Build a Comprehensive Data & Analytics Governance Framework

April 13, 2022 | BST: 10:00 a.m. | CEST: 11:00

Data’s expanding reach across edge, on-premises and multiple cloud environments makes data & analytics governance more challenging. New regulations drive demand for effective data governance. This complimentary webinar will help data & analytics technical professionals build more effective data governance frameworks.

Read More

SEE MORE LIVE WEBINARS

theinfotech

The Integration of AI & Vision Technologies

Machine vision, computer vision, and AI (specifically deep learning) are complementary technologies that can perform a wide variety of tasks

theinfotech

PISTOIA ALLIANCE WEBINAR: GENERATIVE THERAPEUTICS DESIGN: ACCELERATING DRUG DISCOVERY WITH AI & MACHINE LEARNING

The application of Artificial Intelligence/Machine Learning (AI/ML) methods in drug discovery are maturing and their utility and impact are likely

theinfotech

Expert Panel: Putting Machine Learning Models to Work in Your Organization

Machine learning (ML) is the core of intelligent applications in the 21st-century economy. ML’s data-driven models power enterprises’ most mission-critical

theinfotech

Appreciation Intelligence: The New AI

Appreciation affects your bottom line and your workplace culture. Don’t think so? Think again! Your customers, clients, and co-workers want

theinfotech

AI at Shell

Shell is an international energy company that aims to meet the world’s growing need for more and cleaner energy solutions

theinfotech

IP and Artificial Intelligence

This webinar aims at providing a general overview of artificial intelligence (AI), machine learning and intellectual property. Read More See

theinfotech

NISO Webinar: Cybersecurity

This NISO educational event will bring together a group of experts in systems and cybersecurity to discuss the key challenges

theinfotech

Next-Gen SCA: Securing Modern SDLCs With Pipeline Composition Analysis

The first incarnation of software composition analysis (SCA) technologies came in 2002 when dependencies were a relatively minor issue in

theinfotech

Cybersecurity Maturity – Using the CIS Critical Security Controls to Define Your Future Roadmap

Using cybersecurity metrics can prove your value as a function, but where do you start? Using the Center for Internet