Scott Edmunds slides from class 7 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open data policy and practice, and the Hong Kong context.
Web Technology Trends for 2008 and Beyond, May 2008 UpdateRichard MacManus
An overview of emerging web technology trends, as covered on top tech blog ReadWriteWeb; such as Websites becoming web services, Semantic Apps, Open Data, Mobile Web, Recommendation Engines. This presentation was given by ReadWriteWeb Founder and Editor Richard MacManus at XMediaLab, Wellington, May 2008.
UPDATE: The latest version of this presentation is here: http://www.slideshare.net/ricmac/readwriteweb-presentation-dec08-presentation/
Prof. Hendrik Speck - IMEA 3 Heidelberg - Social MediaHendrik Speck
Prof. Hendrik Speck -
IMEA 3 Heidelberg - Social Media
prof. hendrik speck, imea 3, imea3, heidelberg, social media, risks, opportunities, insurance, trust, media, audience, reach, value, user, reputation, trust, loyalty, mediademogaphics, web 2.0, facebook, flickr, twitter, wikipedia
Information Extraction from Text, presented @ DeloitteDeep Kayal
Useful unstructured text occurs in plentiful amounts, and often is central to the success of a business. The benefits of being able to successfully decipher unstructured text can be direct or derived. Companies which offer products for medical differential diagnosis are directly benefitted by the ability to correctly extract drug-disease interactions from publications, for example. As for derived benefits of text processing, we need to look no further than cases of improving process flows by analyzing the sentiment of the emails a company receives from its customers.
Being at the frontier of natural language processing, information representation and retrieval, information extraction has been the subject of extensive research for several decades and there are plenty of existing techniques to help with the understanding of unstructured textual content. This presentation will introduce and summarize useful techniques that are helpful in tackling sub-domains of information extraction, such as named entity recognition, keyword extraction and document summarization for efficient retrieval. Additionally, the talk will also emphasize low-resource cases, when not much useful labelled information is available.
Scott Edmunds slides from class 7 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open data policy and practice, and the Hong Kong context.
Web Technology Trends for 2008 and Beyond, May 2008 UpdateRichard MacManus
An overview of emerging web technology trends, as covered on top tech blog ReadWriteWeb; such as Websites becoming web services, Semantic Apps, Open Data, Mobile Web, Recommendation Engines. This presentation was given by ReadWriteWeb Founder and Editor Richard MacManus at XMediaLab, Wellington, May 2008.
UPDATE: The latest version of this presentation is here: http://www.slideshare.net/ricmac/readwriteweb-presentation-dec08-presentation/
Prof. Hendrik Speck - IMEA 3 Heidelberg - Social MediaHendrik Speck
Prof. Hendrik Speck -
IMEA 3 Heidelberg - Social Media
prof. hendrik speck, imea 3, imea3, heidelberg, social media, risks, opportunities, insurance, trust, media, audience, reach, value, user, reputation, trust, loyalty, mediademogaphics, web 2.0, facebook, flickr, twitter, wikipedia
Information Extraction from Text, presented @ DeloitteDeep Kayal
Useful unstructured text occurs in plentiful amounts, and often is central to the success of a business. The benefits of being able to successfully decipher unstructured text can be direct or derived. Companies which offer products for medical differential diagnosis are directly benefitted by the ability to correctly extract drug-disease interactions from publications, for example. As for derived benefits of text processing, we need to look no further than cases of improving process flows by analyzing the sentiment of the emails a company receives from its customers.
Being at the frontier of natural language processing, information representation and retrieval, information extraction has been the subject of extensive research for several decades and there are plenty of existing techniques to help with the understanding of unstructured textual content. This presentation will introduce and summarize useful techniques that are helpful in tackling sub-domains of information extraction, such as named entity recognition, keyword extraction and document summarization for efficient retrieval. Additionally, the talk will also emphasize low-resource cases, when not much useful labelled information is available.
