How elite investors use artificial intelligence and machine learning to gain an edge

How elite investors use artificial intelligence and machine learning to gain an edge

Artificial intelligence and machine learning might sound like the stuff of sci-fi movies. But hedge funds, major banks and private equity firms are already deploying next-generation technologies to...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
What is the Benefit of Modern Data Warehousing?

What is the Benefit of Modern Data Warehousing?

Access to relevant customer and industry information is the primary competitive advantage businesses have over their direct and indirect competitors today. It’s the smartest approach to remaining...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Who Owns the Data Your Business Uses? Not Knowing Could Hurt the Sale of Your Company.

Who Owns the Data Your Business Uses? Not Knowing Could Hurt the Sale of Your Company.

In late 2016, San Francisco-based software engineer Anthony Levandowski got a new job when car-sharing service Uber acquired Otto, the autonomous trucking company that he had started less than a year...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How Machine Learning is Improving Business Intelligence

How Machine Learning is Improving Business Intelligence

Simply put, machine learning (ML) is a process a software application uses to actively learn from imported data, using it in a way humans would use past experiences as a part of their learning...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Japan’s Grand Strategy And The Japanese Air Self Defense Force (JASDF) (I)

Japan’s Grand Strategy And The Japanese Air Self Defense Force (JASDF) (I)

Japanese Air Self Defense Force (JASDF) F-15 at Chitose Air Base, Japan in 2014. [Suga/Wikipedia]

In the previous post on Japan’s grand strategy, I observed its focus on the maritime domain and connectivity with the Indian Ocean. Much seaborne trade flows through this region, especially oil supplies for industrialized countries in East Asia, including Japan and China. These sea lines of communication (SLOC) extend far beyond Japan’s sovereign territory.

I also noted that the Japanese home islands required attention as well, as challenges to airspace sovereignty are ever present, even as they ebb and flow with the geopolitical situation of the times (see statistics through 2017).

To the student of military might, it may seem strange for a nation to project power in the maritime domain but to have a more reserved attitude towards projecting power in the air domain. After all, it has been well demonstrated and accepted that air power can be highly effective in the maritime domain, as evidenced by:

The Royal Navy launched the first all-aircraft ship-to-ship naval attack in history, employing 21 obsolete Fairey Swordfish biplane torpedo bombers from the aircraft carrier HMS Illustrious in the Mediterranean Sea. The attack struck the battle fleet of the Regia Marina at anchor in the harbor of Taranto. “Taranto, and the night of 11–12 November 1940, should be remembered for ever as having shown once and for all that in the Fleet Air Arm the Navy has its most devastating weapon.” — Admiral Andrew Cunningham, British Royal Navy

The infamous attack on the U.S. Navy Pacific Fleet at anchor on 7 December 1941 involved the notable use of naval aviation by the Imperial Japanese Navy’s 1st Air Fleet (KidÅ� Butai), “[A] revolutionary and potentially formidable instrument of sea power.â€�  — Gordon Prange.

The Royal Navy battleship HMS Prince of Wales and battlecruiser HMS Repulse were sunk by land-based bombers and torpedo bombers of the Imperial Japanese Navy off the coast of Malaya on 10 December 1941.

This ability to rapidly project power over great distances from the air contributed to the general state of surprise that the Allies found themselves (summed up nicely here):

The technological superiority of Japanese aviation, the bombing of Pearl Harbor, the sinking of HMS Prince of Wales and Repulse, and Japan’s rapid advance and dominance of the air shocked everyone. Japan was not only technologically superior in the air, its ability to support, replace, and move air assets was far superior to the Americans and the British. General Percival, the British commander in Malaya, was surprised that the Japanese were able to bomb Singapore in the first days of the war despite the fact that their nearest airbase was seven hundred miles away. He would soon profess his amazement at the performance of Japanese aircraft and their ability to launch coordinated attacks on targets all over Malaya.

Even after aerial defeats at Midway, the Marianas, and after the devastating strategic bombing campaign by the U..S Army Air Forces (USAAF), the Japanese were able to field effective air units, such as the 343rd K�kūtai (Naval Air Group), with veteran pilots, led by experienced commanders such as Minoru Genda (more about him later), using excellent fighter aircraft; the N1K-J Shiden Kai / “George�. In these limited situations, the balance of aerial combat was not so lopsided as the headline numbers suggest (here is an excellent thesis on the complexity in these ratios). These air defense efforts, however, where too little, too late for the Japanese, but they illustrate capabilities which would re-emerge after the war, and especially in military alliance and rearmament with the US.

So, after having innovated the use of air power in the 1930’s and clearly demonstrating this to the world in the 1940’s, why is today’s JASDF relatively circumspect, especially relative to the Japanese Maritime Self-Defense Force (JMSDF), as Japan gradually moves into a more assertive foreign policy (as discussed previously)?

The IoT Brings Smart Cities to Life

The IoT Brings Smart Cities to Life

In around 30 years, planet Earth will be home to almost ten billion people, 68 per cent of which will live in urban areas. And those urban areas will face a torrent of problems, as authorities will...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
IBM Takes Watson AI to AWS, Google, Azure

IBM Takes Watson AI to AWS, Google, Azure

IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM. Cloud computing has made a lot of...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
AI & Data: Avoiding The Gotchas

AI & Data: Avoiding The Gotchas

When it comes to an AI (Artificial Intelligence) project, there is usually lots of excitement. The focus is often on using new-fangled algorithms – such as deep learning neural networks – to unlock...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
The AI Industry’s Year of Ethical Reckoning

The AI Industry’s Year of Ethical Reckoning

We review products independently, but we may earn affiliate commissions from buying links on this page. Terms of use. Ever since deep neural networks won the world’s most important...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
12 Useful Things to Know About Machine Learning

12 Useful Things to Know About Machine Learning

Machine learning algorithms can figure out how to perform important tasks by generalizing from examples. This is often feasible and cost-effective where manual programming is not. As more data...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Some Useful Resources for Post-World War II U.S. Army Doctrine Development

Some Useful Resources for Post-World War II U.S. Army Doctrine Development

This list originated in response to a Twitter query discussing the history of post-World War II U.S. Army doctrine development. It is hardly exhaustive but it does include titles and resources that may not be widely known.

The first two are books:

Benjamin Jensen, Forging the Sword: Doctrinal Change in the U.S. Army (Stanford University Press, 2016)

Jensen focused on the institutional processes shaping the Army’s continual post-war World War II efforts to reform its doctrine in response to changes in the character of modern warfare.

Shimon Naveh, In Pursuit of Military Excellence: The Evolution of Operational Theory (Routledge, 1997)

In an excellent overview of the evolution of operational thought through the 20th century, Naveh devoted two chapters to the Army’s transition to Active Defense in the 70s and then to AirLand Battle in the 80s.

There are several interesting monographs that are available online:

Andrew J. Bacevich, The Pentomic Era: The U.S. Army Between Korea and Vietnam (NDU Press, 1986)

Paul Herbert, Deciding What Has to Be Done: General William E. DePuy and the 1976 Edition of FM 100-5, Operations (Combat Studies Institute, 1988)

John Romjue, From Active Defense to AirLand Battle: the Development of Army Doctrine 1973-1982 (TRADOC, 1984)

John Romjue, The Army of Excellence: The Development of the 1980s Army (TRADOC, 1997)

John Romjue, American Army Doctrine for the Post-Cold War (TRADOC, 1997)

A really useful place to browse is the Army Command and General Staff College’s online Skelton Combined Arms Research Library (CARL). It is loaded with old manuals and student papers and theses addressing a wide variety of topics related to the nuts and bolts of doctrine.

Another good place to browse is the Defense Technical Information Center (DTIC), which is a huge digital library of government sponsored research. I recommend searches on publications by the Army’s defunct operations research organizations: Operations Research Office (ORO), Research Analysis Corporation (RAC), and the Special Operations Research Office (SORO). The Combat Operations Research Group (CORG), particularly a series of studies of Army force structure from squads to theater HQ’s by Virgil Ney. There is much more to find in DTIC.

Two other excellent places to browse for material on doctrine are the Combat Studies Institute Press publications on CARL and the U.S. Army Center of Military History’s publications.

