Trending


Search

More in Technology


2 years

What I Should Have Said, But Didn’t

Last week, in Las Vegas, during the largest fashion industry trade show, MAGIC/PROJECT, I delivered the keynote presentation for the YMA Fashion Scholarship Fund and UBM Advanstar. It was entitled, “Disruption is the Mother of Invention.” 

2 years

Profound Insights from Everyday Data!

In this day and age, almost every business is toying with the idea of “Big Data”, i.e. taking on vast volumes of data, surveying them using complex algorithms & predicting outcomes based on the past patterns. Everyone from Amazon and Google to presidential candidates are successfully using Big Data to further their missions - whether it is to precisely target prospective customers or to win elections!

2 years

How to Deliver the Perfect Project

The title of this article is a puzzling question for anyone who has ever sat on the seat of a project manager. How to make all ends meet with in a strict budget, and a cut-throat deadline? A global survey indicated that there is a net loss of about $97 million per $1 billion invested accounting to inefficient project handling.

2 years

5 Biggest Myths about Big Data

Big data has created a buzz ever since its inception. This technology has affected many sectors, and since so many experts are talking about it, the myths associated with it are also on the rise.

2 years

Information Management and the Associated Challenges

Managing the information stored in your system can be tedious. Information management is crucial because of several reasons; it can make or break a task.

2 years

Artificial Intelligence and Everyday Life

AI has proved to be a talisman for multiple industries. Ever wondered about artificial intelligence examples that the common man is enjoying?

2 years

Big Data and Cyber Espionage

While big data is empowering business decisions with information abundance, cyber espionage is on the rise too! Ever saw your computer’s cursor move on your screen automatically? While you safely assumed it was a system fault, an autonomous identity was using your system, hacking your applications, and dragging your data to the threshold of being stolen.