Beginning Your Text Analytics Analysis Correctly
How to get a complete picture of your data: The ‘Top-Down and Bottom-Up Approach’ – A Text Analytics Tip by…
What’s in Store for Big Data Analytics in 2016
It’s the time of year again for predictions on all sorts of topics. Worthy, solid predictions are often based on…
NoSQL Databases: 4 Game-Changing Use Cases
Sure, you’ve heard about NoSQL, but is it just another technology fad that’s all hype? What can you actually do…
IT Trends 2016: What to Wait for This Year [INFOGRAPHIC]
2016 promises to be fruitful for the IT world. Let's see what companies promise their IT departments this year. Thanks…
Flash Vulnerabilities & Exploits: An Information Security Primer
Adobe Flash Player is used to create and play animations, video games, advertisements and mobile apps - it’s considered a…
How IoT Applications Can Help Businesses Grow Internally
The Internet of Things (IOT) can be referred as networks of physical objects that are embedded with electronics, sensors, software…
In Memoriam: Robin Fray Carey
We've lost our fearless leader, Robin Carey. For those of you who knew Robin, you know she was larger than…

