dcsimg

IT Management

Articles

California Consumer Privacy Act: Its Similarities and Differences from GDPR

The California Consumer Privacy Act, CCPA, goes into effect on January 1, 2020, and like GDPR, will give users more control over their personal data. Preparations start now. More >

Accenture Envisions Using AI to Broadly Apply Computer Vision

Accenture decided to invest in Malong Technologies because the AI pioneer has been recognized by Google, Microsoft and Gartner as being the provider of one of the most advanced implementations of computer vision technologies based on AI. More >

Oracle Makes Communications Protocol for AI Models Available

GraphPipe makes it simpler to query AI models by providing a consistent method for deploying AI models across clients and servers. More >

IBM Service Employs Machine Learning Algorithms to Convert PDF Documents

A new IBM cloud service makes use of machine learning algorithms to ingest PDF documents in a way that makes it possible to use the data in those documents to train artificial intelligence (AI) models. More >

SIGGRAPH 2018: NVIDIA Just Obsolesced Moore’s Law and Intel to Create Something Amazing

With the graphics technology expanding how we view reality using technologies like augmented and virtual reality, the lines are increasingly blurred between what is real and what we can imagine. More >

NVIDIA Partners with NetApp to Address I/O for AI

NVIDIA and NetApp have partnered to create NetApp ONTAP AI architecture based on NVIDIA DGX supercomputers and NetApp AFF A800 all-flash storage. More >

More Articles >

Interviews

Ikanos: DSL Could Stand for ‘Definitely Still Living’

Digital subscriber line (DSL) technology has been on the endangered species list for years.

More >

Planning Around – and Through – Emergencies

The past few years have made one thing certain: Networks on occasion will be called upon to do more than normal.

More >

Driving Efficiency in Monitoring

Ensuring that networks are operating at peak efficiency has never been more important or more complex. A new layer of management — network packet brokers — is emerging to drive efficiencies in monitoring. Andy Huckridge tells IT Business Edge blogger Carl Weinschenk that the approach enables packets to be sent only to the appropriate tools and that measurements over the entire path — not just one network within that path — can be made.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series uses 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....

Job Description: VP of Digital Communications Job Description: VP of Digital Communications

This sample job description will help you better understand the role and requirements for a vice president of digital communi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.