WHERE WE ARE AND HOW WE CAN MOVE FORWARD Cornelius Fichtner, with his course, AI for Project Managers, online at Project-Management-Prepcast.com, presents a detailed and comprehensive overview of how Project Managers can use today’s Artificial Intelligence systems to make their work easier and more efficient. A key challenge, however, isRead More
Classic Big Data Analytics: Exploding Manholes and Fires in Illegal Conversions Exploding Manholes Consolidated Edison, “Con Ed,” an investor owned utility in New York City, has about 250,000 manholes in the City, about 50,000 of which are in Manhattan. The manhole covers are cast iron, a few inches thick, andRead More
AI has become an overnight sensation. But like other overnight sensations, it has taken years to get there; 73 years since 1950 when Alan Turing described The Imitation Game, better known as the Turing Test: “A computer would be said to be intelligent if and when a human evaluator, afterRead More
Phishing is cyber criminals, state actors of hostile governments, sending emails persuading you to provide your personal information, intellectual property, or cash.   Traditional cyber security tools include signature based anti-virus, firewalls, and a Virtual Private Network, VPN, for your mobile workforce. Today we add multi-factor authentication, MFA, and website orRead More
  , , ,
The Americans with Disabilities Act (ADA), enacted in 1990, marked a significant step towards eliminating discrimination based on disability. While initially addressing physical spaces, the ADA’s reach has extended to the digital realm, especially concerning websites. However, as we venture into 2024, the application of ADA regulations to websites remainsRead More