Special Summary: Enterprise security stories
The state of computer security is in continual change. The only constant in this game is the very dynamic nature of…
Building Diversified Portfolios with R
A common approach to reducing risk associated with financial portfolios is diversification. A portfolio made of components that are all…
Black Swan Alert: Low Tech Links Devastate High Tech Supply Chains
Find your supply chain best practices checklist. Just-in-time processes? Check. Optimum sourcing strategies? Check. Lean logistics? Check. Best-in-class technologies? Check. Black swan…
Webinar on Portfolio Rebalancing with R and Sybase
R users in the financial industry may be interested in the following webinar hosted by Revolution Analytics' partner Sybase on…
USAF Prevents Insomnia with Geospatial
What causes sleepless nights? For sure, too much caffeine can keep your eyelids open, however it’s more likely that worry…
What’s Missing From Most Cloud-Based Disaster Recovery? Network Replication
I’ve written several blog posts on how cloud computing changes disaster recovery. One of the most significant advantages to cloud…
Updates on Dronegate
Since I wrote my fist post on the virus affecting the drone fleet at Creech Air Force base, information has…
When Crisis Hits, Technology is Dumped, and Lizard Brains Take Over
Think of technological progress for a minute. Super computers, cloud computing, high speed networks, and advanced algorithms probably come to…
Nine Components of a HIPAA Risk Analysis
The Department of Health and Human Services requires organizations to conduct a risk analysis as the first step toward implementing…

