5 Best Stories on Real Money: Cramers Covid Top 15, Bitcoin – TheStreet

Cramer gives you his buy list as long as Covid continues to rage. Helene Meisler goes to one chart shes never gone to before; andTim Collins warns about "dumpster diving" in this market. It's all on Real Money.

Plus,Rev Shark antes up on investing and gambling; and Doug Kass has a lot to say about Robinhood and its merry band of traders.

Here are five must reads from the columnists of Real Money and Real Money Pro, our premium sites for Wall Street professionals and active investors:

Instead of scratching your head and saying this stock market defies logic, look to the Jim Cramers Covid-19 Index.

Here are the Top 15 performing stocks in the index from Cramer and Real Money.

Helene Meisler always found bitcoin fascinating, but that was it. She'd never traded it.

But after a reader asked the "Divine Ms. M" about the cryptocurrency, she decided to take a look.

Heres what she found on bitcoins (GBTC) charts and indeed it's fascinating.

The market isnt supposed to work like this. Some companies, which probably shouldn't be public, are seeing their share prices double, triple, or reach valuations that are mind-boggling.

Tim Collins,Real Money columnist,has seen this before and it doesnt end well.

Market participants like to believe they aren't gamblers, but Jim Rev Shark DePorre says there's no denying that luck plays a major role in the investment process.

Read Rev Shark'sinvesting wisdom hereon Real Money.

With so much systemic buying and little discretionary buying, speculation and large price moves have become more commonplace, explains Real Money Pros Doug Kass in his Daily Diary.

Read how Robinhood is at the core of speculation and why its impact is considerable...and likely short-lived.

Real Money and Real Money Pro are TheStreets premium sites for active traders. Click here to get great columns like these from Jim Cramer, Jim Rev Shark DePorre, Doug Kass and other writers each trading day.

Read the original here:
5 Best Stories on Real Money: Cramers Covid Top 15, Bitcoin - TheStreet

Research: A Survey of Numerical Methods Utilizing Mixed Precision Arithmetic – HPCwire

Within the past years, hardware vendors have started designing low precision special function units in response to the demand of the machine learning community and their demand for high compute power in low precision formats. Also, server-line products are increasingly featuring low-precision special function units, such as the Nvidia tensor cores in the Oak Ridge National Laboratorys Summit supercomputer, providing more than an order of magnitude of higher performance than what is available in IEEE double precision.

At the same time, the gap between the compute power on the one hand and the memory bandwidth on the other hand keeps increasing, making data access and communication prohibitively expensive compared to arithmetic operations. Having the choice between ignoring the hardware trends and continuing the traditional path, and adjusting the software stack to the changing hardware designs, the Department of Energys Exascale Computing Project decided for the aggressive step of building a multiprecision focus effort to take on the challenge of designing and engineering novel algorithms exploiting the compute power available in low precision and adjusting the communication format to the application-specific needs.

To start the multiprecision focus effort, we have written a survey of the numerical linear algebra community and summarized all existing multiprecision knowledge, expertise, and software capabilities in this landscape analysis report. We also include current efforts and preliminary results that may not yet be considered mature technology, but have the potential to grow into production quality within the multiprecision focus effort. As we expect the reader to be familiar with the basics of numerical linear algebra, we refrain from providing a detailed background on the algorithms themselves but focus on how mixed- and multiprecision technology can help to improve the performance of these methods and present highlights of application significantly outperforming the traditional fixed precision methods.

This report covers low precision BLAS operations, solving systems of linear systems, least squares problems, eigenvalue computations using mixed precision. These are demonstrated with dense and sparse matrix computations and direct and iterative methods. The ideas presented try to exploit low precision computations for the bulk of the compute time and then use mathematical techniques to enhance the accuracy of the solution to bring it to full precision accuracy with less time to solution.

On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. There are two reasons for this. Firstly, a 32-bit floating point arithmetic rate of execution is usually twice as fast as a 64-bit floating point arithmetic on most modern processors. Secondly, the number of bytes moved through the memory system is halved. It may be possible to care out the computation in lower precision, say 16-bit operations.

