News

AI and Machine Learning, Then and Now

By |February 26th, 2020|News|0 Comments

Researchers in the fields of artificial intelligence (AI) and machine learning are developing computer programs that can not only sort through large amounts of […]

Common Language Increases Access

By |February 26th, 2020|News|0 Comments

The professionals who work to uncover security vulnerabilities in hardware must find a common language for categorizing them. That is the entire purpose of […]

Regulations Around Social Media Content on the Table

By |February 25th, 2020|News|0 Comments

In what feels like an about face, Facebook publishes a whitepaper addressing the need for standardized content regulation. This interesting topic came to us from […]

Taxonomy Manager Needed

By |February 25th, 2020|News|0 Comments

To be as helpful as possible to those in the fields of taxonomy, indexing, semantic technology, ontology, etc., we are sharing career opportunities that we find with our […]

Technology to Protect the Technology

By |February 25th, 2020|News|0 Comments

With the dramatic increase in the volume of data, organizations are making it a high priority to better manage their data and keep it […]

Data Breach Threat to Democracy

By |February 24th, 2020|News|0 Comments

Data breach takes on an entirely new meaning when it comes to the democracy of American elections. The New York Times brought us this […]

Technology is Fighting the Virus

By |February 24th, 2020|News|0 Comments

Misinformation is the cause of so many problems, not excluding the constantly changing and often conflicting information around the coronavirus. CNBC brought this interesting news […]

Social Determinants of Health and Machine Learning

By |February 21st, 2020|News|0 Comments

A machine learning algorithm accurately predicts inpatient and emergency department utilization using only publicly available social determinants of health (SDOH) data. Health IT Analytics brought […]

The Next Big Threat

By |February 21st, 2020|News|0 Comments

Data breaches, cyberattacks and other nefarious attempts to steal data are always looking for new approaches or back doors into a system. Ransomware has […]