Sign up | Login with →

All Posts

Open Data: Why the U.S. Needs Federal Legislation to Unlock the Secret Dealings of Shell Companies

July 23, 2015 by Joshua New

Just as Congress recognizes open data as a valuable tool for investigating fraud and providing oversight in government, it is time policymakers create better open data on shell corporations to achieve the same in the private sector.[read more]

Predictive Analytics: Investing and Selecting Software Properly

July 23, 2015 by Tony Cosentino

As predictive analytics becomes more widely used, buyers should take a broad view of the design and deployment requirements of the organization and specific lines of business. They should consider which functional areas will use the tools and consider issues involving people, processes and information as well as technology when evaluating such systems. We urge business and IT buyers to work together during the buying process with the common goal of using predictive analytics to deliver value to the enterprise.[read more]

Strategic Methodologies That Will Improve Your IT Department’s Infrastructure

July 23, 2015 by Simon Mitchell

Effectively future proofing your Linux system is the end result of implementing two important strategies throughout your company. These strategies both revolve around your in-house IT team and their skillset. First, you should identify whether or not your IT department has the modern skillset needed to keep up to date with developments in Open Source, Linux and the risk of cyber threats. There are three important roles you should have within your organisation.[read more]

How Big Data is Shaping the Future of the Learning and Development Industry

July 22, 2015 by Brigg Patten

As big data helps to uncover employees’ potential and abilities, employers are able to carefully adapt not only their training methods but also their employee engagement levels and incentives, optimizing both the company’s overall performance as well as employee morale.[read more]

exclusive

Top 10 Social Engineering Tactics

July 22, 2015 by Gunjan Tripathi

Social engineering is the process of exploiting the weakest part of your security system: the human factor. Social engineers accomplish their goals by a combination of technical sleight-of-hand, and using personal contact to gain trust. Surprisingly, many of these methods do not use technology at all, or only use technology as an adjunct to personal contact.[read more]

exclusive

Is Big Data a Scam?

July 21, 2015 by Bernard Marr

From time to time, you still come across someone with the opinion that Big Data is nothing more than a scam or a fad, which will be forgotten about soon enough. You might not expect to hear this from me, but they’re actually right. Well – half right, at least! I’m not actually a fan of the term “Big Data,” which puts overemphasis on the importance of size.[read more]

exclusive

Data Is Changing the Way Enterprises Optimize Employee Productivity

July 21, 2015 by Daan Pepijn

For a very long time, we’ve been viewing data as a collection of valuable information. Yes, that’s what it is. But everything turns around when you start perceiving data as a signal for decision-making. In the enterprise world, data performs the function of informant to the experienced strategist.[read more]

Anxious About BYOD?

Has your organization caved to the pressure of establishing a Bring Your Own Device (BYOD) policy and is now having second thoughts? Making company-wide policy changes and satisfying tech-savvy employees’ desires is just the beginning. Once BYOD is up and running, there are many challenges. The difference between success and failure means addressing key concerns and finding ways to overcome these issues.[read more]

Using Procurement Analytics to Simplify Your Supplier Reconciliation

July 20, 2015 by Keith Peterson

Ask finance managers to name a necessary evil of their responsibilities and many will cite reconciling goods received against invoices not received (“GR-NI”). The GR-NI issue is time-consuming to manage but not exactly mission critical to finding new business.[read more]

exclusive

How Business Users Will Benefit From Joined Up Data

July 20, 2015 by Bruce Robbins

While comparatively the amounts of data that an SME works with are much lower than the current definition of ‘big data’: the technologies that handles both the data held by an SME and the technologies used by the ‘Big Data’ players can be shared. The characteristics of high volume, high variety and high velocity apply to the data sets that typically an SME encounters.[read more]

