Questions?  Call us now at 914-332-5940

Information Happens

The Upside of Containers in a Virtual Environment

by Leonard Hancock on April 13, 2017

What Is Containerization, and How Is It Changing Virtualization? 

Containers.jpg

The necessity for running applications on different platforms has long posed a challenge for IT developers, and this issue was initially addressed by the development of virtual machines (VMs) to enable multiple operating systems (OSs) on a single server.

Read More

Topics: Cloud Computing, Virtualization, Containers

Shadow IT Supports Cloud Technology

by Leonard Hancock on March 30, 2017

Authorized and otherwise, usage of cloud technology expands despite reports of its eventual demise.  

cloud.jpg

Edging Out the Cloud

Some followers of the IT industry believe that the cloud’s days are numbered. Peter Levine, general partner of venture capital firm Andreessen Horowitz is one who considers the cloud’s demise inevitable. Levine believes that the centralized model of cloud computing is unsustainable in the coming era of the Internet of Things (IoT). Network latency, Levine thinks, is simply too big an issue given the speed and clutter of cloud computing.

Read More

Topics: Edge Computing, Fog Computing, Cloud Computing, Datacenters

Edge Computing Takes Processing Back from the Cloud

by Leonard Hancock on March 23, 2017

By shifting computing power back to its source, edge computing solves latency problems with the cloud and the internet of things.edge-computing.jpg

Information Traffic Jams

With the development of increasingly sophisticated Smart Devices, the speed of data transfer has become a significant challenge for information technology (IT) companies. Transmitting raw or unstructured information in large quantities slows the speed with which a device can respond and carry out its function. Transmission lines become increasingly clogged by millions of users, and yet some data, such as the reaction of a self-driving car to road conditions, is time sensitive, and must be delivered immediately.

Read More

Topics: Edge Computing, Fog Computing, Cloud Computing, Datacenters

Relationships Define Natural Language Processing

by Leonard Hancock on March 13, 2017

Vectors, ontologies, embeddings and sentiment analysis: how relationships between words are the foundation of NLP
nlp.jpg

Human language follows unexpected patterns. Varied forms of syntax and metaphor, together with context and repetition, make classification challenging for both humans and machines. Manual classification of unstructured linguistic data by human curators can be valuable, but without technological assistance, is time consuming and potentially rife with errors. When such “natural language” data is left untouched it is less usable. Enterprises are faced with the challenge of transforming huge amounts of this raw data into actionable intelligence.

Read More

Topics: Machine Learning, AI, Natural Language Processing, Ontologies, Sentiment Analysis

Are Machines Going to Take Your Job?

by Leonard Hancock on March 6, 2017

Separating Panic from Prediction as Artificial Intelligence Replaces Careers robots.jpg

For decades Hollywood has entertained the public with stories about how Artificial Intelligence (AI) will become smart enough to replace us. These stories may have an air of authenticity for manufacturing workers, especially as machine learning has enabled robotic process automation (RPA) to handle increasingly complex tasks. But some may rightly feel it is nothing new or particularly worrisome; factory workers have seen their jobs supplemented by machines for many years.

Read More

Topics: Machine Learning, AI, Artificial Intelligence

The Blockchain Revolution

by Leonard Hancock on February 21, 2017

Blockchain is starting to deliver on great expectations, but the story of this technology is still just beginning.

blockchain2.jpg

Is blockchain a digital miracle? Typing “What is Blockchain?” or “How Can I Use Blockchain?” into any search engine fills the screen with hype. Maybe it’s not quite a household word, but numerous individuals and companies see it as the future of IT security in an unsecured age.  Many think it will emerge as an opportunity for Internet of Things (IoT) devices.

Blockchain is a decentralized network of digital records open to public verification. Each record—each block of data—is time-stamped to create a chronological record, is linked to others, and is encrypted, so as not to be subject to revision.  In this way, the technology of a blockchain creates a secure, digital ledger.

Read More

Topics: IT Security, hackers, bitcoin, IoT, Cybersecurity, blockchain, Internet of Things

Alliances, Standards and Blockchain: Hope for IoT Security

by Leonard Hancock on February 15, 2017

The high-stakes struggle to secure the Internet of Things is bringing companies together, but the way forward may come from the disruptive technology behind Bitcoin: Blockchain.

IoT-security.jpg

The world of machines is getting smarter and more connected. From refrigerators that access the Internet, to Wi-Fi smart scales to track your weight and BMI, to self-driving automobiles, the Internet of Things (IoT) has emerged as the future of everyday technology. Frighteningly, few in the Information Technology world would argue that the IoT is becoming more secure, and many would say the opposite. The question is, in a world where security breaches are commonplace, how can we get to a place where all devices are vastly more secure?

Read More

Topics: IT Security, hackers, bitcoin, IoT, IBM, AT&T, Cybersecurity, blockchain, Internet of Things

Challenges to Personal and Operational IT Security Presented by Social Media

by Leonard Hancock on February 9, 2017

With social media Information and "social engineering" compromising IT security, user accounts are leaving businesses vulnerable to hackers.

cybersecurity

It has become increasingly obvious to Security Operations Managers (SOMs) that well-orchestrated phishing campaigns can start with breaching an employee’s social media account. These campaigns, which can result in sensitive organizational data being leaked, are aimed at unsuspecting workers who fail to follow best practices to ward off such attacks. In some cases, the company itself may not have effective security protocols in place.

Read More

Topics: Social Media, IT Security, OPSEC, hackers, Cybersecurity, social engineering

Human Content Curation Helps Prevent Spread of "Fake News"

by Leonard Hancock on February 2, 2017

Combining AI and an editorial team can prevent "fake news" and other unreliable information from influencing business decisions.

fakenews.jpg

Not all content is created equal. Moreover, not all content can be trusted. New York Times followers received a sharp reminder of this axiom on Sunday, January 22, when OurMine, a hacker “security” group, infiltrated one of the media organization’s Twitter accounts. OurMine tweeted a fake news brief through the New York Times' video account (@nytvideo) claiming that Russia had launched a missile attack against the United States. The source was supposedly a “leaked statement” from Russian President Vladimir Putin. The Times quickly removed OurMine’s fake tweet: “We deleted a series of tweets published from this account earlier today without our authorization,” they reported via Twitter. Unfortunately, not everyone seems to realize that not all content can be trusted.

Read More

Topics: content curation, Machine Learning, Information Management, AI, Fake News, IT Security, Cybersecurity

Machine Learning in Searches for Business Information

by Leonard Hancock on January 27, 2017

How Search Engines Are Increasingly Driven By Machine Learning

MachineLearning.jpg

Machine learning is an application of artificial intelligence (AI) expected to proliferate even further throughout the business world in 2017.  When specific, rule-based algorithms are impossible or ineffective, machine learning is advantageous - smart machines can utilize data by teaching themselves to improve from it. Machine learning’s versatility is such that almost any process could be improved by it. When dealing with business information, maybe no process is more  important than search tools, an area where machine learning has been truly revolutionary.

Read More

Topics: Machine Learning, Business Information, AI, Information Portals, Artifical Intelligence, Automation, Search Engines, Google Search, RankBrain, Deep Learning