Nintex Hawkeye makes workflow analytics one step easier

Nintex Hawkeye makes workflow analytics one step easier

Nintex has been in the business of providing software to automate corporate workflows for years. In July, the company introduced an analytics package, called Hawkeye, that lets workflow professionals measure their effectiveness. Over...

Lenovo joins the OLED revolution

Lenovo recently came out with an OLED-screen notebook in its flagship ThinkPad line. The X1 Yoga has the efficient business characteristics associated with the company's commercial systems and yet some of the caprice and fun of the...

IBM promotes IT infrastructure for cognitive workloads

IBM promotes IT infrastructure for cognitive workloads

IBM has reinvented itself pretty much continuously since its founding more than 100 years ago. Now, the company is moving its focus to providing infrastructure for the coming era of cognitive workloads, the complex, AI-oriented,...

Apple Watch is just a placeholder

Apple Watch is just a placeholder

Sailing a small boat with my hands occupied convinced me that a small hands-free smart device on the wrist might not be such a bad thing. The Apple Watch currently on the market is just a placeholder for what will ultimately be the...

Protecting yourself from Google’s protection racket

Protecting yourself from Google’s protection racket

If identity validation involves complex AI computation, then no one except the behemoths will be able to do it anymore, which may be the idea.

Building artificial intelligence models with Internet-of-Things data

SparkCognition, a company with automatic model-building technology that sifts sensor and other instrumented data to predict failures and breaches, has added an augmented-reality layer to its user interface. Now, managers can "see"...

Queue up for IBM's quantum computer

Queue up for IBM's quantum computer

Quantum computing is a brand new area of computing. IBM has made a breakthrough by creating a five-qubit quantum computer in a near-absolute-zero environment. That computer is available to anyone online via the IBM Quantum Experience....

Dell takes back the night in PCs

Dell's market share in PCs has risen steadily since the company went private 13 quarters ago. There seems to be a correlation between this success and the company's unlisted status.

Personal expression in the digital age: how machines get between us

Most communications are inept, reminding us that this isn't someone we're talking to, it's something.

Encryption dispute mirrors gun debate — with a different conclusion

Encryption dispute mirrors gun debate — with a different conclusion

I would never argue that everyone should own a gun, but strong encryption for all people is more of a benefit than a liability. Apple and the rest of the tech industry should stand fast on not allowing the government to build a back...

The Dell XPS 15 is a beast

The Dell XPS 15 is a beast

Although it's big and powerful, the new Dell XPS 15 slides right into a laptop bag because its InfinityEdge display make this 15" notebook no larger than most 14" models. Meanwhile, the 4K resolution is so high that text has to be...

Memory goes and comes

Memory goes and comes

Eons ago, Intel used to be in the memory business. It left due to competition from Japanese rivals. Today, it is back in the memory business with flash and has dedicated a plant in China to making it. This return to memories comes at...

What IBM's willingness to share source code with China means

Although some have wondered about IBM's willingness to share source code with Chinese entities, its doing so makes sense. The company has embraced an open regime and has deep ties with Chinese partners and customers, particularly in...

Qualcomm unveils intelligent protection component of Snapdragon security suite

Qualcomm unveils intelligent protection component of Snapdragon security suite

Qualcomm has marshaled cognitive computing and machine learning to give a security program that runs entirely on a smartphone the ability to respond to zero-day attacks by monitoring applications' behavior rather than looking for...

Load More