Preventing disaster at Power Plant
KievPost FoxNews Chernobyl accident A power plant must be monitored to ensure that it doesn’t fail, which could be a real disaster. That’s why you need an effective monitoring solution to prevent such a scenario. An integrated power plant operation monitoring (PPOM)...
How Machine Learning Makes IoT Relevant
Many of the manufacturers involved in developing IoT technology are still finding a way through the evolving landscape. Most, however, remain focussed on convenience. Convenience products won’t sell in significant quantities, however. Instead IoT devices that are...
Where Are People Going With Machine Learning In 2017
Machine learning is an industry in flux. It is not a new industry, but new players are taking the field hoping to make a big impact, sometimes without anything tangible to base that hope on. Many will fail but the result is likely to be a more coherent approach to...
Cloud Services Comparison
Business Intelligence used to mean massive overheads – caused by old-style data centers – consuming as much as 58% of the revenue received. Not any more: with a move to cloud computing these costs can be reduced drastically. Labor costs can be kept at 6%, while...
Growing ROI on Cloud Business Intelligence
An ever-growing number of businesses are now choosing to run their mission-critical intelligence operations on the cloud. It is clear that it is now becoming a mainstream technology. For good reason too. It is increasingly superior, and proving to be a more than...
IoT is a New Backdoor for DDoS Attacks
One of the more unorthodox and interesting ways that hackers can perform a DDoS attack is through the backdoor of millions and millions of improbable devices from Fridges to Coffeepots. Using the fast emerging Internet of Things (IoT) hackers can take control of vast...
DDos Attacks to Continue in 2015
It is clear that, in the preceding months, the sophistication and scale of DDoS attacks on vulnerable enterprises has increased rapidly. In the last year nearly double the amount of DDoS attack were recorded; half of which used sophisticated multi-vector attacks....
Cutting Costs with Big Data
The effect of big data on business intelligence is huge. And not just in terms of developing markets, building revenues or analysing consumer behaviour. Steadily, and by increments, it is showing itself to be a huge boom to the back office and operational cost...
Cost of BI
Despite the rocketing popularity of business intelligence and its proven significant ROI, nearly one third of companies think the cost is still prohibitive. However, in an article on Yurbi, 5000fish takes on the sensitive subject of just what exactly are the costs of...
Measuring IT Security
Data breaches seem to have been constantly in the headlines in recent years. This has caused many top level executives to ask this question of their information security officers: “How safe is our data?” In the rapidly evolving world of cloud computing and data...
Behavioral Analysis to Thwart Data Breaches
The idea of a layered approach to security is not new, nor is it revolutionary. Just like with old-time castles and modern-day prisons, security on the internet is a multi-layered and multifaceted tool. However, unlike the physical moats, drawbridges, walls and gates...
Cloud Security in the Gulf
Increasingly, the Middle East is adopting cloud computing and this is creating new challenges in security. Security needs are being handled with new and innovative risk management protocols. In the aviation industry in particular, there has been a key challenge in...