up their passwords as soon as possible. More >
With Domo Everywhere, organizations can white label the Domo Business Cloud service or choose to embed analytics created using Dome directly within their own applications. More >
IBM announced it plans to give the task of keeping track of all the updates and patches available to IBM Watson. IBM MaaS360 will be infused with machine learning algorithms. More >
Yes, Watson should co-run IBM. Not only would this put a Watson again at the head of the firm, it would create the first AI company to be co-run by an AI. More >
It is important for organizations to plan their use of artificial intelligence carefully. It is a commitment and not for everyone. More >
John Underkoffler explains how his movie work informs Oblong's modern user interfaces and how large enterprises are using the technology.More >
John Underkoffler of Oblong Industries delivered one of the most discussed Ted Talks. He now discusses spatial operating environments and when we'll start seeing them everywhere.More >
A number of vendors are trying to position themselves as the low-code app development platform of choice. Appian is one leader.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
A large majority of security operations centers, or SOCs, have not attained the requisite level of maturity to enable them to adequately protect their organizations against cyberattacks.More >
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...
Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solv...
This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and work...
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...