Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Kind of a Story Do Readers Want? Big Data Knows

What Kind of a Story Do Readers Want? Big Data Knows

Sometimes it can be tricky to identify what will be popular in the years to come, but that doesn’t stop big data from trying. Cultural anomalies are particularly difficult to predict, but an algorithm is attempting to predict which modern novel will become the next big bestseller. Jodie Archer, author of an upcoming book titled The Bestseller Code: Anatomy of the Blockbuster Novel, takes a critical look at what makes something popular amongst consumers--particularly in regard to literature.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityHardwareIT ServicesProductivityUpgradewindowsComputerCommunicationEmailDataSmartphonesIT SupportMiscellaneousSaving MoneyGadgetsVirtualizationWindows 10SmartphoneAppsBusiness ContinuitySmall BusinessNetworkDisaster RecoveryBrowserVoIPServerMicrosoft OfficeMobile Device ManagementSocial MediaAndroidTech TermHealthInformation TechnologyMobile ComputingQuick TipsPasswordsCybersecurityOperating SystemOffice 365Going GreenData BackupHolidayWindows 10Mobile OfficeData RecoverycommunicationsChromeOfficeSave MoneyOutsourced ITApplicationInternet of ThingsEmployer-Employee RelationshipBYODAppAlertBest PracticespamCollaborationCybercrimeUsersRansomwareMarketingSearchLaw EnforcementManaged IT ServicesData SecurityIT SupportWiFiBring Your Own DeviceThe Internet of ThingsFacebookTabletWirelessWearable TechnologyRemote ComputingPhishingAppleVendor ManagementRouterWireless TechnologyBDRiPhoneUser ErrorMobilityRemote MonitoringAutomationAntivirusRisk ManagementUnified Threat ManagementCost ManagementAvoiding DowntimeMaintenanceSaving TimeHackingMoneyHistoryBig DataTelephone SystemsEncryptionOneNoteGovernmentArtificial IntelligenceHard DrivesBandwidthOffice TipsPasswordComputersData ManagementCloud ComputingIT SolutionsCustomer Relationship ManagementSocialTech SupportInformationGmailUSBPowerPointGoogle DriveAnalyticsBudgetProactive ITFirewallPhone SystemLithium-ion batteryTwo-factor AuthenticationCurrent EventsUpdateSocial NetworkingManaged IT ServicesVPNHumorWebsiteUnsupported SoftwareNet NeutralityShortcutEducationWi-FiPrinterNetworkingVulnerabilityOutlookDisasterSocial EngineeringWordManaged ServiceEntertainmentStreaming MediaRecoveryManaged ITTrendingAuditBatteryIT COnsultantIntranetPersonal InformationComputer RepairLaptopAugmented RealityContent FilteringIdentity TheftExcelApplicationsVirusWork/Life BalanceTelevisionMeetingsBlockchainTravelRetailadministrationTelephonyPaperless OfficeMobile DevicePoliticsHIPAAData ProtectionComputingInternet ExlporerHuman ResourcesGoogle AssistantConferencingData StorageScamIT ManagementWindows 8DDoSInstant MessagingEmailsDevicesSportsBenefitsWannaCryComputer AccessoriesPatch ManagementeWasteTouchscreenFraudValueSamsungOnline CurrencySaaSGoogle DocsHaaSBusiness TechnologyAccess ControlAutomobileCleaningManaging StressWireless ChargingStorageMobile SecurityFile SharingPoint of SalePrinter ServerSave TimeYoutubeData BreachProject ManagementComputer CareCortanaProgramminghackerTwitterHybrid CloudEvernoteHosted SolutionSalesHard DriveBusiness IntelligenceUninterrupted Power SupplyDisplayCustomer ServiceAmazonLegalTransportationBiometricsOneDriveEnd of SupportCommerceVirtual RealityFlexibilityPrivate CloudFax ServerPrintingMicrosoft WordPCEbayAdvertisingTelephoneLanguageScalabilityDebateData storageHelp DeskIT consultingiOSDowntimeExperienceDevice SecuritySmartwatchPDFSoftware as a ServiceHyperlinkUpgradesWindows InkHow ToMusicComputer ForensicsReliable ComputingComputer FanGiftsE-CommerceScreen MirroringServer MaintenanceComplianceEmployer Employee RelationshipWIndows Server 2008Text MessagingDistributed Denial of ServiceWasting TimeBloatwareProactiveConsultantGoogle Maps3D PrintingBooksTouchpadSurge ProtectorManagementCredit CardsPayment CardsCastSpywareInvestmentInbound MarketingVendorFilesAccessoryWebsitesData LossLifestyleBlack MarketEmployeeElectronic Medical RecordsBrandingWireless InternetMonitorsFAQMouseROISyncEmployee-Employer RelationshipChromecastPeripheralData TheftWebinarBreak/FixSafetyOperating SysytemGamificationWIndows 7NanotechnologyChargerNetwork CongestionEdgeTrainingCommunityApp storeRegulationsIT solutionsMicrosoft ExcelMedical ITISPBluetoothMemoryRoot Cause AnalysisCiminaljunkIntrantetCompany CultureAdobeNokiaTestingCamerasWindows 10sGift GivingAdmin5GBloggingReputationTutorialSharePointFinancialUserfilterCameraMicrobloggingAdministratorVirtual DesktopIdentityPresentationSolid State DriveKeyboard ShortcutsWorker CommuteEmployeesKeyboardTeamworkBest AvailableSettingsScienceIT budgetLicensingVideo GamesProjectsCo-managed ITAccessData PrivacyHard Disk DriveLegislationPayrollVoice over Internet ProtocolHiring/FiringVirtual AssistantWorkersWindows 7TabletsWebinarImagesBuisnessChromebookComparisonSecurity CamerasUpdatesSabotageSmart TechnologyHBOPrint ServerRunning CableAlexa for BusinessCo-Managed ServicesIdentitiesNFLRobotNear Field CommunicationSpecificationsMachine Learning