Thursday, May 19, 2022
Home Events

Events

Vidhya Event

“Surviving and Thriving in a period of Constant Change with Analytics”, in Business Transformation...

0
Catch Vidhya Veeraraghavan CSPO, Head of Analytics - Financial Markets Operations, Standard Chartered| Keynote Speaker LIVE while she shares her views on "Surviving and Thriving in a period of Constant Change with...

Why MLOps is relevant?

0
Are you an AI/ML Architect? Are you a data scientist? Then Join our upcoming #NASSCOMWebinar on Why MLOps is relevant? by Saurabh Gupta, Author & General Manager - Data Science at Michelin.
AI in product management

Demystifying AI in Product Management

0
This webinar, hosted by Deepak Paramanand, Product Owner at Hitachi, will demystify AI for product managers and provide a foundation for PMs who are looking to improve their AI knowledge and skills....

Open Data Science Conference 2020

0
One of the biggest specialised data science events, ODSC, is coming out with its next event this September. With insightful sessions, full-day training, and speakers programs, the five-day conference promises to accelerate...

Data Science Congress, Mumbai

0
An initiative of Aegis School of Data Science, this could be an excellent forum for companies to showcase their products. It promises insightful keynote speeches by eminent speakers from a wide gamut...

Most Read

Opposing schools of thought imagine and build contrary futures for AI

While many people think of abstract ideas regarding artificial general intelligence (AGI), this technology has arrived at an important crossroads today. In fact, scientists...

Friend or foe: Delving into edge computing and cloud computing

In this edge computing vs cloud computing comparison, we will explain the definition of both terms, their best examples, and more. Is edge computing...

What is the role of blockchain in the world today?

What are the blockchain use cases in 2022? Blockchain technologies can create a wide range of new applications beyond cryptocurrencies and bitcoin. The technology’s...

Undetectable backdoors can be implemented in any ML algorithm

A new study discovers that an undetectable backdoor may be inserted into any machine learning algorithm, giving a cybercriminal unrestricted access and the ability...