One approach exploiting the compute power in low precision is motivated by the observation that in many cases, a single precision solution of a problem can be refined to the point where double precision accuracy is achieved. The refinement can be accomplished, for instance, by means of the Newtons algorithm (see Equation (1)) which computes the zero of a function f (x) according to the iterative formula:

In general, we would compute a starting point and f (x) in single precision arithmetic, and the refinement process will be computed in double precision arithmetic. If the refinement process is cheaper than the initial computation of the solution, then double precision accuracy can be achieved nearly at the same speed as the single precision accuracy.

Stunning results can be achieved. In Figure 1, we are comparing the solution of a general system of linear equations using a dense solver on an Nvidia V100 GPU comparing the performance for 64-, 32-, and 16-bit floating point operations for the factorization and then using refinement techniques to improve the solution for the 32- and 16-bit solution to what was achieved using 64-bit factorization.

The survey report presents much more detail on the methods and approaches using these techniques, see https://www.icl.utk.edu/files/publications/2020/icl-utk-1392-2020.pdf.

Author Bio Hartwig Anzt

Hartwig Anzt is a Helmholtz-Young-Investigator Group leader at the Steinbuch Centre for Computing at the Karlsruhe Institute of Technology (KIT). He obtained his PhD in Mathematics at the Karlsruhe Institute of Technology, and afterwards joined Jack Dongarras Innovative Computing Lab at the University of Tennessee in 2013. Since 2015 he also holds a Senior Research Scientist position at the University of Tennessee. Hartwig Anzt has a strong background in numerical mathematics, specializes in iterative methods and preconditioning techniques for the next generation hardware architectures. His Helmholtz group on Fixed-point methods for numerics at Exascale (FiNE) is granted funding until 2022. Hartwig Anzt has a long track record of high-quality software development. He is author of the MAGMA-sparse open source software package managing lead and developer of the Ginkgo numerical linear algebra library, and part of the US Exascale computing project delivering production-ready numerical linear algebra libraries.

Author Bio Jack Dongarra

Jack Dongarra received a Bachelor of Science in Mathematics from Chicago State University in 1972 and a Master of Science in Computer Science from the Illinois Institute of Technology in 1973. He received his PhD in Applied Mathematics from the University of New Mexico in 1980. He worked at the Argonne National Laboratory until 1989, becoming a senior scientist.He now holds an appointment as University Distinguished Professor of Computer Science in the Computer Science Department at the University of Tennessee, has the position of a Distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory (ORNL), Turing Fellow in the Computer Science and Mathematics Schools at the University of Manchester, and an Adjunct Professor in the Computer Science Department at Rice University.

More here:
Research: A Survey of Numerical Methods Utilizing Mixed Precision Arithmetic - HPCwire

Blue Canyon Technologies Tapped to Build QETSSat Encryption Satellite – Via Satellite

Artist Rendering of the BCT YAM-4 (Photo: BusinessWire)

Loft Orbital awarded a contract to small satellite manufacturer Blue Canyon Technologies (BCT) to develop and build the YAM-4 spacecraft bus for the Canadian Space Agency (CSA) and Honeywells Quantum Encryption and Science Satellite (QEYSSat) mission, BCT announced August 5.

BCT will build the satellite using its new X-SAT Venus-Class bus design, which can carry payloads up to 90 kg. Financial details of the contract were not disclosed.

The CSA named Honeywell its prime contractor for QEYSSat in a $30 million dollar deal signed in June 2019. The QEYSSat mission aims to demonstrate the use of Quantum Key Distribution (QKD) encryption technology for secure online communications on Earth. QKD creates encryption codes that are designed to be unbreakable, allowing for more secure quantum computing.

Having a secure communication infrastructure is critical in this day and age. Our foundational support of the YAM-4 spacecraft will make the access to space for this type of demonstration less expensive and quicker to launch, allowing Canadian scientists to study how QKD behaves in space, BCT President and CEO George Stafford said in a statement.

Go here to see the original:
Blue Canyon Technologies Tapped to Build QETSSat Encryption Satellite - Via Satellite

WhatsApp UsersHeres Why Your Messages May Soon Disappear – Forbes

NurPhoto via Getty Images

WhatsApp is unique in the messaging worldstraddling security and functionality like no other platform. But others have the market-leader in their sights, and intend to close the gap. Specialists like Signal, and industry giants Google and Apple are all closing in. For its part, WhatsApp is developing and launching many new features to maintain its lead. And now we have news of yet another exciting feature on its way.

