IBM Emerging Technologies Contributes Notebook Tech to Project Jupyter

The IBM Emerging Technologies team has been active within the open source community over the past few weeks. Recently, the team engaged with the Project Jupyter governing body to help define an incubation process that provides the community a path to propose, create, and develop potential Jupyter sub-projects. On September 29th, the Emerging Technologies team contributed three new incubator projects […]

Read more

Gridplumb: a grid-based diagrammer for the web

In an earlier post, we mentioned how the jStart team is constantly learning, taking advantage of the abundance of high-quality open source projects, and putting them to work for our clients. When faced with a new technological challenge, our solution architects will start with a thorough review of existing technology (both IBM and open source). More and more, we’re finding […]

Read more

Apache Spark – Utilizing Access Point Wi-Fi Data

Intro Did you know that Wi-Fi routers used within your home or outside in public are capable of collecting a wealth of information about your mobile devices even if you never actually sign in and connect to the Internet? Wi-Fi is ubiquitous in today’s world and cell phones and other mobile devices are almost always either passively or actively probing […]

Read more

TrueNorth – Next Generation Cognitive Computing

In August, members of the Emerging Technologies team joined with a group of over 60 researchers from academia and government at the Silicon Valley Lab in San Jose California, for an in depth learning experience about IBM’s new neurosynaptic processing chip called TrueNorth. The three week bootcamp was organised by the Almaden Research team headed by IBM Fellow Dharmendra Modha. The purpose […]

Read more

Setting Mobile Identity Apart

Identity Theft We’ve all heard the stories of identity theft. Being America’s fastest growing crime, identity theft affects millions people every year and remains the top consumer complaint in the Federal Trade Commission. As the momentum of mobile and cloud applications grows, fraud becomes even more pervasive, and scams become ever more sophisticated. Hackers continue to thrive in compromising payment, […]

Read more