Thursday, May 19, 2022
Home Technologies

Technologies

News

Machine Learning takes Robotics to the Next Level of Development

0
In the mid-twentieth century when the computer and its applications were starting to bring changes to the world, sociologist David Reisman had something stuck in his mind. He wondered what people would do once...
technology

Accelerating Cloud adoption – Challenges and Opportunities

0
The idea of this blog is to bring out some of the insights shared by industry experts during the recent Corporate Innovation roundtable anchored by T-Hub. Cloud technology is...
Technology

Researchers use AI to determine which face masks work best for COVID-19

0
A growing range of face masks are popping up around the world, but many haven’t proven their effectiveness against COVID-19.Researchers at Duke University have created a low-cost smartphone-based system for measuring the...
Technology

Mastering the Internet of Things with Master Data Management

0
Many organizations have struggled to harness the IoT’s scale, size, and speedy datasets for a cogent business use case justifying investing in this expression of big data. If the principal challenge is making sense...
Technology

Big Memory Unleashes Big (Real Time) Data

0
In this special guest feature, Charles Fan, CEO of MemVerge, believes that in the years ahead, the data universe will continue to expand, and the new normal will be real-time analytics and...

Most Read

Opposing schools of thought imagine and build contrary futures for AI

While many people think of abstract ideas regarding artificial general intelligence (AGI), this technology has arrived at an important crossroads today. In fact, scientists...

Friend or foe: Delving into edge computing and cloud computing

In this edge computing vs cloud computing comparison, we will explain the definition of both terms, their best examples, and more. Is edge computing...

What is the role of blockchain in the world today?

What are the blockchain use cases in 2022? Blockchain technologies can create a wide range of new applications beyond cryptocurrencies and bitcoin. The technology’s...

Undetectable backdoors can be implemented in any ML algorithm

A new study discovers that an undetectable backdoor may be inserted into any machine learning algorithm, giving a cybercriminal unrestricted access and the ability...