Predicting consumer behavior with big data
Businesses of the past operated like a rookie playing darts, throwing something and hoping it sticks.
Businesses of the past operated like a rookie playing darts, throwing something and hoping it sticks.
Machine learning & AI
Feb 13, 2019
0
17
The head of the US agency that regulates telecommunications is calling for an easing of the ban on using mobile phones and other electronic devices on airplanes during takeoff and landing.
Telecom
Dec 07, 2012
1
0
Earlier this year, Martin Dias, assistant professor in the D'Amore-McKim School of Business, presented research for the National Law Enforcement Telecommunications System in which he examined Nlets' network and how its governance ...
Other
Oct 09, 2013
1
0
Davista Technologies LLC, a startup that licensed a Purdue University innovation, has developed a visual data analytics solutions technology that could provide real-time information to help first responders save lives.
Computer Sciences
Dec 09, 2016
0
7
Volcanoes are not fed by molten magma formed in large chambers finds a new study, overturning classic ideas about volcanic eruptions.
Earth Sciences
Dec 04, 2018
0
56
By 2050, most people on Earth will live downstream of tens of thousands of large dams built in the 20th century, many of them already operating at or beyond their design life, according to a UN University analysis.
Environment
Jan 22, 2021
4
24
Two studies in the latest issue of the Journal of Law and Economics cast doubt on whether sex offender registry and notification laws actually work as intended.
Social Sciences
Aug 30, 2011
25
0
Concerns that law enforcement fusion centers are violating individuals' privacy rights as they gather intelligence on terrorism, criminals and other threats to public safety are the exception and certainly not the rule, according ...
Social Sciences
Jul 22, 2016
1
6
Gentrification reduces crime rates and increases public safety in city neighborhoods, according to a new study by MIT researchers.
Social Sciences
Dec 27, 2017
4
22
One method for safeguarding online anonymity is Tor, "the onion router", whose name comes from its method of adding and stripping away encryption layer by layer as messages pass from one node to another in the network en ...
Security
Nov 07, 2014
0
0