“We Can’t Rely on Machines”
“We Can’t Rely on Machines” Michael L. Brodie, Research Scientist at the Massachusetts Institute of Technology (MIT), is convinced that Big Data has more potential than the hype suggests, but -also more risks. An...
Operational Database Management Systems
“We Can’t Rely on Machines” Michael L. Brodie, Research Scientist at the Massachusetts Institute of Technology (MIT), is convinced that Big Data has more potential than the hype suggests, but -also more risks. An...
From Data Wrangling to Data Harmony Author: Anirudh Todi Date: September 19, 2015 The twin phenomena of big data and machine learning are combining to give organizations previously unheard of predictive power to drive...
The Managers Who Stare at Graphs Big Data got your goat? Maybe it’s time to act on your data… By Christopher Surdak, JD Summary Big Data is taking over our world leaving business leaders...
Doubt and Verify: Data Science Power Tools By Michael L. Brodie, CSAIL, MIT July 1, 2015 Doubt everything. Use evidence-based methods to verify things that matter. Did Our Teachers Lie to Us? Do Doctors, Lawyers,...
The Business Relevance of Analytics by Carlos Andre Reis Pinheiro, Data Scientist, Teradata Analytical modeling plays a key role in distinguishing companies within any marketplace by driving opportunities for competitive advancement. This competitive advantage enables companies...
Apache Flink Offers a Challenge to Spark by Nick Heudecker | September 13, 2015 | While Apache Spark has been hogging most of the data processing and analytics (DPA) spotlight over the last year, Apache Flink has managed to turn a few...
Supporting & Validating Big Data Architecture with Scripting Languages BY Stephen Dillon |Schneider Electric| Global Solutions | Engineering Fellow | Data Architect I have spent the majority of my time in 2015 performing hands on...
The Power and Perils of Security Analytics BY Pratyusa K. Manadhata, Hewlett Packard Laboratories manadhata@hpe.com Security analytics is the process of collecting, storing, analyzing, and visualizing security relevant datasets to extract actionable security information....
SMART DATA: Running the Internet of Things as a Citizen Web by Dirk Helbing , ETH Zurich originally published in FuturICT blog. Moore’s law, describing the exponential explosion of processing power and data production, is currently...
IS THERE A WAY TO STOP TECHNOLOGIES WHICH BREACH (OR MAY BREACH) HUMAN RIGHTS? BY Susanna Cafaro, Università del Salento The European Parliament voted on Sept. 8 on a report presented by the Alliance...