Some journals with useful research include the Journal of Cold War Studies and the Journal of Strategic Studies.

If anyone else has suggestions, let me know.

Moving toward an open future of data and AI

Moving toward an open future of data and AI

A faster journey to AI for the enterprise? What’s the secret? In this interview with Dinesh Nirmal, IBM vice president of analytics development, he shares the highlights of his upcoming Think...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How Data Analytics Can Boost Any Organization’s Performance

How Data Analytics Can Boost Any Organization’s Performance

Data analytics isn’t just the realm of high-tech industries any more. It’s making inroads into a wide variety of organizations, from financial firms to sports teams to medical institutions. One sign...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
The crucial role of the CLOUD in digital transformation driving business agility

The crucial role of the CLOUD in digital transformation driving business agility

Data is everywhere these days, companies are becoming data driven or are on their digital transformation journey. Great set of buzzwords but the question for companies remain. They are still...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Securing Devices and Data, Dispersive Brings Programmable Networking to IoT, IIoT and Blockchain

Securing Devices and Data, Dispersive Brings Programmable Networking to IoT, IIoT and Blockchain

Last week at the IoT Evolution Expo, Rick Conklin, CTO, Dispersive Networks, weighed in on the potential of programmable networking to enhance the security and efficiency of IoT and Industrial IoT...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Why NASA Converted Its Lessons Learned Database into a Knowledge Graph

Why NASA Converted Its Lessons Learned Database into a Knowledge Graph

Learning from mistakes—your own and those made by others—is a mark of effective organizations. Fostering a learning environment means seeing every possible outcome as a learning opportunity. And...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
9 components that should be part of every digital CIO’s innovation agenda

9 components that should be part of every digital CIO’s innovation agenda

Digital is the age of innovation. Innovation, in general, is surely a management discipline. To keep relevant, IT has to shift its reputation from a cost center to the innovation engine of the...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How Security Tokens Could Change Liquidity and Transform the World’s Economy

How Security Tokens Could Change Liquidity and Transform the World’s Economy

Traditionally, assets such as real estate, collectables and art have been relatively illiquid. This means that the asset cannot be easily bought or sold in the market. If an investor wants to sell a $100 million building, it usually will take some time before the investor has the money, if there is a market for in the first place. On the other hand, a company’s stock is relatively liquid as it can be quite easily converted into cash. Cash is considered the standard for liquidity as it can be converted into another asset at any moment.

Liquidity ratios are a measurement for how fast assets can be turned into cash to pay for short-term obligations. The current ratio looks at all those assets that can reasonably be converted into cash within one year. This is the least strict ratio. It covers not only cash but also inventories, accounts receivables and cash equivalents. The current ratio is calculated by dividing your current assets by your current liabilities. The cash ratio, however, is the most stringent and ignores assets such as your inventory. It only covers cash, cash alternatives and short-term investments.

Liquidity is important for organisations. Even highly profitable organisations can run into problems ...


Read More on Datafloq
5 reasons why asset management is a hot topic in 2019

5 reasons why asset management is a hot topic in 2019

Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of enterprises in 2019, you would...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Air Malta’s digital transformation; turning being small to an advantage

Air Malta’s digital transformation; turning being small to an advantage

Air Malta competes in a cutthroat business, where economies of scale are massive. So how does this tiny airline stay competitive? Alan Talbot tells Information Age how Air Malta’s digital...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
A Robotic Process Automation Tools Comparison | Simplilearn

A Robotic Process Automation Tools Comparison | Simplilearn

A Robotic Process Automation Tools Comparison | Simplilearn If you’re looking for the best RPA tools, you already know automation is the way of the future—and the present. By the end of 2018, Forrester predicts RPA will have replaced or supplemented 311,000 office jobs and 260,000 sales-related jobs. From Artificial Intelligence to Machine Learning to Robotic Process Automation (or RPA), automat...Read More.
IT Professionals: The Government Needs You | Simplilearn

IT Professionals: The Government Needs You | Simplilearn

IT Professionals: The Government Needs You | Simplilearn Are you an expert in cybersecurity, cloud computing, data analytics or artificial intelligence? Do you know how to modernize IT infrastructure? If so, the government needs your skill in 2019. According to Bloomberg Government, the US government spends more than $80 billion on Information Technology (IT) and, about 71 percent of that goes toward con...Read More.
12 Types Of Data That Businesses Need To Protect But Often Do Not

12 Types Of Data That Businesses Need To Protect But Often Do Not

As is obvious from seemingly incessant news reports of data breaches, businesses often do not adequately protect all of the information that they should be securing. In fact, in November 2015 the...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
What is CIO best practice when it comes to cloud security?

What is CIO best practice when it comes to cloud security?

Modern businesses continue to invest more heavily in the cloud than ever before. Global enterprise spending on cloud services is projected to grow by 17.3% in 2019 to total $206.2bn, up from $175.8bn...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
5 Questions that Will Help You Decide if a Salesforce Certification is Right for You | Simplilearn

5 Questions that Will Help You Decide if a Salesforce Certification is Right for You | Simplilearn

5 Questions that Will Help You Decide if a Salesforce Certification is Right for You | Simplilearn Salesforce is used in nearly every industry and countless companies today, and its reach continues to expand. Salesforce dominates because the Customer Relationship Management (CRM) technology is some of the most advanced in the world and the cloud computing model makes it affordable and scalable. In May 2018, IDC named Salesforce #1 in CRM, sales ...Read More.
Why Security Breaches Just Keep Getting Bigger and More Expensive

Why Security Breaches Just Keep Getting Bigger and More Expensive

The battle against hackers and online criminals seems almost unfairly tilted to their advantage. After all, hackers just need to find one vulnerability, while companies must secure all possible...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
A Common Trap That Undermines Analytics Credibility

A Common Trap That Undermines Analytics Credibility

Over the years, I’ve seen analytics professionals of all stripes blow their credibility and lessen their impact by falling into a common trap. I have to admit that I fell victim to the same trap early in my career. While our intentions are pure, our analytical minds and approaches can get the best of us and we explain too much. We’ll be better off if we learn to provide less detail and stop talking sooner than we are naturally inclined to.

Don't Say Too Much!

It seems like helping a business sponsor understand all of the details of how we created an analytical process would increase our credibility. After all, who wouldn’t be impressed with all of the issues we handled, all of the modeling approaches we tried, and all of the validation we performed? Unfortunately, it doesn’t actually work that way. It is easy to understand why if we consider a visit to a local auto mechanic to deal with a broken-down engine. Let’s see what two different mechanics might tell us and then consider which we’d actually have more confidence in.

Mechanic #1:

“It looks like you have a transmission issue. I’ll need to run multiple tests to validate that including a ...


Read More on Datafloq
Curiosity and Data Science: Let it Drive Your Business

Curiosity and Data Science: Let it Drive Your Business

We all know the age-old phrase: curiosity killed the cat. But when it comes to data science, curiosity can make your business come alive. In fact, the right mix of curiosity and data science could be...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Curiosity and Data Science: Let it Drive Your Business

Curiosity and Data Science: Let it Drive Your Business

We all know the age-old phrase: curiosity killed the cat. But when it comes to data science, curiosity can make your business come alive. In fact, the right mix of curiosity and data science could be...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Diddlysquat

Diddlysquat

This blog post is generated as a response to one of Richard Anderson’s comments to this blog post:

Validating Attrition

Richard Anderson used to work with me at Trevor Dupuy’s company DMSI and later at The Dupuy Institute. He has been involved in this business since 1987, although he had been away from it for over a decade.

His comment was: “Keep fighting the good fight Chris, but it remains an uphill battle.”

It is an uphill battle. For a brief moment, from 1986-1989 it appeared that the community was actually trying to move forward on the model validation and “base of sand” type issues. This is discussed to some extent in Chapter 18 of War by Numbers (pages 295-298).

In 1986 the office of the DUSA (OR) * reviewed the U.S. Army Concepts Analysis Agency’s (CAA) casualty estimation process in their models. This generated considerable comments and criticism of how it was being done. In 1987 CAA, with I gather funding from DUSA (OR), issued out the contract to develop the Ardennes Campaign Simulation Data Base (ACSDB). I was the program manager for that effort. That same year they issued out the contract to study Breakpoints (forced changes in posture) which I was also involved in.