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Hendrik Speck
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Executive Forum, June 8th 9th 2009 Berlin Germany. social networks, social media, web 2.0, social network analysis, usage, audience, user, markets, revenues, google, youtube, myspace, wikipedia, attributes, search engines, marketing, lobbying, information mining, information retrieval, risk, law, security, branding, marketing, privacy, private sphere, public sphere, anonymity, surveillance, panopticon, sousveillance, hype, history, features, examples, captcha, security, cracking, data portability, decentralization
Network Relationships and Job Changes of Software Developers at Sunbelt 2016Dawn Foster
This presentation looks at job changes of software developers within an open source software community using
relational predictors of job change activity to model the actions of the actors involved. Interactions with other actors
on mailing lists and in software contributions will be used as predictors.
Open source software is developed in the open where anyone can view the source code and anyone with the knowledge
to do so can contribute to the project. Because people from around the world work on these projects together using
online tools with publicly accessible interactions between people, it is a relevant setting for studying job changes
using Social Network Analysis to understand and model the network relationships between individuals both before
and after a job change.
Analysis of Cyberbullying Tweets in Trending World Eventskcortis
This paper was presented at the 15th International Conference on Knowledge Technologies and Data-Driven Business (http://i-know.tugraz.at/) in Graz, Austria on 21 October 2015.
The full paper can be found at: http://doi.acm.org/10.1145/2809563.2809605
This is a vision talk, looking at what is happening on the Web with large scale community interactions. It discusses ongoing efforts, Chinese Human Flesh Search Engine, and a research agenda for "Social Machines" based on these emerging challenges.
A workshop about Social Network Analysis and Condor software developed by Peter Gloor, MIT. The workshop aimed to provide an introduction for design students into SNA and this free software tool for SNA.
Scott Edmunds slides for class 8 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open science and data publishing
From Academic Library 2.0 to (Literature) Research 2.0Michael Habib
Congress Center Hotel Zira
Belgrade, Serbia – October 29, 2009
Hosted by University of Belgrade...
Blog post discussing the presentation and the proposed Research 2.0 Concept Model:
http://mchabib.com/2009/11/04/research-2-0-concept-model-presentation/
A video of the lecture is now available here: http://bit.ly/6VpsbX
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Hendrik Speck
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Executive Forum, June 8th 9th 2009 Berlin Germany. social networks, social media, web 2.0, social network analysis, usage, audience, user, markets, revenues, google, youtube, myspace, wikipedia, attributes, search engines, marketing, lobbying, information mining, information retrieval, risk, law, security, branding, marketing, privacy, private sphere, public sphere, anonymity, surveillance, panopticon, sousveillance, hype, history, features, examples, captcha, security, cracking, data portability, decentralization
Network Relationships and Job Changes of Software Developers at Sunbelt 2016Dawn Foster
This presentation looks at job changes of software developers within an open source software community using
relational predictors of job change activity to model the actions of the actors involved. Interactions with other actors
on mailing lists and in software contributions will be used as predictors.
Open source software is developed in the open where anyone can view the source code and anyone with the knowledge
to do so can contribute to the project. Because people from around the world work on these projects together using
online tools with publicly accessible interactions between people, it is a relevant setting for studying job changes
using Social Network Analysis to understand and model the network relationships between individuals both before
and after a job change.
Analysis of Cyberbullying Tweets in Trending World Eventskcortis
This paper was presented at the 15th International Conference on Knowledge Technologies and Data-Driven Business (http://i-know.tugraz.at/) in Graz, Austria on 21 October 2015.
The full paper can be found at: http://doi.acm.org/10.1145/2809563.2809605
This is a vision talk, looking at what is happening on the Web with large scale community interactions. It discusses ongoing efforts, Chinese Human Flesh Search Engine, and a research agenda for "Social Machines" based on these emerging challenges.
A workshop about Social Network Analysis and Condor software developed by Peter Gloor, MIT. The workshop aimed to provide an introduction for design students into SNA and this free software tool for SNA.
Scott Edmunds slides for class 8 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open science and data publishing
From Academic Library 2.0 to (Literature) Research 2.0Michael Habib
Congress Center Hotel Zira
Belgrade, Serbia – October 29, 2009
Hosted by University of Belgrade...
