Sign up | Login with →

Risk Management

exclusive

Cyber Security: Locking Out the Grinch from Your Application Network

December 18, 2014 by Bob Dvorak

Security.

How do you leave your chimney open for Santa while keeping the Grinch safely locked out? The right application management strategy can help outline where vulnerabilities lie and how to fix security weaknesses, minimizing your organization’s overall attack surface.[read more]

How to Stay Out of Cash Flow Crises Using Cash Position Analysis

December 10, 2014 by Keith Peterson

Cash position analysis.

Cash flow is the lifeblood of every company. Diligent financial analysis, including the Cash Position Waterfall, is an essential component to monitoring the current health of your business. However not all of us are financial analysts who like to wade through detailed spreadsheets.[read more]

How to Get Started with Value Add Forecasting

November 6, 2014 by Ray Major

Value add forecasting.

So the promise of using statistical algorithms, forecasting and predictive analytics is now added to the list of a company’s number one priorities. There is a sense of urgency surrounding this new high profile initiative. One may ask, “What’s next?” Well, here are a few steps that you will need to take to deploy your forecasts successfully.[read more]

exclusive

CAPEX Deferred Eventually Makes the Company Sick

September 22, 2014 by Paul Barsch
1

Risky Business column.

Instead of investments in IT, machinery, buildings and more, CEOs and CFOs are content to predominantly spend cash on stock buy-backs and/or dividends. Deferring CAPEX spend, or “sweating the assets” will work for a little while, but it’s not a strategy for long-term success.[read more]

exclusive

Building Information Technology Liquidity

August 25, 2014 by Paul Barsch

Risky Business column.

In the financial world, liquid assets can allow companies to react and capitalize on market opportunities. Liquidity in IT means that companies have enough extra compute firepower, people resources and are agile enough with IT processes to respond to unplanned events and demand, in whatever shape, form or order they arrive.[read more]

Supply Chain Business Intelligence Is More Than Just Technology

August 20, 2014 by Ray Major

Supply chain BI.

Interestingly the technology implementation requires the most hard dollar costs, and returns the least in terms of ROI. The real value in Holistic BI is in garnering the corporate buy in or, in other words, training the people to make better data-driven business decisions based on the data.[read more]

exclusive

Adapting to Winds of Change

August 6, 2014 by Paul Barsch

Risky Business column.

There’s much work to do before you can take advantage of cloud resources, and just-in-time planning doesn't cut it. With the flexibility, speed and power that cloud offers, there’s really no excuses to let opportunities to capture unplanned demand pass you by.[read more]

exclusive

Where in the World Does All this ESRI World Data Come from?

July 31, 2014 by Shawn Gordon

ESRI World Data.

ESRI does have data sets of their own that are available both for free, and for licensing. They have their own demographers who come up with various cool products like “Tapestry”, which shows life groups and their habit patterns, so you could research in there and discover NASCAR fans are good at recycling.[read more]

Data Controls and Customer Loyalty: How Big Companies Keep Clients

July 16, 2014 by Jeff Brown

Data controls and customer loyalty.

Data controls may go hand-in-hand with maintaining accurate financial information and compliance reports, but IT leaders from some of the nation’s biggest enterprises say they also use controls for something else: Customer retention.[read more]

exclusive

Beware of Big Data Technology Zealotry

June 23, 2014 by Paul Barsch

Risky Business column.

Invariably, there are hundreds of additional arguments proffered by big data vendors and technology zealots inhabiting organizations just like yours. However, there are few crisp binary choices in technology decision making, especially in today’s heterogeneous big data environments. Beware big data zealots that counsel you otherwise.[read more]

2020: US Banks Are Betting Big on Analytics

May 31, 2014 by Naagesh Padmanaban

US banks and analytics.

Most US Banks – small and big are on board this transformational journey. These initiatives involve great investments and outcomes are keenly tracked. Many careers are at stake. But those that succeed will form the backbone of US Banks 2020. This obviously will result in intense competition and change the banking landscape in the US forever.[read more]

exclusive

MDM Industry Becoming New Standard for IT

May 30, 2014 by Jessica Oaks

Mobile device management.

As more businesses implement a bring your own device (BYOD) policy, companies are turning to mobile device management (MDM) to maintain and secure company data. MDM is now becoming an industry standard for IT. MDM is a strategy that uses software to manage, monitor, secure and support mobile devices used by employees.[read more]

Attention Retailers: How to Avoid Being Attacked

April 28, 2014 by Ryan Fahey

Are your computer systems secure?

This past January, Michaels became aware of a large number of customers reporting that credit cards they’ve used at the retailer were incurring fraudulent charges. Michaels CEO Chuck Rubin announced that they were conducting an investigation.[read more]

The High Cost of Low Quality IT

April 25, 2014 by Paul Barsch

Risky Business column.

Technology purchases and implementations aren't like buying widgets. A half-baked solution full of “second choice” technologies may end up being unusable to end-users, and cut-rate implementations that are seriously delayed or over-budget can translate into lost revenues, and/or delayed time to market.[read more]

How Data Will Make Air Travel Safer

March 25, 2014 by Travis Korte

Safer airtravel with better data.

Airlines and air traffic controllers use a lot of information to keep passengers safe, integrating weather readings, physical information about the plane, passenger data, and other kinds of data. But as the uncertainty surrounding Malaysia Airlines Flight 370′s disappearance confirms, better information and ways to act on it will be crucial for the future of air safety.[read more]