Artificial Intelligence

Artificial Intelligence | News, how-tos, features, reviews, and videos

artificial intelligence / machine learning / binary code / virtual brain

Blackout, New York City skyline

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...

tt19 051 thumb
video

Technology that scares us | TECH(talk)

Drones, self-driving vehicles and intrusive tech devices have our otherwise fearless hosts on edge. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp, plus Macworld’s Michael Simon discuss why that tech scares them and...

youtube thumbnails template
video

AI and your smartphone: How AI is transforming mobile apps

Computerworld’s Ken Mingis and Michael Simon from PCWorld and Macworld talk about how more mobile apps use artificial intelligence and how it improves features.

artificial intelligence brain machine learning digital transformation world networking

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.

thumb
video

Financial services embraces AI | TECH(talk)

With artificial intelligence (and machine learning) showing up in numerous industries, it's no surprise they're now gaining traction in financial services. Coming soon to a banking chatbot near you....

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

monitoring systems

Will your company be valued by its price-to-data ratio?

The job of every security professional is to protect their organization’s price-to-data ratio. In the past, it was typically the Sales and Marketing teams in the hot seat driving a company’s valuation by maintaining sales goals to...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

sequence 01.00 01 56 13.still001
video

CIO Leadership Live with Cathie Kozik, CIO at PSAV | Ep 13

In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using...

tech talk opening.00 15 04 21.still001
video

Machine learning and AI deciphered

Breaking through the hype around machine learning and artificial intelligence, our panel of Ken Mingis, Michael Simon and Serdar Yegulalp talk through the definitions and implications of the technology.

fingerprint scan biometric security system

N-dimensional behavioral biometrics: a viable solution for digital fraud?

Artificial intelligence can be used to stop identity fraud from reaching record-breaking highs.

ai video cover
video

The 5 best programming languages for AI development

Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.

sequence 01.00 10 55 13.still001
video

CIO Leadership Live with James Rinaldi, CIO, Director for Information Technology, NASA’s Jet Propulsion Laboratory | Ep 11

In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore...

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Load More
You Might Also Like