RESOURCES

Digital Transformation for Power Plant

Digital Transformation for Power Plant

Picture by Timothy Cheng, GE Reports Power system equipment condition monitoring is a must if you wish to ensure the efficiency and reliability of electricity supply. This is typically achieved with equipment maintenance or replacement based on typical service life...

Pushing Limits Of Analytics With  IoT

Pushing Limits Of Analytics With
IoT

Introduction The traditional method of analyzing data once it has been collected and saved is no longer fit for purpose. Today's technology requires data analysis while it is being created, while it is being transferred from one device to another, and while it is at...

Why Polling Prediction Failed – Data Quality

Why Polling Prediction Failed – Data Quality

In the modern world, data and information are driving forces of any business or operation. Poor data analysis can lead to unfortunate circumstances for any company or public organization. We only need to look at the latest election to see how false data collection and...

The Rise of Impersonator Bots-DDoS

The Rise of Impersonator Bots-DDoS

Distributed Denial of Service attacks are on the rise. At best it might mean your website is unavailable for a couple of hours. At worst, the most malicious can cost companies thousands upon thousands of dollars. Ofer Gayer, a security researcher writing for...

Don’t Neglect Data Relevance

Don’t Neglect Data Relevance

It is okay to have incomplete or inaccurate data in your system. That’s a statement that would make many business executives shudder. But in a sense it is true – a focus on accuracy and completeness without also looking at relevance can result in very unhelpful...

Past, Present & Future of BI Performance

Past, Present & Future of BI Performance

Improved business performance has been a promise of business intelligence gathering since forever. However it is in the last two decades that the technologies and processes have progressed to a point where they are genuinely beginning to help. While the advances in...

Big Data Trends in Business Intelligence

Big Data Trends in Business Intelligence

In the fast evolving and fast improving world of business analytics, big data has an increasing role to play in making intelligent business decisions. But not only is the role big data plays in your business intelligence analytics increasing, but so is the data...

A 50-billion Device Security Headache

A 50-billion Device Security Headache

With the huge growth in mundane devices, everything from fridges to light bulbs, being connected and integrated with each other in the new 'Internet of Things' (IoT), the scope for hackers has grown right alongside with it. The new network has undoubtedly many useful...

Rise in Big Data Analytics Spending Plans

Rise in Big Data Analytics Spending Plans

2015 is really the year that big data analytics is coming of age. Louis Columbus, writing in Forbes about the recent IDG Enterprise study, “2015 Big Data and Analytics, Insights Into Initiatives and Strategies Driving Data Investments,” provides us with some startling...

Succes of IAM

Succes of IAM

Identity and access management (IAM) is the cornerstone of cyber security when it comes to people and systems. It ensures that only approved people can access certain resources and systems. But what happens when you add the myriad of devices that are set to become...

The K.I.S.S Principle

The K.I.S.S Principle

The temptation with business intelligence, and especially with the amount of real-time information now present in the modern age, is the tendency to too much. However this excess of real-time data, far from giving us a complete view of a developing situation, can...

DDoS: Most Important Hacker Tool in 2015

DDoS: Most Important Hacker Tool in 2015

The Internet is undoubtedly one of the greatest technological gifts humanity has ever seen. It has transformed society and the way we look at the world and communicate with each other; it's been a boon to commerce and business. All of this is balanced, however, by the...