The (Foreseeable) Future of Cloud Computing Explained

July 20, 2015 by Rick Delgado

The idea of connecting the world with information and data is not a new one and goes back to the 60s when the person credited with developing the first web connection, J.C.R Licklider, thought of interconnecting virtually everyone at any location or site. While the internet seems like what Licklider had in mind, cloud computing is clearly turning out to be another idea that’s probably what the pioneer had in mind.[read more]

EU Regulators Misunderstand Big Data

July 17, 2015 by Joshua New

Some European Union regulators reportedly are concerned that major Internet companies such as Google and Facebook gain an unfair competitive advantage from the detailed consumer data they hold, since other companies can never hope to amass anywhere near as much of it. In addition, some regulators worry that with less competition, these data-rich companies will disregard their customers’ privacy preferences and become more invasive.[read more]

Protecting Yourself From Server 2003 Breaches

July 17, 2015 by Kyle Cebull

Now that end of support is finally here for Server 2003, businesses that haven’t taken action are starting to get their plans together. While we already gave some advice for making an assessment of your situation and moving forward, from a security standpoint businesses should be doing what they can to protect themselves now that Windows is no longer patching security gaps.[read more]

exclusive

The Business Takeaways From the Recent Baseball Hacking Scandal

July 17, 2015 by Rick Delgado

Issues related to cyber security are certainly not new, especially in the business world. In recent years, serious concerns have arisen as companies have struggled to overcome the security threats they face. After major security breaches at businesses like Target, Home Depot, and Sony, the sad reality is that many breaches are difficult to avoid, so another story about cyber security woes shouldn’t have come as a surprise.[read more]

Challenges of Working with Big Data: Beyond the 3Vs

July 16, 2015 by Venky Ganti
1

Among many challenges in working with big data, the 3V’s (Volume, Velocity, and Variety) have gotten a lot of attention. Googling yields many results worth reading. Almost all of these focus on technological challenges in managing and processing big data. In this post, I would like to highlight a different set issues that make working with big data challenging, even if the underlying infrastructure is admirably able to handle all three V’s.[read more]

Upstream Works Helps Customer Service Agents Improve Efficiency and Effectiveness

July 16, 2015 by Richard Snow

My research and experience show that contact center agents and others handling customer interactions face the continuing challenge of meeting customer expectations while keeping down the cost of handling interactions. Our benchmark research into the agent desktop and customer service finds that one obstacle to meeting these dual objectives is that users have to access multiple systems – typically four or five – to resolve a customer interaction.[read more]

UNIX Vs Linux: How Do They Measure Up?

July 16, 2015 by Simon Mitchell

Linux and UNIX are very similar to each other, but they have some common differences – discover what they are in this blog to find out which one is right for your organisation.The history of the UNIX operating system dates back to 1969. Since then it has developed and evolved with the creation of a number of different versions and...[read more]

exclusive

10 Pains Businesses Feel When Working With Data

July 15, 2015 by Bruce Robbins

Many companies work with large amounts of data and find it leads to an increase in work loads and reduced value as the amount of data gets bigger. As the legacy data mounts up it also becomes very difficult to work with it, back it up and gain insight from it. The way companies manage data is often used as a measure of the management efficiency and maturity of that company.[read more]

Big Data: Where Did All The Water Go?

July 15, 2015 by Shawn Gordon

Nighttime Flow Analysis works by using an optimal time to analyze for leaks. This is typically at night, when household water consumption is significantly low. At the lowest point, the observed GPM from the area is entered into the solution. By comparing this observation to the expected flow, the utility can iterate through different Sub-DMA configurations and target the problems so they are fixed much sooner.[read more]

5 Best Management Tools That Help Your Restaurant Business

July 15, 2015 by Peter Davidson

Your restaurant is an increasingly difficult business to manage due to ever growing competition, decreased margins, and rising costs. Effectively controlling these variables through modern tools can help your business grow in the direction that you want it to. Simply making good food and providing a positive atmosphere is no longer good enough to continually attract enough customers. You need to evolve to use the most effective tools for your business.[read more]

exclusive

Is AI the Biggest Threat to your Job?