So we had the army conducting an internal review of their models and finding them wanting. They then issued out a contract to validate them and they issued out a contract to examine the issue of breakpoints, which had not been seriously studied since the 1950s. This was at the initiative of Vandiver and Walt Hollis.

After than, everything kind of fell apart. The U.S. defense budget peaked in 1989 and the budget cuts started. So, even though the breakpoints study got a good start, there was no follow-on contract. The ACSDB ended up being used for a casual top-level validation effort that did not get into the nuts and bolts of the models. All the dozens of problems identified in the internal DUSA(OR) report resulted in no corrective action taken (as far as I know). Basically, budget was declining and maintaining hardware was more important that studies and analysis.

There was a resurgence of activity in the early 1990s, which is when the Kursk Data Base (KDB) was funded. But that was never even used for a validation effort (although it was used to test Lanchester). But funding was marginal during most of the 1990s, and the modeling community did little to improve their understanding and analysis of combat.

The nature of the missions changed after 9/11/2001 and The Dupuy Institute ended up focused on insurgencies (see America’s Modern Wars). Budget again started declining in 2009 and then sequestration arrived, killing everything.

The end result was that there was a period from 1986-1989 when the U.S. modeling community appeared to have identified their problems and were taking corrective action. Since 1989, for all practical purposes, diddlysquat.

So…..30 years later…..I am still fighting the “good fight.” But I am not optimistic. Nothing is going to happen unless people at senior levels fund something to happen. For the price of a Stryker or two, a huge amount of productive and useful work could be done. But to date, having an extra Stryker or two has been more important to the army.

For this year and next year the U.S. Army has increasing budgets. If they wanted to take corrective action….now would be the time. I suspect that bureaucratic inertia will have more weight than any intellectual arguments that I can make. Still, I have to give it one last try.

 

* DUSA (OR) = The Deputy Under Secretary of the Army (Operations Research). It was headed by Walt Hollis forever, but was completely shut down in recent times.

Why You Should Pay Attention to EVPN in Modern Data Centers

Why You Should Pay Attention to EVPN in Modern Data Centers

From the inception of data centers, there has been a need to standardize data transmission. At the current level of data transmission, we use something termed Ethernet VPN, or EVPN for short. EVPN, according to Juniper, is a network technology that utilizes a Layer 2 bridge in order to connect disparate networks together. When data centers were first developed, the topology was based on a couple of central links termed 'God boxes' that would be the point of entry and exit from the network into the wider world.

The main issue that occurred was that this type of network setup had problems with cross-communication, usually because of its reliance upon Layer 2 networking. As things progressed, data centers started to move away from Layer 2 and adopt Layer 3 networking instead, which relied on networking IP's for routing. The problem here was that Layer 3 added complexity to the system that relied on simplicity to operate. But how could Layer 2 be used despite its massive shortcomings?

Exploring Layer 2 More Directly

Layer 2 was designed to be an easier to use system of routing. It requires very little overhead and companies usually charge more for Layer 3 routing since it utilizes packet-switching ...


Read More on Datafloq
How to Avoid the Downside of a Cloud-First Strategy

How to Avoid the Downside of a Cloud-First Strategy

Cloud computing has evolved to the point where most enterprises have, to one degree or another, deployed cloud workloads. Our 2018 Cloud Survey found 70 percent of over 900 IT professionals use cloud...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Machine Learning: What it is and Why it Matters | Simplilearn

Machine Learning: What it is and Why it Matters | Simplilearn

Machine Learning: What it is and Why it Matters | Simplilearn A recent news item went as follows: “Apple buys machine learning firm Perceptio Inc., a startup, in an attempt to bring advanced image-classifying artificial intelligence to smartphones by reducing data overhead which is typically required of conventional methods.” Another recent development was that MIT researchers were working on obje...Read More.
Who’s an Ethical Hacker? | Simplilearn

Who’s an Ethical Hacker? | Simplilearn

Who’s an Ethical Hacker? | Simplilearn We hear about hacking on the news all the time—from Anonymous to fake news to denial of service attacks to data breaches, it seems like the bad guys are always wreaking havoc. And it’s true; the bad guys are doing all kinds of damage, from the annoying (spam) to the destructive (cyber attacks that steal personal data—or worse). B...Read More.
Robotic Process Automation: An Easy Place to Get Started with AI | Simplilearn

Robotic Process Automation: An Easy Place to Get Started with AI | Simplilearn

Robotic Process Automation: An Easy Place to Get Started with AI | Simplilearn A lot of companies are talking the talk when they bring up artificial intelligence (AI) and all the benefits it can bring to their organizations. But the reality is that with the AI field so vast, many line of business leaders don’t quite know how to get started. That’s where robotic process automation (RPA) comes into play. RPA offers ...Read More.
The Bigger Blockchain Picture: 5 Ways Blockchain Technology Matters | Simplilearn

The Bigger Blockchain Picture: 5 Ways Blockchain Technology Matters | Simplilearn

The Bigger Blockchain Picture: 5 Ways Blockchain Technology Matters | Simplilearn Blockchain is currently so closely associated with bitcoin that a Google search for something blockchain-related will often deliver bitcoin topics. If the world’s largest search engine so closely associates the two words, then blockchain must be all about bitcoin, right? Wrong.  Blockchain is so closely associated with bitcoin only due ...Read More.
Will Named Data Networking Kill The Cloud?

Will Named Data Networking Kill The Cloud?

The cloud has become a central facet of both the modern economy and the way we view digital technology in general. Over the past few years alone, business professionals in just about every industry imaginable have witnessed the cloud enter, disrupt, and eventually dominate virtually every sector of the marketplace. Despite the cloud’s impressive rise to prominence, however, there are reasons to believe that a forthcoming contender could dethrone it and become the new basis of the world wide web.

Will named data networking kill the cloud for good? Proponents and critics alike agree that there’s some time to go before named data networking takes off, but many are quickly coming to view this emerging technology as a major disruptor that could finally be what kills the cloud.

Say goodbye to your IP addresses

Perhaps the most eye-catching aspect of named data networking is that it effectively renders IP addresses useless. IP networking has largely remained the same over the past few decades, with precious few advancements having been made to seriously disrupt the market. The new arrival of named data networking could change that, however, as many tech specialists view this technology as having the potential to upend the way we connect ...


Read More on Datafloq
What Challenges Must the Blockchain and IoT Convergence Overcome?

What Challenges Must the Blockchain and IoT Convergence Overcome?

Although you may think of them as wholly separate concepts, the writing on the wall says the technologies we call IoT and blockchain are due for convergence, and probably sooner rather than later.

How fast this happens across the industry as a whole, as well as within individual organizations and companies, depends on besting a number of challenges and existing technological shortcomings.

Why So Much Overlap Between IoT and Blockchain?

The Internet of Things, or IoT, is the network of devices around the globe that use existing internet architecture to communicate with one another or with a home base. Such a web of connectivity has untold commercial and industrial applications, thanks mostly to how radically it improves the rate at which information can be exchanged.

Exchanging all this data requires a considerable amount of trust, which is where blockchain enters the equation. Blockchain gave rise to cryptocurrencies like bitcoin because it’s built on a shared and distributed ledger. This can be a hazy concept to visualize without an example. Financial transactions are the obvious choice.

Every kind of transaction under the sun, whether it’s transferring money between two people, qualifying somebody for a bank loan, buying and trading stocks, and exchanging one foreign currency for ...


Read More on Datafloq
How AI and Big Data Can Help Consumer Goods Companies Run Profitable Trade Promotions?

How AI and Big Data Can Help Consumer Goods Companies Run Profitable Trade Promotions?

The Consumer Goods industry( CPG) is both diverse and complex, making profitable trade promotion optimization a herculean task for CPG companies. The 5Ps of marketing involved in the CPG industry are...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Social Engineering Attacks by the Numbers: Prevalence, Costs, & Impact

Social Engineering Attacks by the Numbers: Prevalence, Costs, & Impact

Social engineering attacks are not as rare as you think. In fact, you might already be a victim – you just don’t know it yet. Social engineering works because people are almost always the weakest link in information security. We sometimes do not think about the things we do, or are in a hurry to double check the links we click on. Other times, we become too confident. Then there are those times when we find ourselves too submissive to authority. 

