Searched for: "uncovering the relational web"
- After Hours (18)
- Security (10)
- Cxo (7)
- Developer (6)
- Enterprise Software (5)
- Microsoft (5)
- Data Management (4)
- Banking (3)
- Collaboration (3)
- Project Management (3)
- Tech & Work (3)
- Big Data (1)
- Data Centers (1)
- Hardware (1)
- Networking (1)
- Open Source (1)
- Social Enterprise (1)
- Software (1)
About 74 results for "uncovering the relational web"
An exploit in a self-contained NAS sold by Seagate brings to the fore questions about handling security disclosures and whether the public should trust boxed NAS solutions.
Consumer-oriented firms need big data solutions to gain actionable insights into customer behavior. In banking, media, and retail, startup NGDATA is part of the conversation.
Proposed Architecture for Automatic Conversion of Unstructured Text Data into Structured Text Data on the Web
Data mining, and in particular text mining, has attracted much attention in recent years due to the vast amounts of data available, and the rate of growth. Data mining tools can be...
IBM Watson: The inside story of how the Jeopardy-winning supercomputer was born, and what it wants to do next
IBM Watson wowed the tech industry and a corner of U.S. pop culture with its 2011 win against two of Jeopardy's greatest champions. Here's how IBM pulled it off and a look at what ...
DDoS attacks on the World Wide Web (WWW) in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry relate...
Connectivity and relatedness of Web resources are two concepts that define to what extent different parts are connected or related to one another. Measuring connectivity and relate...
One key feature of the Semantic Web lies in the ability to link related Web resources. However, while relations within particular datasets are often well-defined, links between dis...
The information and communication technologies revolution brought a digital world with huge amounts of data available. Enterprises use mining technologies to search vast amounts of...
Verifying online identity is an increasingly important consideration as more official business is conducted online. Deb Shinder writes about the related issues of loss of anonymity...
There's a computer security term for sorting issues involving dangerous plaintext words. The term is named after an English township that famously ran afoul of some early online pr...