In keeping with its balancing act, some of WhatsApps updates are security focusedthink encrypted cloud backups, encrypted multiple device access and extended secure video calls, while others are more trivialthink stickers, QR codes and search. The latest feature to be trailedcurrently buried in beta codeis on the security side.

End-to-end encryption is the foundation of secure messagingif your messenger doesnt have this by defaultFacebook Messenger, Twitter, SMS, then dont use it. Period. But security can go furtherjust think of the issues buried in all the chat histories on all the phones youve messaged. The answer is self-deleting messages.

Signal disappearing messages

This is available and widely used on Signal, the best (and more secure alternative) to WhatsApp. You can set the messages in any conversation to automatically disappear after a settable period of between 5 seconds and 1 week. This doesnt stop screenshots or media attachments being stored, but it does prevent a build up of history.

We have known for some time that WhatsApp is developing a similar feature, and now we have confirmation from the ever-reliable WaBetaInfo that the feature is well-developed within the latest beta code, albeit we don't know how soon it will launch. We also now know that the feature will be called expiring messages.

One downside, though, we had thought that this expiring messages function would offer the same flexibility as in Signal, with options to set a timer by conversation. But it appears that WhatsApps expiring messages will delete after a fixed 7 days.

We can assume this feature will be assignable to specific chats, without impacting messages sent before it was applied. We can also assume that either side of a chat can apply the setting. For groups, only admins will have that option.

WhatsApp expiring messages

This isnt the most important forthcoming security update within WhatsAppthat would be extending end-to-end encryption to cloud backups, currently thats the biggest hole in WhatsApps security. Its also not the most criticalthat would be the forthcoming multiple linked devices, also due soon. But this helps close the gap to Signals better security-focused functionality, and thats clearly a good thing.

WABetaInfo has also revealed that WhatsApp intends to add a mute forever option for those annoying groups or chats that keep popping up unwanted notifications. This would be very much on the trivial functionality side of the line, when compared to the security advantages of cleaning message histories as you go.

Read more here:
WhatsApp UsersHeres Why Your Messages May Soon Disappear - Forbes

PEN America Slams Hollywood and the MPA on China …

Nonprofit PEN America on Wednesday issued a moral clarion call to Hollywood to step up its efforts to resist Chinese censorship and increase transparency, criticizing studios and the MPA for appearing to defend free speech at home only when financially convenient.

The New York-headquartered free speech advocacy group detailed the mechanisms by which China influences decision-making in Hollywood and offered recommendations for how to mitigate pernicious complicity with the worlds most censorious regime in an unsparing 100-page report entitled Made in Hollywood, Censored by Beijing.

It comes as American politicians have recently turned up the heat on Hollywood on the matter amid rapidly deteriorating relations between the U.S. and China.

The Chinese Communist Party is increasingly shaping what global audiences see, said PEN Americas deputy director of free expression research and policy James Tager.

Changes, however small, to U.S. films made at Beijings behest cut against artistic and cultural freedom, silence dissenting voices and can skew the global perceptions that are shaped by powerful films, he said, and must be considered in the broader context of Chinas policy goals, including the repression and erasure of minority cultures, the burnishing of its global image, and the reification of government or the Party and President Xi Jinping.

The report calls for a more unified Hollywood response to censorious pressure from China, stating that firms need not abandon the market to abandon their principles.

The document points out the hypocrisy of an industry celebrated for its vocal criticism of the U.S. government yet struck with an increasing acceptance of the need to conform with Chinas, and describes the MPAs advocacy on China to date unsurprising but uninspiring. Iturges the Association and other key players to make the same commitment to resisting censorship from governments around the world as they historically have to resisting censorship from our own.

U.S. politicians like Senator Ted Cruz have been scratching their heads to come up with ways to force Hollywood to take a stronger stand against China, but proposed solutions have been largely pooh-poohed by industry players as unfeasible, lacking real teeth, and politically motivated.

PEN offered different, though less binding, recommendations, saying: There is still room for Hollywood to adopt some principled strategies and practices to govern their interactions with the Chinese government.

The nonprofit called on Hollywood studios to pledge that if they censor a film or alter it in anticipation of a censorship request from Beijing, they create two versions of the title so that the censored Chinese version does not become the default for global audiences.

