De-mystifying IBM’s Watson Technologies

Author: John Watkins

Most people know IBM Watson as the computer who beat the two top jeopardy players in a face-to-face showdown, but what was Watson actually designed for & how can you use the tech?

September 26, 2017 Technical Data Intelligence

> More

The Need for Security in the Internet of Things | Part 2 Securing the IoT

Author: John Watkins

In this two-part series, John Watkins looks at the security side of IOT. In Part Two he looks at practical ways to secure the Internet of Things.

August 22, 2017 Business Edge and IoT

> More

The Need for Security in the Internet of Things | Part 1: The IoT Phenomenon

Author: John Watkins

In this two-part series, John Watkins looks at the security side of IOT. In Part One he gives us an overview of the phenomenon that is the Internet of Things and its security risks

July 18, 2017 Business Edge and IoT

> More

The Fact and Fiction of Cognitive Computing – Part 2

Author: John Watkins

In Part 1 John covers the progress made into Cognitive Computing today. In Part he looks at the future direction of AI and examines fact Vs. fiction in the risks of its development

November 02, 2016 Technical Data Intelligence

> More

The Fact and Fiction of Cognitive Computing – Part 1

Author: John Watkins

We've all seen the movies where robots evolve and end up destroying or enslaving the human race, but what are the real facts versus the fiction of cognitive computing?

October 25, 2016 Technical Data Intelligence

> More

The IBM Onion of Security – It Will Make Hackers Cry! Part 2

Author: John Watkins

In Part 1 John Watkins compared the layers of IBM security to those of an onion. In part 2 he delves into the benefits of deploying an IBM security solution.

August 16, 2016 Technical Security

> More

The IBM Onion of Security – It Will Make Hackers Cry! Part 1

Author: John Watkins

John Watkins compare IBM Security to the layers of an onion, with cyber attacks having to get through numerous layers of intelligent security.

August 09, 2016 Technical Security

> More
There are 7 items on 1 pages.

Blog Updates

Popular Posts

Challenges and Solutions for Managed Services Providers in IoT

> More

VMC NetApp Storage

> More

Bandwidth On Point Takeover | Episode 1 - IoT Foundations

> More

Being a Disruptor in the Market

> More

Dell Technologies World - "Make it Real"

> More

Blog Archive