Analytics

Analytics news, information, and how-to advice

hpe media gallery image 3
emergency response alarm critical

StegIbiza

A new algorithm can hide messages in your favorite dance music

It's long been known that secret messages can be included in music through techniques such as backmasking, but now a Polish researcher has developed an entirely new approach.

ti 84plus calculator

12% off Texas Instruments TI-84 Plus Graphics Calculator - Deal Alert

Building on the hugely popular TI-83 Plus, the best-selling calculator of all time, the TI-84 Plus adds more speed, more memory, an enhanced high-contrast display, and more Apps.

video

An inside look at Cogito's newest emotional intelligence software

CIO's own Sarah White goes on location to examine the role of emotional intelligence software in the workplace and it's potential impact to customer service.

best deals of week

Best Deals of the Week, August 1-5 - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of August 1st. All items are highly rated, and dramatically discounted!

video

Visualizing data with Power BI

We try out Microsoft's Power BI by showing how you can graph airline departure and arrival delays using this visualization tool.

mind the gap 620x465

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report.

crowd stadium

Can crowd security testing be cost efficient for web apps?

Can Bug Bounty programs be a cost-efficient complement for security testing of modern web applications?

machine learning ai

Machine learning could help companies react faster to ransomware

Behavior analytics vendor Exabeam applies machine learning to detect ransomware infections and help companies quickly isolate affected computers before the malware spreads.

maze complex complexity

Infosec16: keep your cybersecurity strategy simple to win

Infosecurity Europe 2016 highlighted a great variety of emerging cybersecurity threats. Keeping things simple can help CISOs a lot.

01 checklist

SIEM: 14 questions to ask before you buy

Today's SIEM technology boasts more brain power than ever, but many organizations fail to realize its full promise. Here are the key questions you need to ask to ensure the solution you choose will deliver.

video

LATAS is the air traffic controller for drones

The system combines satellite and air traffic data to ensure that a drone is flying in the clear.

graduation caps thrown in the air graduation mortar board learning achievement 000004407014

Connecting with the senses in today's digital world

Preserving the art of interpersonal communication as technology continues to evolve

Jeff uh, uh, uh Finds-A-Way Goldblum

Are you too sexy to be a data scientist?

Named the 'sexiest' job of 2016, data scientists are in high demand

robot

Man and machine: combining intelligences to improve security

From the OODA Loop to AI, are the tools that provide full visibility the answer to the challenges of cyber security?

maze confused insure future

Catch insider threats with User Behavior Analytics

Securing and protecting confidential data and Intellectual Property (IP) assets has been always a challenge for organizations despite having various tools including data loss prevention (DLP) added to the cybersecurity strategy....

video

With Assistant, Google wants to always be with you

Google is harnessing the power of artificial intelligence to power Assistant, a new product that will follow users through their lives, helping them out with daily tasks and answering their questions.

ibm watson cybersecurity training

IBM's Watson is going to cybersecurity school

The result will be a cloud service called Watson for Cyber Security that's designed to provide insights into emerging threats as well as recommendations on how to stop them.

hand writing on chalkboard showing myth vs fact

Five most common myths about Web security

Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment.

Load More