How to Make Your Department More Data-Friendly
It seems as though the entire world is abuzz about big data. If you get data alerts from Google much…
Understanding User Expectations
Self-service access to analytics is becoming a key component when trying to expand BI and analytics access throughout the organization.…
Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly news to those in the tech world, but…
Big Data: The 4 Layers Everyone Must Know
There is still so much confusion surrounding Big Data. I thought it might help to clarify the 4 key layers…
Fraud Prevention and Customer Experience Management: How Banks Leverage Real-Time Analytics to Achieve a Balance
Back in mid-December 2013 – at the peak of the holiday shopping season – Target Corporation announced that security around…
How to Solve Data Fragmentation, or Why to Invest in a Distributed Data Warehouse
Big data isn't just industry speak anymore. By now, universities are teaching it in their MBA and marketing programs –…
Signs Your Technology Is Outdated
It’s no secret that your customers and employees want an innovative experience with your company’s technology. Outdated technology can seriously…
Big Data Analytics: 80/20 Rule Isn’t Good Enough
The other day I was speaking with one of the top three global wireless CEO’s about big data. He said…
IBM to Power California State’s CalCloud
FlickrIBM will provide Infrastructure-as a-Service to the Stat FlickrIBM will provide Infrastructure-as a-Service to the State of California, with a…
How Machine Learning Is Improving Computer Security
If there’s one thing that keeps business leaders awake at night, it’s worries over data security. Nowadays, every company no…