Filmmakers cannot reduce their work to the lowest common denominator of only content that is deemed acceptable by one of the worlds most censorious regimes, it said.

It also recommended that the major studios join forces to publicly and transparently acknowledge censorship requests received from foreign governments and changes made. It suggested publicizing them in the way tech firms issue reports on government take-down request, or potentially acknowledging them via disclosures in the credits.

If all members of the Big Five jointly committed to such a disclosure program, it would immediately set the standard for Hollywood at large [and] prevent Beijing from playing studios against one another, it said. Such transparency would go a long way towards making the long opaque processes of censorship more visible, providing a better understanding of where Beijings red lines are and thus reducing the uncertainty that enables self-censorship.

The reports hones in on the MPA for not doing more on the issue, highlighting a damning divergence between its rhetoric to protect U.S. filmmakers constitutional rights to free speech and its stance on China.

In 2016, when then-MPA head Chris Dodd took the stage to accept an award from Georgias First Amendment Foundation, he made a rousing speech on the organizations mission.

Whether its confronting tyrants abroad, speaking truth to power at home, or pushing the limits and buttons of our societys tolerance and cultural understanding, motion pictures and television often dare to say the unspeakable. Which is why, since our founding in 1922, the MPAA has fought for the First Amendment rights of not only our moviemakers and our moviegoers but the audiences, as well, it quotes him as saying.

The words stand in strong contrast with a 2013 statement the Association issued on Chinese censorship. On that topic, the body said that while it supported maximum creative rights for artists, the adjustment of some of our films for different world markets is a commercial reality, and we recognize Chinas right to determine what content enters their country.

The report calls on the MPA, which has never released public guidance on how studios could or should push back against Chinese censorship requests, to issue a public position paper on the matter, as well as an annual report on the industrys engagement with China.

It also recommends that professional institutions and forums such as the Writers Guild of America, the Directors Guild of America, and the American Film Market do more to draw public attention to the issue and create opportunities for insiders to discuss Chinese censorship transparently, possibly via private forums, listservs, or working groups.

To not deal more openly with the topic will deal a blow to the industrys credibility, moral standing and clout, the advocacy group said.

Hollywood possesses a hundred-plus-year legacy of serving as one of the worlds storytelling centers. For this reason, there is a moral imperative for its decision-makers to stand for freedom of expression, and to resist the gradual encroachment of any government that attempts to dictate what (or how) these stories can and cannot be told, the report stated.

The industry should pull back the curtain, own up to the dilemmas it faces, and reckon candidly with these pressures in ways that allow policymakers, free expression advocates, and filmgoers to reach informed judgments.

Follow this link:

PEN America Slams Hollywood and the MPA on China ...

Microsoft releases Windows 10 build 20185 to the Dev channel – here’s what’s new – Neowin

Today, Microsoft is releasing Windows 10 Insider Preview build 20185 to the Dev channel, as is typical for Wednesdays. As usual, there's nothing new and exciting in the build. It's just a few minor changes, such as better DNS configuration in Settings, and ADMX Backed Policies in MDM.

Here's the full changelog:

Were making a few changes to the Network section in Settings:

Making DNS settings more easily accessible: Editing your DNS server assignment is now a top-level option when you go into your networks properties page.

Encrypted DNS controls in the Settings app: Encrypted DNS (DNS over HTTPS, or DoH) can help increase privacy and security while browsing the web. You can now configure DoH directly in the Settings app to more easily take advantage of this feature:

You can add any IP address listed here to unlock the DoH dropdown and choose to use encryption. Once encryption is enabled, you can confirm its working by looking at the applied DNS servers in the network properties and see them labeled as (Encrypted) servers. If you want to try a custom DoH server we dont recognize yet, you can configure an IP address to be recognized as a DoH server by using the netsh command documented here at the end of the blog post.

As always, appreciate your feedback!

Starting with Windows 10 Insider Preview Build 20175, we have enabled 647 new MDM policies across 56 ADMX files to enable commercial customers to configure policies that are also supported through Group Policies. Contains ADMX based Policies such as App Compat, Event Forwarding, Servicing and Task Scheduler. These new policies can be configured using Intune custom profile. Intune UX is planned to be available later this year.