Blog post discussing the presentation and the proposed Research 2.0 Concept Model:
http://mchabib.com/2009/11/04/research-2-0-concept-model-presentation/
A video of the lecture is now available here: http://bit.ly/6VpsbX
Slides from a webinar on webware presented by Mike Qaissaunee and Gordon F. Snyder, Jr. (both of nctt.org). The webinar was hosted by MATEC NetWorks (http://www.matecnetworks.org/) and delivered via Elluminate. Visit MATEC NetWorks to watch the webinar.
Web 2.0, Hip or Hype - A Library Perspectivelibsys
Ever hear the terms Web 2.0 or Library 2.0, but don't know what the heck they mean? Chad and Shane will do their best to explain these terms, and what these terms mean for libraries today and in the future. Learn about interesting new "2.0" applications in the library world as well as the web at large and discuss what libraries can do to harness the potential of the collective intelligence.
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Kalilur Rahman
AI is the new ELECTRICITY - said Andrew Ng. There are two sides of the coin. There are a lot of nay-sayers for AI. At the end of the day, it will be Augmented Intelligence, Adaptive Intelligence, Automated Intelligence that will propel human intelligence forward - more than anything else. It will be a great time ahead. Whether it would be an "Eye(AI) Wash" as skeptics say or an "I wish" from them for starting late on the journey, only time will tell. It is a matter of when and how long, instead of an If. #ArtificialIntelligence #IntelligentTesting #QCoE #NextGenTesting #QualityFocusedDelivery #DigitalInnovation #ITIndustry #NewAgeIT #InnovativeTesting#AIFication #Automation #DigitalEconomy #Singularity #Transcendence #Futurism
Representing financial reports on the semantic web a faithful translation f...Jie Bao
Jie Bao, Graham Rong, Xian Li, and Li Ding (2010). Representing Financial Reports on the Semantic Web - A Faithful Translation from XBRL to OWL. In The 4th International Web Rule Symposium (RuleML).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
A tale of scale & speed: How the US Navy is enabling software delivery from l...
Semantic Web: In Quest for the Next Generation Killer Apps
1. Semantic Web:
In Quest for the Next
Generation Killer Apps
Jie Bao
Tetherless World Constellation
Rensselaer Polytechnic Institute
baojie@cs.rpi.edu
http://www.cs.rpi.edu/~baojie
Oct 22nd, 2010 @ UMass Lowell 1
2. Outline
• Why Semantic Web?
• Key SW Standards
• Opening Data for SW
• Building SW Applications
2
4. A Killer App is
• …Any computer program that is so
necessary or desirable that it proves
the core value of some larger
technology, […]. A killer app can
substantially increase sales of the
platform on which it runs.
-- Wikipedia
4
http://en.wikipedia.org/wiki/Killer_application
28. What We Need
• A standard data interchange format
• A standard representation of the
meaning of data
• A standard way to link data
28
29. Semantic Web Languages
29
Source: W3C's Semantic Web Activity / Semantic Web overview
http://www.w3.org/2007/Talks/0130-sb-W3CTechSemWeb/#%2824%29
The Layer Cake
33. SPARQL= SPARQL Protocol And RDF
Query Language
A query language for RDF
SELECT ?person ?org
WHERE{
?person foaf:knows rpics:hendler .
?person swrc:affiliation ?org .
}
(find all people (and their affiliations) who know
Hendler)
33
34. OWL = Web Ontology
Language
• A much more powerful ontology language
• Examples (informally)
– If twitter:baojie and linkedin:baojie both use email
baojie@cs.rpi.edu, then they belong to the same
person.
– If Westin hotel is in Palo Alto, and Palo Alto is in
the Bay Area, then Westin hotel is in the Bay Area.
• OWL 1 (2004), OWL 2 (2009)
34
55. Financial Data
55
Perry Grossman, Devin Mcqueeney, Graham G Rong, Lorin Wilde, Danny Yuan, Jie Bao
(coach). FinanceSphere, MIT LinkedData IAP 2010 Project
56. Financial Data
56
Bao, J., Rong, G., Li, X., and Ding, L. Representing Financial Reports on the Semantic Web - A
Faithful Translation from XBRL to OWL. In The 4th International Web Rule Symposium (RuleML).
