Sign up | Login with →

Data Detox: The Importance of Cleaning Your Data

May 26, 2016 by Greg Olson

 Imagine enjoying years of everything going your way.  You land a great job, you have an amazing family and friends, and you live in your dream home in your dream city.  In fact, the only real problem that you have is finding the time...[read more]


From GPS to Genomes: “Big Data” Expanding Its Reach

May 25, 2016 by Particia Dimick

The future of computing is at an exciting, if ambiguous crossroads, with some of the biggest players in the industry, players like Intel, AMD, and NVidia starting to stray off the beaten path of relentlessly pursuing the time-honored tradition of...[read more]

6 ways to maximize the value of Business Intelligence

May 24, 2016 by Joe Stangarone

The Business Intelligence playing field has leveled over the past few years. With the advancement of BI software, small businesses now have the same BI options as their larger counterparts. But, while everyone now has the same options, not everyone uses BI to its fullest potential. In this article, we explore a few reasons why this happens, and how to maximize BI’s value in your business.[read more]

Next Generation of Product Information Management Empowers Digital Business

May 24, 2016 by Mark Smith

Organizations in all industries face various difficulties in managing product information. The most serious is providing complete, engaging information to consumers and customers on the internet. Newly developed products, mergers and acquisitions,...[read more]

4 HUGE Misconceptions About Business IT Security

May 24, 2016 by Kyle Cebull

When it comes to IT security, many business owners think that hackers are only targeting large businesses. We see things like the Target and Home Depot breach in the media and we think they’re the only ones having trouble with hackers. But the fact...[read more]

Top 5 criteria to consider in a data protection provider

May 24, 2016 by April Sage

Your organization’s data is money unaccounted for on the balance sheet, and it must be protected. A secure production site with no single point of failure goes a long way, but disaster recovery is the insurance that keeps you running in...[read more]

Tensorflow – Google’s artificial intelligence system for large scale machine learning

May 26, 2016 by Jagadish Thaker

TensorFlow is an open source system from Google applied for large scale machine learning processes for deep insights. This open source software library is used for numerical computations with the help of data flow graphs. TensorFlow was originally developed by the Google Brain team for its research and production purposes on its own...[read more]

3 Reasons How Big Data is Improving the Consumer Experience

May 25, 2016 by Faizan Raza

Big Data is impacting everything from the world of entertainment, to the way we communicate with friends and family. In large part, our perception of the world around us can both be attributed to, and feed the Pandora’s box that is Big Data. The good news (unless you’re a privacy advocate) is this data is more accessible than...[read more]

How IoT is Revolutionizing Asset Monitoring for Utility Companies

May 24, 2016 by Annie Bustos

In a previous post we briefly discussed 3 ways that utilitiy and green energy companies are getting smarter with IoT but now I want to delve a little deeper into one important area which is asset management. Assets that are linked to IoT devices allow utility operators to see real-time conditions, predict usage spikes, and...[read more]

Best Practices: Identify What Ransomware Locked Your Data

May 24, 2016 by David Balaban

ID Ransomware is a free website that has been launched by malware researches and where the victims of ransomware attacks can obtain help in dealing with their difficult situation. This website can make the life of victims easier by letting them identify the variant of the ransomware their computer has been affected with. This makes it...[read more]