RESOURCES

Achieving Commercial Success From IoT

Achieving Commercial Success From IoT

Intro What will break Internet of Things (IoT) out of the novelty basket and into the mainstream? When we say mainstream, we mean television and mobile phone mainstream, i.e. in every household and in every pocket. The answer is data - people pay for data-based...

What You Can Expect In 2017 For IOT

What You Can Expect In 2017 For IOT

When you look at expert predictions for what will happen in the IoT space in 2017, it is clear technologies and thinking is both advancing quickly. It is also clear that traditional industries and brands face challenges from nimbler newcomers, with some of those...

Machines Can Learn, But How?

Machines Can Learn, But How?

Many experts predict that machine learning (which any companies are currently investing in significantly) will be responsible for the most important breakthroughs in history. That includes being more important than the industrial revolution or the introduction of...

Social Medial Safeguarding

Social Medial Safeguarding

Social media in the 21st century is ubiquitous. However, its soaring and expanding use is causing a headache for IT security professionals who have to contend with a whole new range of problems caused by people's use of social media sites. Greg Masters writes in SC...

Mobilizing Business Intelligence

Mobilizing Business Intelligence

With every other aspect of the online world moving increasingly onto mobile devices, it is time for the world of business intelligence and analytics to catch up. Mobile BI – with good management, and the right infrastructure – can be a powerful extension for the...

Detecting Unauthorized Access

Detecting Unauthorized Access

The world of IT is driving automation and improving service delivery all the time. This is having a direct and positive effect on company revenues as well. It is entirely unfortunate that some of this has being eaten up by the ever more complex ways that criminals and...

China Great Cannon

China Great Cannon

The internet is now a hostile place - that is the finding of recent research into a cyber-attack on Github. Specifically, the researchers said the entire Chinese internet is now hostile. They say this because they have discovered a tool they have dubbed the Great...

Visualizing data the advanced way

Visualizing data the advanced way

All the rage right now in big data and analytics is advanced visualizations. These are fast-becoming coveted features in the growing market for maps and charts and other new and innovative ways of visualizing and processing all that data. Within the last year, almost...

Social Media a Hackers Dream

Social Media a Hackers Dream

Social media, and its ever-increasing use, seems to be fuelling a growing wave of cyber-crime that's linked to its easily exploitable attack surface. Steve Ragan, writing for CSO Online, talks about one very interesting attack surface that criminals have been...

Competitor Data Work For Your BI Analytics

Competitor Data Work For Your BI Analytics

It is almost a given that in this day and age, an organization will be mining its own customer data for consumer habits and insights into the marketplace. But what if your company was able to track the competition's data as well – ethically, of course – but in a...

Is Your Biggest Threat Internal

Is Your Biggest Threat Internal

Your company could be compromised, even with a relatively tech-savvy workforce. Fooled into allowing attackers access to company networks, it is this mode of access that is one of the biggest cyber security challenges. Perceptive, well-meaning employees can be fooled...

Self Service Still Needs Self Actualization

Self Service Still Needs Self Actualization

Many companies' experience of self service business intelligence (BI) is similar to the early days of agile development; companies were then drawn to a model that promised improved business-IT relations and expedited delivery cycles. This was particularly attractive...