Remove Examples Remove Exercises Remove Marketing Remove Mining
article thumbnail

Application modernization overview

IBM Big Data Hub

This, in turn, leads to the following challenges: Duplicative or overlapping capabilities offered by multiple IT systems/components create sticky dependencies and proliferations, which impact productivity and speed to market. Lack of alignment of IT capabilities to business capabilities impacts time to market and business-IT.

Cloud 96
article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). The results of this exercise might look like Figure 7.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

For example, in February of this year, the FCA and ICO issued a joint statement warning regulated firms and insolvency practitioners of their responsibilities when dealing with personal data. Can this be done? It depends. email or sms) to have the relevant consumer’s consent (unless the “soft opt-in” rule described below applies).

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

For example, I was regularly asked if I'd ever received any legal threats which is apparently pretty normal for any M&A process, but you can imagine why it'd be particularly interesting when dealing with a heap of data originally obtained via illegal methods. of the company. of the company.

IT 136
article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. They can't change their passcodes.

Privacy 141
article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). The results of this exercise might look like Figure 7.

article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

Here's mine: One of the problems the dashboard approach helps tackle is unsubscribing on an individual domain basis. It was an all or nothing affair that nuked the lot of them whereas now, it's a domain-by-domain exercise. Email addresses were passed in and Twitter profiles returned. 98% were already in @haveibeenpwned.

IT 92