RESOURCES

Preventing  disaster at Power Plant

Preventing disaster at Power Plant

KievPost FoxNews Chernobyl accident A power plant must be monitored to ensure that it doesn’t fail, which could be a real disaster. That’s why you need an effective monitoring solution to prevent such a scenario. An integrated power plant operation monitoring (PPOM)...

How Machine Learning Makes IoT Relevant

How Machine Learning Makes IoT Relevant

Many of the manufacturers involved in developing IoT technology are still finding a way through the evolving landscape. Most, however, remain focussed on convenience. Convenience products won’t sell in significant quantities, however. Instead IoT devices that are...

Where Are People Going With Machine Learning In 2017

Where Are People Going With Machine Learning In 2017

Machine learning is an industry in flux. It is not a new industry, but new players are taking the field hoping to make a big impact, sometimes without anything tangible to base that hope on. Many will fail but the result is likely to be a more coherent approach to...

Cloud Services Comparison

Cloud Services Comparison

Business Intelligence used to mean massive overheads – caused by old-style data centers – consuming as much as 58% of the revenue received. Not any more: with a move to cloud computing these costs can be reduced drastically. Labor costs can be kept at 6%, while...

Growing ROI on Cloud Business Intelligence

Growing ROI on Cloud Business Intelligence

An ever-growing number of businesses are now choosing to run their mission-critical intelligence operations on the cloud. It is clear that it is now becoming a mainstream technology. For good reason too. It is increasingly superior, and proving to be a more than...

IoT is a New Backdoor for DDoS Attacks

IoT is a New Backdoor for DDoS Attacks

One of the more unorthodox and interesting ways that hackers can perform a DDoS attack is through the backdoor of millions and millions of improbable devices from Fridges to Coffeepots. Using the fast emerging Internet of Things (IoT) hackers can take control of vast...

DDos Attacks to Continue in 2015

DDos Attacks to Continue in 2015

It is clear that, in the preceding months, the sophistication and scale of DDoS attacks on vulnerable enterprises has increased rapidly. In the last year nearly double the amount of DDoS attack were recorded; half of which used sophisticated multi-vector attacks....

Cutting Costs with Big Data

Cutting Costs with Big Data

The effect of big data on business intelligence is huge.  And not just in terms of developing markets, building revenues or analysing consumer behaviour.  Steadily, and by increments, it is showing itself to be a huge boom to the back office and operational cost...

Cost of BI

Cost of BI

Despite the rocketing popularity of business intelligence and its proven significant ROI, nearly one third of companies think the cost is still prohibitive. However, in an article on Yurbi, 5000fish takes on the sensitive subject of just what exactly are the costs of...

Measuring IT Security

Measuring IT Security

Data breaches seem to have been constantly in the headlines in recent years. This has caused many top level executives to ask this question of their information security officers: “How safe is our data?” In the rapidly evolving world of cloud computing and data...

Behavioral Analysis to Thwart Data Breaches

Behavioral Analysis to Thwart Data Breaches

The idea of a layered approach to security is not new, nor is it revolutionary. Just like with old-time castles and modern-day prisons, security on the internet is a multi-layered and multifaceted tool. However, unlike the physical moats, drawbridges, walls and gates...

Cloud Security in the Gulf

Cloud Security in the Gulf

Increasingly, the Middle East is adopting cloud computing and this is creating new challenges in security. Security needs are being handled with new and innovative risk management protocols. In the aviation industry in particular, there has been a key challenge in...