Sometimes it can be tricky to identify what will be popular in the years to come, but that doesn’t stop big data from trying. Cultural anomalies are particularly difficult to predict, but an algorithm is attempting to predict which modern novel will become the next big bestseller. Jodie Archer, author of an upcoming book titled The Bestseller Code: Anatomy of the Blockbuster Novel, takes a critical look at what makes something popular amongst consumers--particularly in regard to literature.
Mobile? Grab this Article!
Security Tip of the Week Technology Best Practices Cloud Privacy Internet Business Computing Hackers Microsoft Software Hosted Solutions Productivity Malware Business Management Backup Google Network Security Business Efficiency IT Services Mobile Devices Managed Service Provider Hardware User Tips IT Support Computer Innovation Windows Business Continuity Disaster Recovery Workplace Tips VoIP Data Saving Money Upgrade Email Mobile Device Management Miscellaneous Server Smartphones Windows 10 Managed IT Services Outsourced IT communications Small Business Communication Smartphone Virtualization Network Mobile Computing Microsoft Office Data Backup Productivity Browser Save Money Tech Term Passwords Holiday Information Technology Social Media Operating System Quick Tips Alert Android Cybersecurity Apps Ransomware Cybercrime BYOD Data Recovery Chrome Going Green Gadgets Health Mobility Internet of Things Office Managed IT Collaboration Employer-Employee Relationship Spam Best Practice Office 365 BDR Firewall Remote Computing Application The Internet of Things Law Enforcement Data Security Hacking WiFi Windows 10 Automation IT Support Remote Monitoring Money Marketing IT Solutions Telephone Systems Budget Saving Time History Search Tablet Phishing Avoiding Downtime Vulnerability Cost Management Hosted Solution Wireless Technology Phone System User Error Tech Support Facebook Big Data VPN Computers Users Recovery Cloud Computing Data Management Risk Management Router Mobile Office Vendor Management Hard Drives Unified Threat Management Password Apple Social Two-factor Authentication Content Filtering Maintenance App Government Office Tips Bring Your Own Device Customer Relationship Management Bandwidth Encryption OneNote Gmail Proactive IT Applications Antivirus PowerPoint Personal Information Networking Wearable Technology Streaming Media Social Engineering Humor Education Information Compliance SaaS Intranet Printer Audit Wireless Work/Life Balance Disaster Unsupported Software Google Drive Wi-Fi Artificial Intelligence Shortcut Managed IT Services Administration Current Events USB Update Lithium-ion battery Data Breach iPhone Analytics Hacker Identity Theft Net Neutrality Cleaning Flexibility Television Retail Augmented Reality Telephony Excel HaaS Printer Server Blockchain Value Private Cloud Network Congestion Laptop Business Intelligence Outlook Mobile Device Politics Save Time Project Management Travel Data Protection Trending Managed Service Virtual Reality Data Storage Redundancy Evernote Management eWaste Twitter Transportation Online Currency Google Docs Solid State Drive Windows 8 Sports Display Managing Stress Meetings Word Storage Scam Uninterrupted Power Supply Human Resources Robot Amazon Business Technology Mobile Security Social Networking Battery Fraud Instant Messaging Computer Care Computer Repair Commerce Emails Virus Touchscreen Patch Management Automobile Paperless Office Google Assistant End of Support Benefits Computing Fax Server Cortana Entertainment Access Control DDoS Lifestyle Internet Exlporer IT Consultant Wireless Charging Software as a Service Customer Service Legal Samsung Biometrics HIPAA Computer Accessories Point of Sale Devices WannaCry Data Loss Language Training Programming Near Field Communication NFL Experience Comparison Regulations Chromebook Wasting Time Gift Giving Keyboard Shortcuts Webinar Adobe Touchpad MSP Hybrid Cloud Mouse App store IT Management Shadow IT Consultant Spyware Gamification Nokia Vendor Screen Mirroring Credit Cards Company Culture IT consulting Workers Financial Technology IT service iOS Relocation Music 3D Printing Specifications Avoid Downtime Cameras Smart Tech Accessory Payroll IT solutions Licensing Worker Commute IT budget Nanotechnology Microsoft Excel PDF Windows 7 Files WIndows Server 2008 Memory Running Cable Co-managed IT Inbound Marketing Proactive Employee-Employer Relationship Website Cast FAQ Scalability OneDrive Reliable Computing Updates Printing User Domains Computer Fan Windows Ink Books Sales Employer Employee Relationship Presentation Connectivity Surge Protector Data storage Security Cameras Windows 10s Mobile Root Cause Analysis File Sharing Text Messaging Keyboard Identity Co-Managed Services Virtual Desktop Chromecast Peripheral Ebay Edge Students Websites Testing Bloatware Blogging Charger How To Microsoft Word Best Available Bluetooth Dark Web Google Maps Electronic Medical Records Science IT Technicians Conferencing Video Games Content Filter Machine Learning Hard Disk Drive Professional Services Reputation Identities Virtual Assistant Hiring/Firing Data Privacy Telephone Administrator Regulation Document Management Ciminal Unified Communications Data Theft Camera HBO Device Security Computer Forensics SharePoint Advertising Safety Alexa for Business Managed IT Service Gifts ISP Monitoring Branding Tablets Colocation IoT Tutorial Settings Legislation Smart Technology Hard Drive Hyperlink Buisness Access Admin Sync Financial Distributed Denial of Service Emergency Analysis Projects Black Market Upgrades WIndows 7 Wireless Internet Teamwork Cache Printers Monitors Worker Wasting Money CrashOverride Downtime