The most common types of social engineering attacks

Social engineering entails tricking people into giving their confidential information or manipulating them to do something. Social engineering is best understood by knowing the various forms it takes. What are the types of social engineering attacks?

Phishing

Have you ever gotten an e-mail from your bank asking you to log into their website and do something? Some people don’t even think twice and just click on the link included in the e-mail, enter their login credentials, and unwittingly fall victim to a phishing attack. In this scenario, the attackers have successfully obtained your login details, and they can now get into your online banking accounts.

Phishing is a widely known way to get information from an unsuspecting victim. However, there are ...


Read More on Datafloq
Andrew Ng: How to Choose Your First AI Project

Andrew Ng: How to Choose Your First AI Project

Tapping the power of AI technologies requires customizing them to your business context. The purpose of your first 1-2 pilot projects is only partly to create value; more importantly, the success of...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
‘Reputational Damage due to Data Breach is Unrepairable’

‘Reputational Damage due to Data Breach is Unrepairable’

In the digital era we are living in, data is indeed the new oil. However, like every other precious resource, data too faces the threat of theft, breach and various other challenges. Whenever there...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Fighting for Digital Transformation in the Government Sector

Fighting for Digital Transformation in the Government Sector

DevOps and digital transformation for government entities can mean addressing policy and security-driven roadblocks. When a software vendor lands a government contract it often leads to ongoing...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Paul Davis (RAND) on Bugaboos

Paul Davis (RAND) on Bugaboos

Just scanning the MORS Wargaming Special Meeting, October 2016, Final Report, January 31, 2017. The link to the 95-page report is here:

http://www.mors.org/Portals/23/Docs/Events/2016/Wargaming/MORS%20Wargaming%20Workshop%20Report.pdf?ver=2017-03-01-151418-980

There are a few comments from Dr. Paul Davis (RAND) starting on page 13 that are worth quoting:

I was struck through the workshop by a schism among attendees. One group believes, intuitively and viscerally, that human gaming–although quite powerful–is just a subset of modeling general. The other group believes, just as intuitively and viscerally, that human gaming is very different….

The impression had deep roots. Writings in the 1950s about defense modeling and systems analysis emphasized being scientific, rigorous, quantitative, and tied to mathematics. This was to be an antidote for hand-waving subjective assertions. That desire translated into an emphasis on “closed” models with no human interactions, which allowed reproducibility. Most DoD-level models have often been at theater or campaign level (e.g., IDAGAM, TACWAR, JICM, Thunder, and Storm). Many represent combat as akin to huge armies grinding each other down, as in the European theaters of World Wars I and II. such models are quite large, requiring considerable expertise and experience to understand.

Another development was standardized scenarios and date set with the term “data” referring to everything from facts to highly uncertain assumptions about scenario, commander decisions, and battle outcomes. Standardization allowed common baselines, which assured that policymakers would receive reports with common assumptions rather than diverse hidden assumptions chosen to favor advocates’ programs. The baselines also promoted joint thinking and assured a level playing field for joint analysis. Such reasons were prominent in DoD’s Analytic Agenda (later called Support for Strategic Analysis). Not surprisingly, however, the tendency was often to be disdainful of such other forms of modeling as the history-base formula models of Trevor Dupuy and the commercial board games of Jim Dunnigan and Mark Herman. These alternative approaches seen as somehow “lesser,” because they were allegedly less rigorous and scientific. Uncertainty analysis has been seriously inadequate. I have demurred on these matters for many years, as in the “Base of Sand” paper in 1993 and more recent monographs available on the RAND website….

The quantitative/qualitative split is a bugaboo. Many “soft” phenomena can be characterized with meaningful, albeit imprecise, numbers.

The Paul Davis “Base of Sand” paper from 1991 is here: https://www.rand.org/pubs/notes/N3148.html

 

Simplilearn and People Matters Partner for Research Study Assessing Onboarding | Simplilearn

Simplilearn and People Matters Partner for Research Study Assessing Onboarding | Simplilearn

Simplilearn and People Matters Partner for Research Study Assessing Onboarding | Simplilearn Has your onboarding process been vetted out recently? If not, a stale process is not doing your organization any favors. An onboarding process that is limited to human resources formalities falls short in giving employees the skills and preparation they need to successfully perform their jobs. For that reason, it comes as no surprise that only 27 p...Read More.
Databricks’ $250 Million Funding Supports Explosive Growth and Global Demand for Unified Analytics; Brings Valuation to $2.75 Billion

Databricks’ $250 Million Funding Supports Explosive Growth and Global Demand for Unified Analytics; Brings Valuation to $2.75 Billion

Company Exceeds $100 Million Annual Recurring Revenue and Experienced Approximately 3X Growth in Subscription Revenue; Andreessen Horowitz Leads the Round and Microsoft Becomes an Investor San...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
6 Analytics to Watch When Marketing with YouTube | Simplilearn

6 Analytics to Watch When Marketing with YouTube | Simplilearn

6 Analytics to Watch When Marketing with YouTube | Simplilearn YouTube is the world’s second largest search engine, behind only Google. If that seems strange, that YouTube is a search engine and not a video platform, consider our preference for video as content. I might go to Google to find a website that sells a part I need for the lawnmower, but I’m going to search on YouTube for a video that sho...Read More.
6 Reasons a Microsoft Azure Certification is the Secret to a Great Cloud Computing Career | Simplilearn

6 Reasons a Microsoft Azure Certification is the Secret to a Great Cloud Computing Career | Simplilearn

6 Reasons a Microsoft Azure Certification is the Secret to a Great Cloud Computing Career | Simplilearn In the recent past the entire concept of computing has seen a paradigm shift towards cloud computing. This internet-based computing model provides data and shared computer processing to computers and other devices on demand. Cloud computing facilitates universal access to a shared pool of computing resources, enabling information to be transferred...Read More.
How AI is Keeping Us Safe From Drivers Who Use Their Mobile Phones at the Wheel

How AI is Keeping Us Safe From Drivers Who Use Their Mobile Phones at the Wheel

Wherever you go and whatever you do in your day-to-day lives, safety should be guaranteed. But with drivers continually using mobile phones at the wheel, a worrying trend is emerging for road safety.

For instance, the use of mobile phones while driving is responsible for one death every ten days in the UK, but AI is leading the way when it comes to preventative measures.

In the US, mobile phone cause approximately 70,000 crashes a year.



Image Source: Statista

It was recently reported that in Sydney, Australia, police have been pioneering a new kind of camera technology that’s designed to catch drivers using their handsets out, despite clandestine attempts to keep their usage at the wheel out of view.

After a successful trial period in October, last year which led to over 11,000 drivers being handed fines, the first of its kind camera is being rolled out in the areas of the city in a bid to beat growing mobile phone usage at the wheel and encourage safer driving.

The technology works by utilising radar-based sensor systems which take detailed photographs through the windscreens of vehicles. Duties then get passed on to a dedicated AI processor that analyses the image for clear evidence of wrongdoing.

The usage ...


Read More on Datafloq
Companies Are Failing in Their Efforts to Become Data-Driven

Companies Are Failing in Their Efforts to Become Data-Driven

The percentage of firms identifying themselves as being data-driven has declined in each of the past 3 years — from 37.1% in 2017 to 32.4% in 2018 to 31.0% this year. These sobering results and...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Prospects and Challenges of Applying Big Data in Education

Prospects and Challenges of Applying Big Data in Education

Big data is not a wonder cure for productivity and economic growth in every sector. In some fields, such as education, big data, if applied the right way can drive forward innovation and new approaches. But educators have to go about this right way.

Big data solutions have generated a lot of hype and excitement over the last few years. It is - or was - seen as the answer to everything. Capable of generating trillions in new economic activity and opportunities. And then machine learning became a buzzword that soon attached itself to big data. Again, there was considerable hype around the potential impact of combining big data with machine learning, in education and dozens of other sectors. 

As Macmillan Learning notes, “gaining useful and reliable insights from educational data - big or small - is part science and part art.� 

In other words, you can’t take a whole load of data sources, a handful of questions, some software and maybe a data scientist or two, and hope for the best. Instead, let’s consider what schools and colleges hope to gain and how they can achieve an advantage through big data. 

