AI algorithms News
July 31, 2017
CIOs who want machine learning capabilities first need to get oodles of data to the algorithms. Not to worry -- they can mail or truck it in.
July 14, 2017
Content management systems from OpenText and others offer artificial intelligence, but it isn't plug and play; AI requires human intelligence to tune and maintain algorithms.
June 22, 2017
Machine learning in cybersecurity applications for identity management systems are becoming more common today. But will algorithms be the best option for authenticating and authorizing users?
June 21, 2017
In this SearchCIO Q&A, author and data scientist Cathy O'Neil talks about the danger of trusting algorithms too much.
AI algorithms Get Started
Bring yourself up to speed with our introductory content
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
Evaluate AI algorithms Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt from chapter six of Research Methods for Cyber Security, authors Thomas W. Edgar and David O. Manz discuss the different types of machine learning. Continue Reading
The questions surrounding deep learning techniques used to be related to use cases, but more and more businesses are seeing operational hurdles to their adoption. Continue Reading
Consultant David Loshin explains some widely used data analytics and machine learning techniques and details how the associated automated algorithms work. Continue Reading
Manage AI algorithms
Learn to apply best practices and optimize your operations.
As companies enjoy the benefits that automation and AI algorithms bring to next-generation CRM, leaders must closely examine the legal and customer retention ramifications. Continue Reading