ADMX file name:

As usual, the build comes from the Iron development branch, although it's not actually a preview of 21H1. It's similar to how the 195xx builds were from the Manganese branch, but they weren't 20H2. 21H1, if it arrives at all, will be a small, cumulative update-style update.

You can grab today's build via Windows Update, as always. If you're not on the Dev channel yet, you can enroll through the Windows Insider Program tab in Settings.

Here is the original post:
Microsoft releases Windows 10 build 20185 to the Dev channel - here's what's new - Neowin

E-mail Encryption Market size and Key Trends in terms of volume and value 2020-2025 – CueReport

The study of E-mail Encryption market thoroughly analyzes the competitive landscape of this industry while focusing of market growth pattern over the past years and major global developments to predict the dynamics in the forthcoming years. The report is so drafted that companies operating in the business vertical can gain advantage from existing tends and construct strategies accordingly.

The document further highlights the growth opportunities and drivers stimulating the overall revenues of the market over the forecast period. Challenges and threats capable of dampening the industry growth are also enlisted in the report.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/30846

A comprehensive documentation of comparison between past and present market scenario is prepared to reckon the growth rate of the industry over the estimated timeframe. The report also encompasses details about the impact of COVID-19 on the business outlook and offers insights about potentials for industry players.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/30846

Key Takeaways from E-mail Encryption Market Report:

Product Landscape:

Application Spectrum:

Regional Terrain:

Competitive Hierarchy:

In closing, the E-mail Encryption market has been scrutinized extensively based on numerous parameters and segmentations, while elaborating on aspects like supply chain & sales channel, including downstream buyers and upstream raw material suppliers.

Market segmentation

The E-mail Encryption market is split by Type and by Application. For the period 2020-2026, the growth among segments provides accurate calculations and forecasts for sales by Type and by Application in terms of volume and value. This analysis can help you expand your business by targeting qualified niche markets.

Research Objective:

Why to Select This Report:

Key questions answered in the report:

MAJOR TOC OF THE REPORT:

Chapter 1 Industry Overview

Chapter 2 Production Market Analysis

Chapter 3 Sales Market Analysis

Chapter 4 Consumption Market Analysis

Chapter 5 Production, Sales and Consumption Market Comparison Analysis

Chapter 6 Major Manufacturers Production and Sales Market Comparison Analysis

Chapter 7 Major Product Analysis

Chapter 8 Major Application Analysis

Chapter 9 Industry Chain Analysis

Chapter 10 Global and Regional Market Forecast

Chapter 11 Major Manufacturers Analysis

Chapter 12 New Project Investment Feasibility Analysis

Chapter 13 Conclusions

Chapter 14 Appendix

Request Customization on This Report @ https://www.cuereport.com/request-for-customization/30846

More here:
E-mail Encryption Market size and Key Trends in terms of volume and value 2020-2025 - CueReport

Hardware-based Full Disk Encryption Market Analysis by Trends, Types, Applications, manufactures, Regions, Market size and Forecast up to 2023 – The…

Global Hardware-based Full Disk Encryption market- Report defines the vital growth factors, opportunities and market segment of top players during the forecast period from 2019 to 2025. The report Hardware-based Full Disk Encryption offers a complete market outlook and development rate during the past, present, and the forecast period, with concise study, Hardware-based Full Disk Encryption market effectively defines the market value, volume, price trend, and development opportunities. The comprehensive, versatile and up-to-date information on Hardware-based Full Disk Encryption market is provided in this report.

The latest research report on Hardware-based Full Disk Encryption market encompasses a detailed compilation of this industry, and a creditable overview of its segmentation. In short, the study incorporates a generic overview of the Hardware-based Full Disk Encryption market based on its current status and market size, in terms of volume and returns. The study also comprises a summary of important data considering the geographical terrain of the industry as well as the industry players that seem to have achieved a powerful status across the Hardware-based Full Disk Encryption market.