Challenges of applying big data in education 

Comparable to other large organizations, schools ...


Read More on Datafloq
The Power of AI in Social Media

The Power of AI in Social Media

In recent times, social media and the quintessence of scientific advancement- artificial intelligence together, have been creating avalanches in the world of formative symbiosis. The bygone methods of marketing have paved the way for social media marketing- a novelty that has taken over the current civilization. It was inadvertent that social media platforms would take up the disembodied concept of AI and make the most of it by exploring the infinite loops of this intricately-crafted software. Indeed, this is attracting the attention of investors and marketers, who are ready to invest their time and money in this powerful media. Investors and philanthropists like Erik Gordon and many others are also looking at social media to bring about social changes.

Social media marketing has experienced a complete paradigm shift by involving the nuances of AI. The excellent benefits that this shift has brought about to market now seem indispensable.  AI in social media serves as an estuary which has both the personal and professional facets of a person’s life. Demographic quotations and estimates have projected a lucrative, favorable curve that shows the undeniable superiority of AI within the mutating circles of social media. 

Social media coupled with AI is so powerful that it ...


Read More on Datafloq
Using Predictive Analytics to Assess the ROI of a New Web Startup

Using Predictive Analytics to Assess the ROI of a New Web Startup

Countless entrepreneurs aspire to start successful online retail businesses. They are enamored with the dream of working from home and having the opportunity to make virtually unlimited wealth. Unfortunately, the probability of success in this field is often considerably lower than they would like to believe. Nevertheless, some e-commerce entrepreneurs can thrive by taking advantage of big data technology.

Predictive analytics helps savvy entrepreneurs make realistic projections and develop sound strategies to meet them. They should understand the benefits of big data analytics and use it to their fullest potential.

The dismal state of the e-commerce industry indicates that predictive analytics is more important than ever

Online entrepreneurs often get overly optimistic when they hear data about the growing e-commerce industry. They have read statistics showing that the industry is expected to grow to $1, trillion by 2024. At first glance, this figure suggests that there is a tremendous opportunity for them to enrich themselves by capturing a small share of the market.

Unfortunately, entrepreneurs that take a more introspective view will see that their outlook is much bleaker. They will notice that the industry is heavily consolidated. A small percentage of e-commerce companies are dominating the market, while the vast majority struggle to ...


Read More on Datafloq
Measuring the Success of Your Blockchain Implementation

Measuring the Success of Your Blockchain Implementation

It’s been almost a decade since blockchain technology made its debut. Since then, blockchain has evolved more quickly than anyone could have anticipated. It was designed to be a decentralized tool...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How The US Online Gaming Industry Is Turning To Big Data To Survive

How The US Online Gaming Industry Is Turning To Big Data To Survive

The United States online gaming industry is nearly six years old. Former Nevada governor Brian Sandoval passed the first online gaming bill in February 2013. Many experts hoped that the market would...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Fighting Back Against Phishing: A Workplace Concern

Fighting Back Against Phishing: A Workplace Concern

Is someone phishing in your inbox? It’s more likely than you think. Phishing attacks are common online attacks that aim to steal useful information, from account credentials to personal data. Unlike traditional hacking, though, what sets phishing apart is its personal nature – the person behind a phishing scam typically pretends to be someone else, someone you would be inclined to trust, in order to obtain this information. Even the classic “Nigerian Prince� scam is technically a form of phishing, but today’s phishing scams are more nuanced and harder to identify.

Phishing For Whales

Workplaces are especially vulnerable to phishing in its newest guise, known as whaling. Whalers target those higher up in a company, such as managers or c-suite executives, with the aim of attaining confidential company information; they may even pretend to be the CEO or president of that very business because most people won’t check with their boss to confirm the email’s source, especially if they’re away on travel. Whalers know where the power is within a company, and they know exactly what they’re looking for, from financials to credentials with wide-ranging access. But while whaling attacks and other types of phishing can be hard to identify at times, ...


Read More on Datafloq
7 predictions for artificial intelligence in 2019

7 predictions for artificial intelligence in 2019

Without question, 2018 was a big year for artificial intelligence (AI) as it pushed even further into the mainstream, successfully automating more functionality than ever before. Companies are...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Engaging the Phalanx (part 7 of 7)

Engaging the Phalanx (part 7 of 7)

Hopefully this is my last post on the subject (but I suspect not, as I expect a public response from the three TRADOC authors). This is in response to the article in the December 2018 issue of the Phalanx by Alt, Morey and Larimer. The issue here is the “Base of Sand” problem, which is what the original blog post that “inspired” their article was about:

Wargaming Multi-Domain Battle: The Base Of Sand Problem

While the first paragraph of their article addressed this blog post and they reference Paul Davis’ 1992 Base of Sand paper in their footnotes (but not John Stockfish’s paper, which is an equally valid criticism), they then do no discuss the “Base of Sand” problem further. They do not actually state whether this is a problem or not a problem. I gather by this notable omission that in fact they do understand that it is a problem, but being employees of TRADOC they are limited as to what they can publicly say. I am not.

I do address the “Base of Sand” problem in my book War by Numbers, Chapter 18. It has also been addressed in a few other posts on this blog. We are critics because we do not see significant improvement in the industry. In some cases, we are seeing regression.

In the end, I think the best solution for the DOD modeling and simulation community is not to “circle the wagons” and defend what they are currently doing, but instead acknowledge the limitations and problems they have and undertake a corrective action program. This corrective action program would involve: 1) Properly addressing how to measure and quantify certain aspects of combat (for example: Breakpoints) and 2) Validating these aspects and the combat models these aspects are part of by using real-world combat data. This would be an iterative process, as you develop and then test the model, then further develop it, and then test it again. This moves us forward. It is a more valued approach than just “circling the wagons.” As these models and simulations are being used to analyze processes that may or may not make us fight better, and may or may not save American service members lives, then I think it is important enough to do right. That is what we need to be focused on, not squabbling over a blog post (or seven).

The Effects Of Employing Artificial Intelligence In Mobile App Development

The Effects Of Employing Artificial Intelligence In Mobile App Development

Currently, there is a whole new class of application possibilities driven by the definitive growth of artificial intelligence (AI) and machine learning (ML). With the introduction of these new technologies in the industry, there is an obvious transformation in app development that will transform the way people work and interact. However, it is important to note that this is not the artificial version of the human mind.

Now that some top app development companies are looking to integrate artificial intelligence (AI) into their app development processes, it becomes imperative to analyze how the emergence of this relatively new technology development in the mobile work will affect the society and change the world.

From predictive analytics to chatbots and lots more, startups, growing tech businesses, and even top app development companies are already exploring meaningful ways by which business and customer data can be harnessed to deliver new efficient products and better customer service.

The influence of AI in mobile app development

While the recent introduction of Apple’s Siri appears to be the most visible outcome of AI to many consumers in the industry, it is, however, very important to note that this technology trend has been a very influential force in app development for ...


Read More on Datafloq
Introducing Cloudera DataFlow (CDF)

Introducing Cloudera DataFlow (CDF)

Late last year, the news of themerger between Hortonworks and Clouderashook the industry and gave birth to the new Cloudera – the combined company with a focus on being an Enterprise Data Cloud...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
5G Revolution: Telcos Becoming the New App Store for Industrial Apps

5G Revolution: Telcos Becoming the New App Store for Industrial Apps

5G technology is knocking on our doors and is said to be around the corner. Mobile service providers have upped their game recently and are holding talks, events and discussions to formulate a plan for the launch of this futuristic network. Not only is 5G technology on the agenda at conferences, but many telecom providers have started testing it out inside labs.

With the advent of 5G approaching, serious questions are being asked of the potential this network has to deliver on what it has been promising.

5G and its Capabilities

5G promises capabilities that few other modern era technologies can rival. Some of its disruptive technologies include:


An ultra-low latency communication
Higher security and network slicing: This includes the presence of different networks for diverse applications and challenges the perception of one network for everything.
Higher bandwidth. It is expected that 5G will give 1,000 times more bandwidth and 50 times greater latency than the previous 4G technology.


