5 Keys to a Cybersecurity Culture

One of my first introductions to cybersecurity came when I was eighteen. Someone had stolen my identity, and it took months to get all the issues resolved. More recently, my brother—also an IT Security professional—stopped a scammer who used his social media information to try to take advantage of our grandfather. I’ve fallen in love…

The Case for Hard Science in Big Data Analytics

Just a few short years ago, most job descriptions for data science and machine learning positions stipulated the following: “Minimum qualifications: Currently working toward a Ph.D. degree in computer science, electrical engineering, operations research or a related field.” As someone with a background in hard science, I could not help but notice a few glaring…

RFID and the Future of Retail Inventory Management

With all the effort that goes into calibrating the big-box shopping experience, most people would be surprised to find that behind the scenes, something as basic as inventory management is often outdated in comparison. From incorrect receipts to poor counting by associates to theft, inventory management usually paints a murky picture of what a store might…

Register for the Latest News