The K.I.S.S Principle

The K.I.S.S Principle

The temptation with business intelligence, and especially with the amount of real-time information now present in the modern age, is the tendency to too much. However this excess of real-time data, far from giving us a complete view of a developing situation, can...
DDoS: Most Important Hacker Tool in 2015

DDoS: Most Important Hacker Tool in 2015

The Internet is undoubtedly one of the greatest technological gifts humanity has ever seen. It has transformed society and the way we look at the world and communicate with each other; it’s been a boon to commerce and business. All of this is balanced, however,...
Cloud Services Comparison

Cloud Services Comparison

Business Intelligence used to mean massive overheads – caused by old-style data centers – consuming as much as 58% of the revenue received. Not any more: with a move to cloud computing these costs can be reduced drastically. Labor costs can be kept at 6%, while...
Growing ROI on Cloud Business Intelligence

Growing ROI on Cloud Business Intelligence

An ever-growing number of businesses are now choosing to run their mission-critical intelligence operations on the cloud. It is clear that it is now becoming a mainstream technology. For good reason too. It is increasingly superior, and proving to be a more than...
IoT is a New Backdoor for DDoS Attacks

IoT is a New Backdoor for DDoS Attacks

One of the more unorthodox and interesting ways that hackers can perform a DDoS attack is through the backdoor of millions and millions of improbable devices from Fridges to Coffeepots. Using the fast emerging Internet of Things (IoT) hackers can take control of vast...