These advances are intuitive, but the question remains the same; is 5G going to be just another G, or is it a whole new disruption? Below, we look at some of the possibilities that come along with this amazing technology.

As a proud partner of Ericsson, I had the ...


Read More on Datafloq
Do You Need a Chief Data Governance Officer?

Do You Need a Chief Data Governance Officer?

Do you need a chief data governance officer or a chief data officer? Here are three questions that will help you decide. It was before blockchain, serverless computing, and augmented everything...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
5 Ways Bluetooth 5.1 Will Improve Location-Based Tech as We Know It

5 Ways Bluetooth 5.1 Will Improve Location-Based Tech as We Know It

The Bluetooth Special Interest Group is the nonprofit standards-setting organization for Bluetooth technology. It recently released specifications for Bluetooth 5.1, and the promises in the document have tech analysts abuzz about the possibilities, especially for better location accuracy.

As a start, the Bluetooth devices available now can track things down to about 10 meters, but those with Bluetooth 5.1 will offer location-finding details down to 10 centimeters.

Additionally, current Bluetooth technology estimates distance by relying on signal strength. But, a new direction-finding capability on Bluetooth 5.1 will go further and incorporate multiple antennas on phones or Bluetooth transmitters.

So, with these new developments made public, people can anticipate some of the ways they might improve location-based technologies. Here are five possibilities.

1. More Peace of Mind for Parents and Pet Owners

The market is full of Bluetooth tracking devices that cater to parents with rambunctious toddlers. They're especially useful if parents take their kids to crowded places like fairs or beaches and lose sight of them. Since Bluetooth 5.1 offers better accuracy and shows a wearer's location at a substantially shorter distance than earlier Bluetooth versions, this improvement could increase the appeal of Bluetooth trackers for toddlers.

Most of the child trackers available now use different ...


Read More on Datafloq
Has The Army Given Up On Counterinsurgency Research, Again?

Has The Army Given Up On Counterinsurgency Research, Again?

Mind-the-Gap

[In light of the U.S. Army’s recent publication of a history of it’s involvement in Iraq from 2003 to 2011, it may be relevant to re-post this piece from from 29 June 2016.]

As Chris Lawrence mentioned yesterday, retired Brigadier General John Hanley’s review of America’s Modern Wars in the current edition of Military Review concluded by pointing out the importance of a solid empirical basis for staff planning support for reliable military decision-making. This notion seems so obvious as to be a truism, but in reality, the U.S. Army has demonstrated no serious interest in remedying the weaknesses or gaps in the base of knowledge underpinning its basic concepts and doctrine.

In 2012, Major James A. Zanella published a monograph for the School of Advanced Military Studies of the U.S. Army Command and General Staff College (graduates of which are known informally as “Jedi Knights�), which examined problems the Army has had with estimating force requirements, particularly in recent stability and counterinsurgency efforts.

Historically, the United States military has had difficulty articulating and justifying force requirements to civilian decision makers. Since at least 1975, governmental officials and civilian analysts have consistently criticized the military for inadequate planning and execution. Most recently, the wars in Afghanistan and Iraq reinvigorated the debate over the proper identification of force requirements…Because Army planners have failed numerous times to provide force estimates acceptable to the President, the question arises, why are the planning methods inadequate and why have they not been improved?[1]

Zanella surveyed the various available Army planning tools and methodologies for determining force requirements, but found them all either inappropriate or only marginally applicable, or unsupported by any real-world data. He concluded

Considering the limitations of Army force planning methods, it is fair to conclude that Army force estimates have failed to persuade civilian decision-makers because the advice is not supported by a consistent valid method for estimating the force requirements… What is clear is that the current methods have utility when dealing with military situations that mirror the conditions represented by each model. In the contemporary military operating environment, the doctrinal models no longer fit.[2]

Zanella did identify the existence of recent, relevant empirical studies on manpower and counterinsurgency. He noted that “the existing doctrine on force requirements does not benefit from recent research� but suggested optimistically that it could provide “the Army with new tools to reinvigorate the discussion of troops-to-task calculations.�[3] Even before Zanella published his monograph, however, the Defense Department began removing any detailed reference or discussion about force requirements in counterinsurgency from Army and Joint doctrinal publications.

As Zanella discussed, there is a body of recent empirical research on manpower and counterinsurgency that contains a variety of valid and useful insights, but as I recently discussed, it does not yet offer definitive conclusions. Much more research and analysis is needed before the conclusions can be counted on as a valid and justifiably reliable basis for life and death decision-making. Yet, the last of these government sponsored studies was completed in 2010. Neither the Army nor any other organization in the U.S. government has funded any follow-on work on this subject and none appears forthcoming. This boom-or-bust pattern is nothing new, but the failure to do anything about it is becoming less and less understandable.

NOTES

[1] Major James A. Zanella, “Combat Power Analysis is Combat Power Density� (Ft. Leavenworth, KS: School of Advanced Military Studies, U.S. Army Command and General Staff College, 2012), pp. 1-2.

[2] Ibid, 50.

[3] Ibid, 47.

How AI Is Changing the Role of the Designer

How AI Is Changing the Role of the Designer

Many fear the possibility of a machine taking over the role of a designer. We’re already seeing automation take jobs away from human workers in factories and fast food locations worldwide, but can AI...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
What is low-code development? A Lego-like approach to building software

What is low-code development? A Lego-like approach to building software

The trend of enterprises swapping traditional software development approaches in favor of agile and DevOps, which enable programmers to quickly build and continuously upgrade software in coding...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Exploring Artificial Intelligence at the Edge

Exploring Artificial Intelligence at the Edge

As the adoption of artificial intelligence (AI), deep learning, and big data analytics continues to grow, it is becoming increasingly important for edge computing systems to process large data sets...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
5 Simple Ways to Ensure the Data Security of Your Online Business

5 Simple Ways to Ensure the Data Security of Your Online Business

Data security is a top concern for consumers, understandably. A recent study from IBM found that 75% of customers will not purchase from an online company if there are any doubts regarding their data’s security. 85% of online shoppers agreed that companies need to do more to protect customer data, but only 20% felt that their information was truly safe.

Being a data-driven business is important in today’s market, but it can only be fueled by quality data sources about your audiences and the market. If customers are going to hand over their sensitive information or feel safe enough to interact with your site and provide personal data, they need to know that their data is in good hands. Here are five of the simplest ways to keep your online business secure and build this essential trust with your customers.

1. Focus on Security at Checkout

The checkout stage will cause the majority of your customers to question whether or not they want to share their data. If they have any worries about the security of your site, it could lead to abandonment. In fact, 15% of online shoppers will leave without a purchase due to concerns about payment security.

Be sure that the online store platform you use ...


Read More on Datafloq
4 Compelling Ways to Use Artificial Intelligence in Your Business

4 Compelling Ways to Use Artificial Intelligence in Your Business

Technology has become a normal part of our lives and thus affecting how we do our jobs and manage a business. The best part about using modern technology is that it makes your work easier and, it is not as threatening as people think. Incorporating it in your business will not only help save money but will also improve the efficiency of operations.

Unless you have been living under a rock, you have already heard about Artificial intelligence(AI). AI is all around us in nearly all aspects of our lives and it’s changing the world. Many people visualize a future with robots and machines doing manual tasks for humans when asked what they thought about Artificial intelligence; lacking knowledge that the use of AI is not only in the future but has already started and will continue growing. So, in what ways can you use AI in your business?

Powerful ways to use artificial intelligence in your business

1. Using AI in marketing strategies

Data-driven marketing using artificial intelligence is used by many businesses lately. There are many benefits one can get by using AI for marketing. Some of them include;


Predictive customer service
A better understanding of customer needs and thus one can personalize news ...


Read More on Datafloq
Top-10 Artificial Intelligence Startups in Japan

Top-10 Artificial Intelligence Startups in Japan

The Land of the Rising Sun is a peculiar mix of tradition and modernity. Nowhere else in the world can one see centuries-old shrines sitting comfortably next to high tech skyscrapers in such harmony....