Get PDF Sample Copy of this Report to understand the structure of the complete report: (Including Full TOC, List of Tables & Figures, Chart) @ https://www.researchmoz.com/enquiry.php?type=S&repid=2745746&source=atm

Segment by Type, the Hardware-based Full Disk Encryption market is segmented intoHard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Segment by Application, the Hardware-based Full Disk Encryption market is segmented intoIT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

Regional and Country-level Analysis:North AmericaUnited StatesCanadaAsia-PacificChinaJapanSouth KoreaIndiaSoutheast AsiaAustraliaRest of Asia-PacificEuropeGermanyFranceU.K.ItalyRussiaNordic CountriesRest of EuropeLatin AmericaMexicoBrazilRest of Latin AmericaMiddle East & AfricaTurkeySaudi ArabiaUAERest of MEA

Competitive Landscape and Hardware-based Full Disk Encryption Market Share AnalysisHardware-based Full Disk Encryption market competitive landscape provides details and data information by companies. The report offers comprehensive analysis and accurate statistics on revenue by the player for the period 2015-2020. It also offers detailed analysis supported by reliable statistics on sale and revenue by players for the period 2015-2020. Details included are company description, major business, Hardware-based Full Disk Encryption product introduction, recent developments, Hardware-based Full Disk Encryption sales by region, type, application and by sales channel.

The major companies include:Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected] https://www.researchmoz.com/enquiry.php?type=E&repid=2745746&source=atm

Complete Analysis of the Hardware-based Full Disk Encryption Market:

Comprehensive assessable analysis of the industry is provided for the period of 2019-2025 to help investors to capitalize on the essential market opportunities.

The key findings and recommendations highlight vital progressive industry trends in the global Hardware-based Full Disk Encryption market, thereby allowing players to improve effective long term policies

A complete analysis of the factors that drive market evolution is provided in the report.

To analyze opportunities in the market for stakeholders by categorizing the high-growth segments of the market

The numerous opportunities in the Hardware-based Full Disk Encryption market are also given.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2745746&licType=S&source=atm

Furthermore, Global Hardware-based Full Disk Encryption Market following points are involved along with a detailed study of each point:

Generation of this Global Hardware-based Full Disk Encryption Industry is tested about applications, types, and regions with price analysis of players that are covered.

Revenue, sales are planned for this Hardware-based Full Disk Encryption market, including with various essentials along yet another facet is assessed in this section for foremost regions.

In continuation using earnings, this section studies consumption, and global Hardware-based Full Disk Encryption market. This area also sheds light on the variance between ingestion and distribution. Export and Hardware-based Full Disk Encryption significance data are provided in this part.

In this section, key players have been studied depending on product portfolio, their Hardware-based Full Disk Encryption market company profile, volume, price, price, and earnings.

Hardware-based Full Disk Encryption market analysis aside from business, the information, and supply, contact information from manufacturers, consumers and providers can also be presented. Additionally, a feasibility study to asset and SWOT analysis for endeavors have been contained.

View original post here:
Hardware-based Full Disk Encryption Market Analysis by Trends, Types, Applications, manufactures, Regions, Market size and Forecast up to 2023 - The...

Introducing The AI & Machine Learning Imperative – MIT Sloan

Topics The AI & Machine Learning Imperative

The AI & Machine Learning Imperative offers new insights from leading academics and practitioners in data science and artificial intelligence. The Executive Guide, published as a series over three weeks, explores how managers and companies can overcome challenges and identify opportunities by assembling the right talent, stepping up their own leadership, and reshaping organizational strategy.

Leading organizations recognize the potential for artificial intelligence and machine learning to transform work and society. The technologies offer companies strategic new opportunities and integrate into a range of business processes customer service, operations, prediction, and decision-making in scalable, adaptable ways.

As with other major waves of technology, AI requires organizations and managers to shed old ways of thinking and grow with new skills and capabilities. The AI & Machine Learning Imperative, an Executive Guide from MIT SMR, offers new insights from leading academics and practitioners in data science and AI. The guide explores how managers and companies can overcome challenges and identify opportunities across three key pillars: talent, leadership, and organizational strategy.

Email Updates on AI, Data & Machine Learning

Get monthly email updates on how artificial intelligence and big data are affecting the development and execution of strategy in organizations.

Please enter a valid email address

Thank you for signing up

Privacy Policy

The series launches Aug. 3, and summaries of the upcoming articles are included below. Sign up to be reminded when new articles launch in the series, and in the meantime, explore our recent library of AI and machine learning articles.

In order to achieve the ultimate strategic goals of AI investment, organizations must broaden their sights beyond creating augmented intelligence tools for limited tasks. To prepare for the next phase of artificial intelligence, leaders must prioritize assembling the right talent pipeline and technology infrastructure.

