Blog Banner

4 Intriguing Things Data Analytics Can Do

Here are four cool, creepy, and intriguing reasons why IBM's DB2 certification is awesome

Anyone who shops online has already experienced Facebook and other frequented Web pages' uncanny ability to somehow know what you've been up to. The first few times it's a bit creepy. How do they know? Am I being watched? After a while, you just get used to it. The especially curious might even take the time to figure out how cookies work, how they can be cleared and so on. 

Cisco Moves Deeper Into the IoT with Jasper Purchase

Cisco's most recent acquisition shows its continued interest in the IoT

It's a great day for the Internet of Things and those who like to trumpet its expected success. Cisco has announced that it will be purchasing Jasper Technologies, a company that wants to help enterprises connect their commodities to the Internet. The IoT is all about getting devices once thought to be cut off from the Internet onto the network, thereby allowing them to communicate with each other and make your life easier. 

Microsoft Ends Support for Windows 8

In a move that's been a long time coming, Microsoft has announced that it will no longer be giving support to Windows 8. Although this is a big announcement, it certainly shouldn't be a surprise to users who have been paying attention. 

10 Reasons to Choose New Horizons as Your Preferred Training Partner!

Want to learn the best from the best? Check out our 10 reasons why YOU should choose New Horizons as your preferred training partner. With five locations in Southern California and two in Southern Arizona, we have the classes you need to stay competitive in the marketplace!

Will 2016 Be the Year of Cybersecurity?

There are few jobs as cool and as necessary as those within the cybersecurity realm. Professionals in this field are working on the cutting-edge of technology, using highly-refined computer based training to keep cybercriminals at bay. Working in cybersecurity is consistently challenging as hackers are constantly updating and changing their techniques in order to gain access to private data. 


Contact author


Subscribe for Future Blog Notifications