All Posts

The success of Growth Hacking has forced a radical re-thinking of our relationship with data

How RPA and no/low-code tools can cut marketing costs and generate growth

Vendor-neutral answers to the top 10 most commonly asked questions about CDPs

A Modern Marketing Manifesto for building a data-rich, customer-centered marketing engine

A gentle introduction to AWS’s authentication and access control service

5 practical tips for becoming a machine learning marketing ninja

Popular open source Python framework Zappa eases the pain of serverless development

How marketers can avoid getting duped by ‘faux AI’ vendors

Four ways to start incorporating AI and personalization into your marketing today

How a new wave of machine learning will impact today’s enterprise

Five key takeaways for designing, building and deploying serverless applications in the real world

Technology managers find themselves between a rock and a hard place, forced to choose between focusing on technical depth or leadership excellence. A potential solution comes from an unlikely source.

Neural Networks form the foundation for Deep Learning, the technique AlphaGo used with Reinforcement Learning (RL) to beat a Go master. In this article, we’ll explain how the basics of neural networks work.

Reinforcement Learning (RL) is the driving algorithm behind AlphaGo, the machine the beat a Go master. In this article, we explore how the components of an RL system come together in an algorithm that is able to learn.

Reinforcement Learning (RL) is at the heart of DeepMind’s Go playing machine. In the second article in this series, we’ll explain what RL is, and why it represents a break from mainstream machine learning.

Machine learning’s victory in the game of Go is a major milestone in computer science. In the first article in this series, we’ll explain why, and start dissecting the algorithms that made it happen.

Proximity technology alone won’t transform retail—it must be used to address customer need in the digital age.

Being a great technologist requires very different skills than being a great technology leader. The key to making the transition is adopting the right mindset.

Seven steps that will make this year the most secure year yet.

Containers represent a fundamental evolution in software development, but not for the reasons most people think.

Effective information security requires following strong security practices during development. Here are three ways to secure your build pipeline, and the source code to get you started.

Research proves what software developers already know: Agile projects are more fun and inspiring to work on. In this article, we review the science that explains why Agile fosters greater motivation.

The long path to DevOps enlightenment begins with the Developer’s IDE: Here’s how to get started on the journey. In this article we walk through the steps for automating the creation of a virtual development environment.

Cloud-computing makes possible a new breed of applications that are much more robust and highly tolerant to change. Here are 10 key architectural considerations when developing applications born in the cloud.

Emerging technologies like iBeacon and Near Field Communication (NFC) have opened up the possibilities for unparalleled in-store interactivity with shoppers. The key is staying focused on using this new tech to actually enhance the shopping experience for the customer.

By dissecting the methods used by hackers in the recent wave cyber attacks, we can identify ways to help us stay more secure online.

A wave of high profile security breaches was recently discovered, potentially affecting millions of people. Each attack had a unique footprint, giving us an interesting glimpse into the scary world of cyber crime.

Harvard University recently developed swarm-intelligent micro-bots that can self-organize and accomplish simple tasks. This is a great illustration of the possibilities of emergent phenomenon.

Dan Geer, the top security chief at the CIA’s VC firm In-Q-Tel, gave a thought provoking keynote at this year’s Black Hat security conference, arguing that thoughtful government regulation was the best hope for shoring up our cyber defense. He may just be right.

Project management as it’s practiced today is a throwback from the industrial revolution and it hinders innovation in today’s fast-paced, digitally-disruptive world. Agile project management is its logical successor, but managers need to embrace it as more than just a software methodology.

The science is crystal clear: performance-based compensation hasn’t worked for decades. So why is business still addicted to it?

Technological change is increasing at a such crazy pace, the disrupters themselves are facing existential threats from new upstarts. How can established companies hope to compete in this new world of constant change?

Many core business practices commonplace today are rooted in techniques developed during the turn of the twentieth century and are hindering companies from staying competitive in a business environment characterized by extreme uncertainty.