Big Data

Living Life on the Edge

Old Ideas Redesigned for Edge and Hybrid Computing It’s a data grab out there! It feels like everyone in every industry is...
3 min read 396

Data Driven Trends & Statistics — Feb. 2019

While the easiest way to look for visual content is to just “google” them, it would be much more convenient if...
42 sec read 621

Another Engineered Global Economic Crisis Looming? Not if Our Data Eco...

The development of our DApp, called DECENTR, is currently progressing in lockstep with our R&D as part of our upcoming H2020...
6 min read 806

21 Apps to help you reach your financial goals & more…

“Education is the kindling of a flame, not the filling of a vessel.” ― Socrates Let’s kindle the flame. For a daily...
39 sec read 230

Social media listening keeps you plugged in

Although social media listening is a top trend, it should be part of every modern marketing strategy. Staying attuned to customers...
2 min read 614
Finance Data API

6 Alternatives to the Yahoo Finance API

Yahoo Finance API is over — long live New Finance APIs! The Yahoo Finance API has long been a reliable tool for...
2 min read 111,545

Cybersecurity Non-profit to Help SME’s Fight Against Cybercrime

A non-profit organization called Global Cyber Alliance (GCA) has vowed to improve one of the weakest links in cybersecurity by helping out small...
2 min read 436

The Artificial Intelligence 8 Billion Dataset Ecosystem

In about 5 years from now, 2024, the world population is expected to be around 8 billion. Now, not all of...
7 min read 267

Why Data will Transform Investment Management

Some have called it “the new oil.” But while it bears little resemblance to the black gold, its ongoing commoditization –...
5 min read

Difference between Big Data & The Internet of Things

Here is the list of most educational content from my Tweets this week. Hope they provide some value to the readers....
43 sec read

The Likelihood of a Cyber Attack Compared

Cyber attacks are costly from all points. Payment information, customer data and other types of sensitive data are at risk when...
49 sec read 283

A Code of Ethics Does Little to Correct the Issues with Today’s Soft...

Malicious software stories fill many publications. Bleeping Computer is practically an active record of malware and security holes. Bulletins such as The...
3 min read 282