July 14, 2015 by Bernard Marr

The HAL 9000 wants your job. OK, it’s not the HAL 9000 (yet) but all over the world, intelligent machines are replacing jobs at an alarming rate. And the smarter they get, the faster they’re going to be replacing us. What I am talking about here is not a subtle shift to more automation but a real threat to society and the human race.[read more]

exclusive

4 Big Companies Using Big Data Successfully

July 14, 2015 by Jessica Oaks
1

When you're networking it's all about who you know but when it comes to actually doing business, these days it's all about what you know. That's because business decisions are now more than ever before data driven, and so the companies that are collecting it and analyzing it are the ones poised to rocket past the competition. Want proof? A global study commissioned by CA Technologies revealed that a whopping 90% of firms surveyed are seeing benefits thanks to big data implementation.[read more]

exclusive

Is Text Analytics the Next Frontier for Big Data?

July 14, 2015 by Jonathan Buckley

While the idea of text analytics may intimidate some organizations, quite a few vendors have popped up offering their services taking advantage of the technology. It’s a growing industry, one that’s predicted to be worth more than $6 billion by the year 2020. As long as companies start with a small portion of data and know exactly what type of information they want to find out, they’ll place themselves in an advantageous position.[read more]

Unlocking Big Data Means Truly Understanding the Customer Journey [INFOGRAPHIC]

July 13, 2015 by Andre Bourque

End-to-end big data analytics application provider Datameer found the most prevalent use case for big data is to better understand customer analytics. With consumers now interacting with companies across multiple, measurable channels, their interactions produce data that businesses can use to better respond to and anticipate customer needs.[read more]

Can Big Data Solve the Skill vs. Luck Mystery in Fantasy Sports?

July 13, 2015 by Jure Rejec

Presently, in most US states, fantasy sports (including DFS) is generally considered a game of skill and therefore not legally considered as gambling (where there's an element of both luck and chance). However, there are a few states that have either a more restrictive set of laws that outline what is considered a game of skill or have specific laws outlawing paid fantasy sports.[read more]

IoT Field Notes: Who Are You Disrupting?

July 13, 2015 by James MacLennan

Much has been written of the power of the Internet of Things to introduce disruption into established industries – and this is often where the conversation will go (when introducing the idea of slapping sensors on mature machines). But are you really digging into the breadth and depths of this potential disruption? Consider these examples, culled from conversations over the last six months.[read more]

Taking the Mystery Out of Big Data

July 10, 2015 by Doug Lautzenheiser
1

In the not-so-distant past, firms tracked their own internal transactions and master data (products, customers, employees, and so forth) but little else. Companies probably only had very large databases if their industry called for high-volume and high-speed applications such as telecommunication, shipping, or point of sales. Even then, these transactions were all formatted in a standard way and could be saved inside the relational database IBM designed in the 1960s.[read more]

How Data Is Helping Sports Teams Increase ROI, Even in Off-Season

July 10, 2015 by Trips Reddy

Learn how the Florida Panthers are unifying data from disparate systems, third-party vendors and social media sites, so they can see who’s buying tickets, attending games and interacting with their content. This enables the Panthers to get a “360-degree fan view,” communicate one-to-one with them, sell thousands of tickets, find sponsorships and match the right experiences with the right fans.[read more]

8 Crazy Things You've Heard Before If You Work with Linux

July 10, 2015 by Simon Mitchell

Discover some of the misconceptions surrounding Linux and what you can actually achieve with them. There used to be common misunderstandings around Linux but not so much anymore. Nevertheless, if you've ever worked with Linux you'll probably still recognize some of these strange misconceptions. Are you able to add any more to the list?[read more]

The Internet of Ordinary Things Is Still Extraordinary

July 9, 2015 by Joshua New

Should the public sector view the Internet of Things as a practical tool that can develop incrementally, rather than a collection of futuristic gadgets, it is more likely to embrace the Internet of Things as an early adopter and start enjoying its benefits.[read more]