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
10 female tech innovators you may not have heard of

10 female tech innovators you may not have heard of

From the early 19th century to the present day, women have played crucial roles in the development of technology, however they are systematically underrepresented – and underpaid – in STEM industries...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Multi-Technology: The Future of Geolocation

Multi-Technology: The Future of Geolocation

In the big world of IoT, location tracking is the next frontier! Location tracking for humans is already an integral part of our lives, especially for navigation. Traditional technologies enabling...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains

Top 10 Ways Internet Of Things And Blockchain Strengthen Supply Chains

The majority of enterprises are prioritizing their blockchain pilots that concentrate on supply chains improvements (53%) and the Internet of Things (51%) according to  Deloitte’s latest blockchain...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How Big Data Can Help Create Demo Videos That Make Their Mark

How Big Data Can Help Create Demo Videos That Make Their Mark

Big data has been very useful in marketing. Brands spend $57 billion a year on big data solutions. There are countless ways to use big data in marketing. One approach that few people are aware of is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How Big Data Can Help Create Demo Videos That Make Their Mark

How Big Data Can Help Create Demo Videos That Make Their Mark

Big data has been very useful in marketing. Brands spend $57 billion a year on big data solutions. There are countless ways to use big data in marketing. One approach that few people are aware of is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Millennials may be the last generation to know so little about their health

Millennials may be the last generation to know so little about their health

One of the problems of the Second Artificial Intelligence (AI) Winter (1987-1993) was that there was not enough data to go around. We did not yet understand the value of “Big Data,� and academia was...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
BBVA, Spain’s Second-Largest Bank, Is Using Artificial Intelligence To Transform Itself

BBVA, Spain’s Second-Largest Bank, Is Using Artificial Intelligence To Transform Itself

When Francisco Gonzalez, who at the time was executive chairman of Spain’s second-largest bank, BBVA, proclaimed in 2015 that “BBVA will be a software company in the future,” it was...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
A Winning Game Plan For Building Your Data Science Team

A Winning Game Plan For Building Your Data Science Team

One of the most exciting challenges I have at Hitachi as the Vice-Chairmen of Hitachi’s “Data Science 部会� is to help lead the development of Hitachi’s data science capabilities. We have a target...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Transforming Big Data Processing Through Blockchain and AI

Transforming Big Data Processing Through Blockchain and AI

Big data is currently on everybody’s lips with stringent regulations the order of the day and security breaches happening on a regular basis. A company called Endor has come up with a blockchain and...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Data Management Falls Short for Unstructured Data

Data Management Falls Short for Unstructured Data

Although data-centric enterprises have adequate strategies in place for managing their structured data, current tools are not sufficient for managing the recent wave of unstructured data growth,...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Is blockchain driving an evolution or a revolution in the energy ecosystem?

Is blockchain driving an evolution or a revolution in the energy ecosystem?

The World Energy Council in partnership with PwC has interviewed 39 top level management energy leaders to find an answer to this question. This is a high-level Brief of key insights gained from...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Have Private Clouds Finally Found Their Place In The Enterprise?

Have Private Clouds Finally Found Their Place In The Enterprise?

The National Institute of Standards and Technology (NIST), an agency of the US , formulated the core definitions of cloud computing back in 2011, including the definition of private cloud. “Private...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Graph Technology Landscape 2019

Graph Technology Landscape 2019

Few years ago I decided that one day I would create a Graph Technology Landscape map, which would be useful for everyone who wants to discover the players around graph technologies. I started to...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Historians and the Early Era of U.S. Army Operations Research

Historians and the Early Era of U.S. Army Operations Research

While perusing Charles Shrader’s fascinating history of the U.S. Army’s experience with operations research (OR), I came across several references to the part played by historians and historical analysis in early era of that effort.

The ground forces were the last branch of the Army to incorporate OR into their efforts during World War II, lagging behind the Army Air Forces, the technical services, and the Navy. Where the Army was a step ahead, however, was in creating a robust wartime historical field history documentation program. (After the war, this enabled the publication of the U.S. Army in World War II series, known as the “Green Books,� which set a new standard for government sponsored military histories.)

As Shrader related, the first OR personnel the Army deployed forward in 1944-45 often crossed paths with War Department General Staff Historical Branch field historian detachments. They both engaged in similar activities: collecting data on real-world combat operations, which was then analyzed and used for studies and reports written for the use of the commands to which they were assigned. The only significant difference was in their respective methodologies, with the historians using historical methods and the OR analysts using mathematical and scientific tools.

History and OR after World War II

The usefulness of historical approaches to collecting operational data did not go unnoticed by the OR practitioners, according to Shrader. When the Army established the Operations Research Office (ORO) in 1948, it hired a contingent of historians specifically for the purpose of facilitating research and analysis using WWII Army records, “the most likely source for data on operational matters.�

When the Korean War broke out in 1950, ORO sent eight multi-disciplinary teams, including the historians, to collect operational data and provide analytical support for U.S. By 1953, half of ORO’s personnel had spent time in combat zones. Throughout the 1950s, about 40-43% of ORO’s staff was comprised of specialists in the social sciences, history, business, literature, and law. Shrader quoted one leading ORO analyst as noting that, “there is reason to believe that the lawyer, social scientist or historian is better equipped professionally to evaluate evidence which is derived from the mind and experience of the human species.�

Among the notable historians who worked at or with ORO was Dr. Hugh M. Cole, an Army officer who had served as a staff historian for General George Patton during World War II. Cole rose to become a senior manager at ORO and later served as vice-president and president of ORO’s successor, the Research Analysis Corporation (RAC). Cole brought in WWII colleague Forrest C. Pogue (best known as the biographer of General George C. Marshall) and Charles B. MacDonald. ORO also employed another WWII field historian, the controversial S. L. A. Marshall, as a consultant during the Korean War. Dorothy Kneeland Clark did pioneering historical analysis on combat phenomena while at ORO.

The Demise of ORO…and Historical Combat Analysis?

By the late 1950s, considerable institutional friction had developed between ORO, the Johns Hopkins University (JHU)—ORO’s institutional owner—and the Army. According to Shrader,

Continued distrust of operations analysts by Army personnel, questions about the timeliness and focus of ORO studies, the ever-expanding scope of ORO interests, and, above all, [ORO director] Ellis Johnson’s irascible personality caused tensions that led in August 1961 to the cancellation of the Army’s contract with JHU and the replacement of ORO with a new, independent research organization, the Research Analysis Corporation [RAC].

RAC inherited ORO’s research agenda and most of its personnel, but changing events and circumstances led Army OR to shift its priorities away from field collection and empirical research on operational combat data in favor of the use of modeling and wargaming in its analyses. As Chris Lawrence described in his history of federally-funded Defense Department “think tanks,” the rise and fall of scientific management in DOD, the Vietnam War, social and congressional criticism, and an unhappiness by the military services with the analysis led to retrenchment in military OR by the end of the 60s. The Army sold RAC and created its own in-house Concepts Analysis Agency (CAA; now known as the Center for Army Analysis).

By the early 1970s, analysts, such as RAND’s Martin Shubik and Gary Brewer, and John Stockfisch, began to note that the relationships and processes being modeled in the Army’s combat simulations were not based on real-world data and that empirical research on combat phenomena by the Army OR community had languished. In 1991, Paul Davis and Donald Blumenthal gave this problem a name: the “Base of Sand.”

How to embrace event-driven graph analytics using Neo4j and Apache Kafka

How to embrace event-driven graph analytics using Neo4j and Apache Kafka

With the new Neo4j Kafka streams now available, my fellow Neo4j colleague Tom Geudens and I were keen to try it out. We have many use-cases in mind that leverage the power of graph databases and...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
7 Integration Platform as a Service (iPaaS) Vendors to Watch in 2019

7 Integration Platform as a Service (iPaaS) Vendors to Watch in 2019

Cloud and hybrid integration are quickly becoming the new norm for organizations that wish to connect applications and data for speedier insight. This is important in a time where data type...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
When Augmented and Virtual Reality Hit the Theater

When Augmented and Virtual Reality Hit the Theater

Back in 1994, Julie Martin, a theater director from Australia, created a stage performance called Dancing in Cyberspace. The performance featured dancers and acrobats engaging with virtual objects of human size. Australia Council for the Arts supported the idea and its implementation, and this is how the first augmented-reality-powered theater performance saw the light.

