{"id":31863,"date":"2019-09-10T03:46:00","date_gmt":"2019-09-10T07:46:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31863"},"modified":"2019-09-10T03:46:00","modified_gmt":"2019-09-10T07:46:00","slug":"what-gives-data-a-competitive-edge","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/10\/what-gives-data-a-competitive-edge\/","title":{"rendered":"What gives data a competitive edge"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.ciodive.com\/editors\/sschwartz\/\">By Samantha Ann Schwartz<\/a> &#8211; If a business wants its competitors to read &#8217;em and weep, it needs artificial intelligence, data scientists and a chief information officer willing to lean hard on data collection and management.\u00a0<\/p>\n\n\n\n<p>A lot of the <strong>AI <\/strong>algorithms used by data scientists have been monetized and made available by open source.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/09\/analytics-3088958__340-1.jpg\" alt=\"\" class=\"wp-image-31864\" width=\"323\" height=\"209\"\/><\/figure><\/div>\n\n\n\n<p>&#8220;It&#8217;s becoming more and more cut and paste into terms of putting together your <strong>AI<\/strong> model,&#8221; said Robert Eve, senior director of data management at infrastructure software companyTIBCO, in an interview with CIO Dive.\u00a0<\/p>\n\n\n\n<p>Building blocks of <strong>AI<\/strong> models will allow a level of consistency to emerge among algorithms. But the problem is, if a company is more or less equal to its competitor, how can it win?\u00a0<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ibm.com\/downloads\/cas\/1WN5DGJX\" target=\"_blank\">Advisory firm IDC<\/a>\u00a0outlines three factors companies need to effectively compete using data:\u00a0 <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.ciodive.com\/news\/what-gives-data-a-competitive-edge\/561930\/&amp;ct=ga&amp;cd=CAEYAioTNTk1MDY0MTg2MjkyMDkzNjQ3MzIaMzFiNWZiZjcxOGQyZWZhYzpjb206ZW46VVM&amp;usg=AFQjCNHR0mnPGUvOaCbwS7vunpzro1GyTw\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Samantha Ann Schwartz &#8211; If a business wants its competitors to read &#8217;em and weep, it needs artificial intelligence, data scientists and a chief information officer willing to lean hard on data collection and management.\u00a0 A lot of the <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/10\/what-gives-data-a-competitive-edge\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[638,75],"tags":[639,195],"class_list":["post-31863","post","type-post","status-publish","format-standard","hentry","category-ai","category-analytics","tag-ai","tag-analytics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31863"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31863\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}