Recent technical advances in AI and machine learning offer genuine productivity returns to organizations. Nevertheless, finding and enabling talented individuals to succeed in engineering these kinds of systems can be a daunting challenge. Leading a successful AI-enabled workforce requires key hiring, training, and risk management considerations.

AI is no regular technology, so AI strategy needs to be approached differently than regular technology strategy. A purposeful approach is built on three foundations: a robust and reliable technology infrastructure, a specific focus on new business models, and a thoughtful approach to ethics. Available Aug. 10.

CFOs who take ownership of AI technology position themselves to lead an organization of the future. While AI is likely to impact business practices dramatically in the future across the C-suite, its already having an impact today and the time for CFOs to step up to AI leadership is now. Available Aug. 12.

To remain relevant and resilient, companies and leaders must strive to build business models in a way that ensures three key components are working together: AI that enables and powers a centralized data lake of enterprise data, a marketplace of sellers and partners that make individualized offers based on the intelligence of the data collected and powered by AI, and a SaaS platform that is essential for users. Available Aug. 17.

Acquiring the right AI technology and producing results, while critical, arent enough. To gain value from AI, organizations need to focus on managing the gaps in skills and processes that impact people and teams within the organization. Available Aug. 19.

The AI & Machine Learning Imperative offers new insights from leading academics and practitioners in data science and artificial intelligence. The Executive Guide, published as a series over three weeks, explores how managers and companies can overcome challenges and identify opportunities by assembling the right talent, stepping up their own leadership, and reshaping organizational strategy.

Ally MacDonald (@allymacdonald) is a senior editor at MIT Sloan Management Review.

Excerpt from:
Introducing The AI & Machine Learning Imperative - MIT Sloan

Blacklight Solutions Unveils Software to Simplify Business Analytics with AI and Machine Learning – El Paso Inc.

AUSTIN, Texas, Aug. 5, 2020 /PRNewswire/ -- Blacklight Solutions, an applied analytics company based in Texas, introduced today a simplified business analytics platform that allows small to mid-market businesses to implement artificial intelligence and machine learning with code free transformation, aggregation, blending and mixing of multiple data sources. Blacklight software empowers companies to increase efficiency by using machine learning and artificial intelligence for business processes with a team of experts guiding this metamorphosis.

"Small and mid-size firms need a simpler way to leverage these technologies for growth in the way large enterprises have." said Chance Coble, Blacklight Solutions CEO. "We are thrilled to bring an easy pay-as-you-go solution along with the expertise to guide them and help them succeed."

Blacklight Solutions believes that now more than ever companies need business analytics solutions that can increase sales, enhance productivity, and improve risk control. Blacklight software gives small to mid-market businesses an opportunity to implement the latest technology and create insightful digital products without requiring a dedicated team or familiarity with coding languages. Blacklight Solutions provides each client with a team of experts to help guide their journey in becoming evidence-based decision makers.

Capabilities and Benefits for Users

Blacklight is a cloud-based system that is built to scale with your business as it grows. It is the simplest way to create business analytics solutions that users can then sell to their customers. Users have the added ability to create dashboards and embed them in client facing portals. Additionally, users are enabled to grow and improve cash flow by creating data products that their customers can subscribe to resulting in generated revenue. Blacklight software also features an alerting system that notifies designated users when changes in data or anomalies occur.

"Blacklight brought the strategy, expertise and software that made analytics a solution for us to achieve new business objectives and grow sales," said Deren Koldwyn, CEO, Avannis, Blacklight Solutions client.

Blacklight software brings the full power of business analytics to companies that are looking for digital transformations and want to move fast. Blacklight Solutions is the only full-service solution that provides empowering software combined with the insight and strategy necessary for impactful analytics implementations. To learn more about Blacklight Solutions' offerings visit http://www.blacklightsolutions.com.

About Blacklight Solutions

Blacklight Solutions is an analytics firm focused on helping mid-market companies accelerate their growth. Founded in 2009, Blacklight Solutions has spent over a decade helping organizations solve business problems by putting their data to work to generate revenue, increase efficiency and improve customer relationships.

Media Contact:

Bailey Steinhauser979.966.8170244826@email4pr.com

View post:
Blacklight Solutions Unveils Software to Simplify Business Analytics with AI and Machine Learning - El Paso Inc.