Today, 25 years later, augmented and virtual reality application in art is no longer a novelty. In the article embracing the influence of AR on the visual art, AR developers from Iflexion recall the brightest examples of the symbiosis of AR and art. And theaters definitely don’t lag behind, while augmented reality developers help theaters create various immersive and impressive experiences for their audiences in a number of unexpected ways. AR and VR change the traditional actor-space-audience paradigm, making it more like an audience-space relationship. The marriage of AR/VR technology and art allows spectators to become part of the plot, while actors and play producers are usually limited only by their own imagination. Here are some examples of how technology changes the theater, a most conservative art form.

Making the theater all-pervasive

59.production is a London-based creative studio that makes the theater go beyond the traditional wooden stage. In ...


Read More on Datafloq
How the tech industry can help fix our AI skills shortage

How the tech industry can help fix our AI skills shortage

In 2015, Uber opened a research facility around the corner from Carnegie Mellon University’s National Robotics Engineering Center in a move positioned as a partnership between the two organizations....

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Intro to Redis Cluster Sharding – Advantages, Limitations, Deploying & Client Connections

Intro to Redis Cluster Sharding – Advantages, Limitations, Deploying & Client Connections

Redis Cluster is the native sharding implementation available within Redis that allows you to automatically distribute your data across multiple nodes without having to rely on external tools and utilities. At ScaleGrid, we recently added support for Redis Clusters on our platform through our fully managed Redis hosting plans. In this post, we’re going to introduce you to the advanced Redis Cluster sharding opportunities, discuss its advantages and limitations, when you should deploy, and how to connect to your Redis Cluster.

Sharding with Redis Cluster

The entire keyspace in Redis Clusters is divided in 16384 slots (called hash slots) and these slots are assigned to multiple Redis nodes. A given key is mapped to one of these slots, and the hash slot for a key is computed as:

HASH_SLOT = CRC16(key) mod 16384

Multi-key operations are supported on Redis Clusters as long as all the keys involved in a single command execution belong to the same hash slot. This can be ensured using the concept of hash tags.

The Redis Cluster Specification is the definitive guide to understanding the internals of the technology, while the Redis Cluster Tutorial provides deployment and administration guidelines.

Advantages

Check out the top advantages of Redis Clusters to see how it can benefit your deployments:



High Performance

Redis Cluster promises the same level of performance as standalone Redis deployments.


High Availability

Redis Cluster ...


Read More on Datafloq
Unlock the Value of Your Big Data Platform With an Automated Customer Data Pipeline

Unlock the Value of Your Big Data Platform With an Automated Customer Data Pipeline

Big data platforms, such as Microsoft Azure, provide much of the power for business analytics. But as more data is generated from more sources — think the Internet of Things (IoT), edge computing,...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Going Beyond Blockchain with Directed Acylic Graphs (DAG)

Going Beyond Blockchain with Directed Acylic Graphs (DAG)

If organizations could only augment blockchain’s strengths—its immutability, security, and decentralization—while addressing its latency and scalability issues, it could become the vaunted enterprise...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
SMEs

SMEs

Continuing my comments on the article in the December 2018 issue of the Phalanx by Alt, Morey and Larimer (this is part 6 of 7; see Part 1, Part 2, Part 3, Part 4, Part 5).

SMEs….is a truly odd sounding acronym that means Subject Matter Experts. They talk about it extensively in their article, and this I have no problem with. I do want to make three points related to that:

  1. A SME is not a substitution for validation.
  2. In some respects, the QJM (Quantified Judgment Model) is a quantified and validated SME.
  3. How do you know that the SME is right?

If you can substitute a SME for a proper validation effort, then perhaps you could just substitute the SME for the model. This would save time and money. If your SME is knowledgable enough to sprinkle holy water on the model and bless its results, why not just skip the model and ask the SME. We could certainly simplify and speed up analysis by removing the models and just asking our favorite SME. The weaknesses of this approach are obvious.

Then there is Trevor N. Dupuy’s Quantified Judgment Model (QJM) and Quantified Judgment Method of Analysis (QJMA). This is, in some respects, a SME quantified. Actually it was a board of SMEs, who working with a series of historical studies (the list of studies starts here: http://www.dupuyinstitute.org/tdipubs.htm ). These SMEs developed a set of values for different situations, and then insert them into a model. They then validated the model to historical data (also known as real-world combat data). While the QJM has come under considerable criticism from elements of the Operations Research community…..if you are using SMEs, then in fact, you are using something akin, but less rigorous, than Trevor Dupuy’s Quantified Judgment Method of Analysis.

This last point, how do we know that the SME is right, is significant. How do you test your SMEs to ensure that what they are saying is correct? Another SME, a board of SMEs? Maybe a BOGSAT? Can you validate SMEs? There are limits to SME’s. In the end, you need a validated model.

 

Top five questions for Chief Data Officers in 2019

Top five questions for Chief Data Officers in 2019

It’s the time of the year to step back, evaluate what worked, what did not and what to do differently to make things better personally and professionally. The same applies to businesses. In the age...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
AI, graph databases among top BI and analytics trends

AI, graph databases among top BI and analytics trends

Machine learning, graph databases and multi-cloud — William McKnight, president of McKnight Consulting Group, sees these as some of today’s top enterprise BI and analytics trends....

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
How to Become a Data Engineer: A Guide

How to Become a Data Engineer: A Guide

One of the most exciting job and in-demand job role around the globe today: Big Data Engineer

At present, the analysis of data has become one of the vital aspects of most companies. It is not something new and has been here for a while now; it is just sprung into the limelight. With the rapid pace of internet users, it has become vital for companies to analyse data of their consumers to win the competitive race.

A report by Fior Markets says that the global big data and data engineering services market is expected to grow from USD 9.6 billion in 2017 and USD 44.1 billion by 2025 -- at a CAGR of 21.0% during the forecast period 2018-2025.

Who are Big Data Engineers?

Big Data engineers are the present day superheroes. They are good at programming with a great emphasis on specialisation in distributed systems and big data.  Big data engineers are professionals who process massive data sets to provide their organisation analysis, which can further be used to make future decisions to avoid mistakes in the future.

These professionals are indispensable to modern organisations, as they make use of their technical expertise to provide actionable insights to organisations.

The demand for Data Engineers

Rapid advancement ...


Read More on Datafloq
Creating smart cities: Blockchain changes the game rules

Creating smart cities: Blockchain changes the game rules

Countries spend billions of dollars on the development of smart cities in a race to be named the best place for living. They have already poured $308.0 billion into the global smart city market and...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
Data Mining and Business Intelligence: What’s New for 2019?

Data Mining and Business Intelligence: What’s New for 2019?

Our digital universe is growing at an exponential rate. With the turn of the new year, 2019 promises some exciting advancements and improvements to many technological fields. Data mining and business intelligence (BI), both of which are extremely valuable to businesses, represent key areas of growth. Even though these terms are used interchangeably, data mining and business intelligence are two separate areas within the spectrum of data technologies.

In a previous article, we’ve written about the detailed differences between data mining and business intelligence, as well as the techniques involved in both and their various uses. To quickly recap, “BI is used to provide insights about both your own company and others such as rivals or business partners. It involves collecting and often processing large volumes of data, whether it be through your own internal metrics or third-party resources.� On the other hand, data mining is “the process of analysing data to identify useful patterns and insights. The software involved allows companies to analyse information from multiple sources to find trends.�

In layman’s terms, BI will analyse raw data and transform this into useful, actionable information as required by a particular business. Data mining, as the name suggests, is the actual mining ...


Read More on Datafloq
What is the meaning of Smart Cities? What are the features?

What is the meaning of Smart Cities? What are the features?

Smart Cities intend to provide better services to the people populating them. It is a network of smart devices that connect using the Internet. There can be private networks too (based on the...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
7 Critical Capabilities to Take Your Embedded Analytics to the Next Level

7 Critical Capabilities to Take Your Embedded Analytics to the Next Level

The benefits of deploying modern embedded analytics are massive—but so are the risks of doing nothing. Application teams that embed modern analytics capabilities and sophisticated dashboards have a...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Privacy Policy

Copyright © 2019 BBBT - All Rights Reserved
Powered by WordPress & Atahualpa
X