2010
XBRL= eXtensible Business Reporting Language
57. RPI Map
http://map.rpi.edu
Jie Bao , Jin Guang Zheng, Rui Huang & Li Ding. Mesh-up Map and Events on Semantic Wiki: Applications in e-Science and Campus Information
System. SemanticWiki mini-series Session-4. Jan. 22, 2009. ontolog.cim3.net
59. Data-gov Wiki
Li Ding and James Michaelis and Deborah L. McGuinness and Jim Hendler, Making Sense of
Open Government Data, in Proceedings of WebSci2010, 2010.
60. Data Mashup and Visualization
60
DiFranzo, D.: Developer Diary: CASTNET Ozone Map Demo. In WebSci 2010 poster.
http://data-gov.tw.rpi.edu/wiki/Demo:_Clean_Air_Status_and_Trends_-_Ozone
61. Data Mashup and Visualization
61
James Michaelis: http://data-gov.tw.rpi.edu/wiki/Demo:_Comparing_US-USAID_and_UK-DFID_Global_Foreign_Aid
63. Where are we?
63
Picture source: Wikipedia (http://en.wikipedia.org/wiki/Technology_adoption_lifecycle)
Adapted from “Semantic Web Adoption and Applications”, Ivan Herman, W3C. 2010-10-07 Slide 5
2005
64. Where are we?
64
Picture source: Wikipedia (http://en.wikipedia.org/wiki/Technology_adoption_lifecycle)
Adapted from “Semantic Web Adoption and Applications”, Ivan Herman, W3C. 2010-10-07 Slide 5
2010
65. The 2007 Gartner predictions
• By 2012, 80% of public Web sites will use some
level of semantic hypertext to create SW documents
[…] 15% of public Web sites will use more extensive
Semantic Web-based ontologies to create semantic
databases
• By 2017, we expect the vision of the Semantic Web
[…] to coalesce […] and the majority of Web pages
are decorated with some form of semantic hypertext.
65
“Finding and Exploiting Value in Semantic Web Technologies on the Web”, Gartner Report, May 2007
67. On ATM
67
You can check transactions by their categories, and the ATM knows that not all items
from BestBuy are electronics (e.g., office supplies), since it is connected to the BestBuy
product database.
68. On TV
68
It can generate a personalized program list of movies starred by Sean Connery,
since it is connected to IMDB
69. In Your Car
69
Picture from: http://electronics.howstuffworks.com/gadgets/automotive/car-gps-accidents.htm/printable
The in-car GPS tells you attractions of the revolutionary war era, since it can read a semantic
version of Wikipedia and a geo-location database from the US government.
One of the first examples of a killer application is generally agreed to be the VisiCalc spreadsheet on the Apple II platform.[1] The machine was purchased in the thousands by finance workers (in particular, bond traders) on the strength of this program
For Windows
Once the most popular browser
Promote WWW
The currently most successful Social Network
HTML, XML
Expedia, Mint, Zillow all provide different solutions
Reinvent the wheel
For this demo, we used RDF data derived from ozone and visibility readings provided by the EPA's Castnet project. This RDF combines raw data on Castnet readings (ozone and visibility) with corresponding geographic information on the sites of readings, which the raw Castnet data lacks. On the provided map of the US, every yellow dot represents a single Casetnet site and dot size corresponds to an average Ozone reading for that site, where larger dots represent larger averages. When a Castnet site is clicked, a small pop-up opens, displaying more information on that site, along with a link. This link takes the user to another page that displays in a timeline all the Ozone and Visibility data available for that site. This timeline uses the Google Visualization API giving users added functionality in how they view the data in the timeline. To allow users to filter through Castnet readings, a faceted browsing interface (from the MIT Simile Exhibit API) is provided.
This application presents a mashup of foreign aid data (represented in US Dollars) from the United States Agency for International Development (USAID) and UK Department for International Development (DFID) for the 2007 US Fiscal Year.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company