The difficulty of scaling a Frankencloud

Did you miss a session at the Data Summit? Watch On-Demand Here. This article was contributed by Kelley Kirby, product marketing analyst at Uptycs Let’s talk about the cloud (because who isn’t?). Over the last several years, we’ve seen cloud adoption skyrocket as organizations work to find the most efficient and cost-effective way of operating […]

Continue Reading

How automated RFPs can help organizations thrive

Did you miss a session at the Data Summit? Watch On-Demand Here. When drafting request for proposal (RFP) documents from scratch, organizations often lack time to customize them in a way that would truly resonate with potential vendors. Likewise, service suppliers that are sending their RFP responses can benefit from an automated process that lets […]

Continue Reading

Inspiring and retaining those vital intelligent creatives

Did you miss a session at the Data Summit? Watch On-Demand Here. This article was contributed by Marjorie Radlo-Zandi Throughout the tech universe and life sciences, intelligent creatives are among the most sought-after professionals. Their titles range from UX/UI designer, software developer, head of creative, scientist, to web developer and designer, visual designer, augmented reality […]

Continue Reading

Researchers turn to crowdsourcing for better YouTube recommendations

Join today’s leading executives online at the Data Summit live now! Watch here. In 2019, an analysis by ex-Google computer scientist, Guillaume Chaslot, found that YouTube’s recommendation algorithm overwhelmingly recommended Russia Today’s video about the Mueller report, the U.S. government report documenting Russian efforts to interfere in the 2016 presidential election. The video, which contained […]

Continue Reading

Decentralized identity using blockchain

Join today’s leading executives online at the Data Summit on March 9th. Register here. This article was contributed by Deepak Gupta, cofounder of LoginRadius, tech strategist, cybersecurity innovator, and author. Today, almost all of our digital identities are linked through devices, apps, and services. Service providers control these digital identities and their respective digital identity […]

Continue Reading