Big problems with big data and AI
Big data and artificial intelligence are tremendously popular in business. Everybody is using “machine learning” or “deep learning” or “analytics” or “neural networks” or any
Big data and artificial intelligence are tremendously popular in business. Everybody is using “machine learning” or “deep learning” or “analytics” or “neural networks” or any
Baby boomers beat out tech-savvy millennials in guarding their online security, according to a survey of over 4,000 internet users from 18 to over 65
Oxford University and Reuters did a big study of how U.K. media covered artificial intelligence. Here are some of the major points: About 60 percent
During a major data breach in December 2018, cybercriminals stole the names, addresses, phone numbers, email addresses, and passport numbers of up to 500 million
Online sources have become important in business journalism. Not sources in the sense of finding data somewhere or pouring through regulatory filings or a company’s
The tech industry prides itself on being forward looking and innovative. Enlightened and progressive. As well as its new approach to business. Except, there are
If anything has skated along on a pool of hype and general lack of understanding, it’s been blockchain. The technology gets touted as the answer
With millions of U.S. consumers using digital devices to pay bills and shop online, clever crooks have figured out a new scam: Stealing personal data
Identity theft among children under 17 is growing. In 2017, more than one million children were victims of identity theft or fraud, a recent 2018
With today’s technology, parents can watch out for their children — even if they’re not in the same room. Modern debates have included the opposite
Generating ideas is one of the more difficult challenges for many freelance reporters. Independent journalism requires not only sending out pitches but also doing
As large-scale data breaches continue to proliferate, many companies are crowdsourcing their security in hopes of fixing system vulnerabilities before attackers exploit them. Many companies
Two Minute Tips
Every Tuesday we send out a quick-read email with tips for business journalism. Sign up now and get one Tuesday.