Year: 2013

A Quick Tech Tutorial: Two-Factor Authentication

Two-factor authentication is a best practice to fulfill authorization and authentication requirements…

onlinetech
3 Min Read

Turn Analysis Into Action: 3 Tips

Today’s analytics tools offer deeper insights into your data than ever before.…

Jason Goto
5 Min Read

Software Development Project: Dot Your “I”s and Cross Your “T”s

A checklist for maintaining control over software development projectsHow can you ensure…

MCota
5 Min Read

Headaches, Data Analysis, and Negativity Bias

I have suffered from bad headaches most of my life, but over the…

MIKE20
4 Min Read

Choosing Your Business Intelligence Solution: Don’t Be Afraid of the “Smoosh-ins®”

When an enterprise selects a BI solution, it should be able to…

RickSherman
5 Min Read

Mobile Technology in Data Centers: After the Cloud, What Next?

What does the future hold for the data center industry? Yan Ness,…

onlinetech
4 Min Read

How Real Revenue Is Derived from Big Data [INFOGRAPHIC]

Jeff Kelly, a principal research contributor of Wikibon, provides his commentary on the…

Datafloq
1 Min Read

Design a Successful Business Dashboard: 3 Essential Tips

So you are all set to design a swanky new dashboard that…

ShilpiChoudhury
6 Min Read

Societal Remedies for Algorithms Behaving Badly

In a world where computer programs are responsible for wild market swings,…

paulbarsch
5 Min Read