Pam Cameron

Locking Up Your Identity

Identity Theft, by John R. Vacca, is a must-read in todays technological society. It will show you how to protect your familys personal information from being misappropriated by criminals...

Probing the Minds of Online Customers

"Customer-Centered Design" by Kreta Chandler and Karen Hyatt, will give readers a firm understanding of what online customers are looking for, the patterns that they use to shop and...

Web Site Design: Learn From the Best

"Homepage Usability" deconstructs 50 of the most popular Web sites on the Internet—including Amazon.com and Microsoft.com—and tells readers what works and why.I would highly recommend this book to anyone...

Latest Posts

Mulesoft CTO Matt McLarty on Digital Transformation

I spoke with Mulesoft CTO Matt McLarty about a new report that details 7 trends shaping digital transformation, from sustainability to cybersecurity. Among the topics...

C3 AI vs. DataRobot: Top AI CloudPlatforms

C3 AI and DataRobot are two of the leading AI cloud platforms. As such, this is a close comparison. Each has an extensive set...

AWS Boosts AI for Connect Contact Center Product

This week the largest cloud computing vendor, AWS, is holding its 11th re:Invent conference. Given its leading position in Infrastructure as a Service (IaaS),...

eWEEK TweetChat, December 13: Enterprise Tech in 2023

On Tuesday, December 13, at 11 AM PT, @eWEEKNews will host its monthly #eWEEKChat. The topic will be Enterprise Tech in 2023, and it...

Top Data Virtualization Tools

Data virtualization is the process of cleansing and integrating data from various sources so it can be more readily accessed and analyzed by business...