Competitor Data Work For Your BI Analytics

Competitor Data Work For Your BI Analytics

It is almost a given that in this day and age, an organization will be mining its own customer data for consumer habits and insights into the marketplace. But what if your company was able to track the competition’s data as well – ethically, of course – but in a...
Is Your Biggest Threat Internal

Is Your Biggest Threat Internal

Your company could be compromised, even with a relatively tech-savvy workforce. Fooled into allowing attackers access to company networks, it is this mode of access that is one of the biggest cyber security challenges. Perceptive, well-meaning employees can be fooled...
Self Service Still Needs Self Actualization

Self Service Still Needs Self Actualization

Many companies’ experience of self service business intelligence (BI) is similar to the early days of agile development; companies were then drawn to a model that promised improved business-IT relations and expedited delivery cycles. This was particularly...
Social media by nature easily exploitable

Social media by nature easily exploitable

Social media is surely one of the phenomena of the 21st Century. Everyone has a favorite social media platform and this has changed the way we communicate – sharing news and gossip. Twitter and Facebook, for example, are force multipliers when it comes to the spread...
Top Three BI Tools

Top Three BI Tools

Self-service business intelligence makes data discovery and analysis remarkably easy. The three next generation tools only make this statement more true. Watching these new, easy-to-use and exploratory BI products outsmart and outperform the older platforms is seeing...
Rising Threat of Social Media Attacks

Rising Threat of Social Media Attacks

Social media is a useful tool for any business. Its ability to reach and engage with customers is unrivaled. However, with the rise in use, so comes the rise in attacks using this medium. Hackers and fraudsters have also cottoned on to the ‘potential’ in...