Sign up | Login with →

IT

exclusive

Building Information Technology Liquidity

August 25, 2014 by Paul Barsch

Risky Business column.

In the financial world, liquid assets can allow companies to react and capitalize on market opportunities. Liquidity in IT means that companies have enough extra compute firepower, people resources and are agile enough with IT processes to respond to unplanned events and demand, in whatever shape, form or order they arrive.[read more]

exclusive

Data Science: What Companies Need to Know

August 23, 2014 by Kristen Paral

Data science.

Take a look at Google, Uber, Amazon or Airbnb. All of them are utilizing big data and data scientists to derive business insights and making quantum leaps in their respective business models. Many companies don’t understand the full value of what data science can deliver, revolutionizing their big data into actual results.[read more]

Vantage Cloud Simplifies Cloud Compliance

August 21, 2014 by Natalie Lehrer

Simplified cloud compliance.

Actiance is a global leader in information security. With a press release, the security giant has released details on its new secure cloud offering called Vantage Cloud. What is Vantage Cloud? The idea behind Vantage Cloud was to create a system that gives granular control mechanisms to administrators in order to achieve ultimate compliance.[read more]

exclusive

Should the Entire Internet Be Encrypted?

August 19, 2014 by Shawn Gordon

Encrypt all the things!

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there.[read more]

How Consumers Foot the Bill for Data Breaches

August 9, 2014 by Matthew Zajechowski

Data.

Whether data breaches happen to individuals, companies or whole government organizations, they are rarely if ever cheap to deal with or in any way funny. In all of these cases, somebody is going to end up paying for the costs of a breach and usually that person is the end user or consumer of a given company’s products.[read more]

We Need an "Internet of Not Only Customers"

August 8, 2014 by Peter Perera

Internet for not only customers. 

The enduring purpose of a business is indisputably to create and keep customers. That bedrock was first famously laid down by Peter Drucker and Theodore Levitt sometime around the 1960s or ‘70s. Accordingly, CRM software vendors promote fixating on customers. SalesForce, for example, says create an “Internet of Customers” and become a “Customer Company.”[read more]

exclusive

The Latest Technological Phase and What IT Pros Should Do About It [INFOGRAPHIC]

August 7, 2014 by Rick Delgado

Big data architect.

In order to take advantage of the big data analytics mentioned above, there has been an increasing demand for data scientists who can make up a big data dream team. Members of this team perform different functions, but they all work together to run and use big data technology.[read more]

exclusive

Adapting to Winds of Change

August 6, 2014 by Paul Barsch

Risky Business column.

There’s much work to do before you can take advantage of cloud resources, and just-in-time planning doesn't cut it. With the flexibility, speed and power that cloud offers, there’s really no excuses to let opportunities to capture unplanned demand pass you by.[read more]

exclusive

Where in the World Does All this ESRI World Data Come from?

July 31, 2014 by Shawn Gordon

ESRI World Data.

ESRI does have data sets of their own that are available both for free, and for licensing. They have their own demographers who come up with various cool products like “Tapestry”, which shows life groups and their habit patterns, so you could research in there and discover NASCAR fans are good at recycling.[read more]

IBM to Power California State’s CalCloud

July 28, 2014 by Natalie Lehrer

IBM.

IBM will provide Infrastructure-as a-Service to the State of California, with a private-public cloud service called CalCloud. The State of California will be the first State in US to have a private cloud specifically for government agencies and municipalities. IBM landed on this deal after losing the $600 million CIA deal to Amazon last year.[read more]

exclusive

3 Organizations That Can See the Future with Predictive Analytics

July 26, 2014 by Michele Nemschoff

Predictive analytics.

The ability to foresee the future would certainly be the ultimate competitive advantage. In reality though, no business has a crystal ball for making critical decisions. That’s why all critical business decisions have always carried a certain amount of risk. This risk has always and will always be part of the competitive game.[read more]

exclusive

If You Think Data Security is IT’s Responsibility, Think Again

July 23, 2014 by Tamara Dull
1

The Big Data MOPS Series.

What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, they’ve also cost some executives their jobs. If you don’t think data security is important, especially in this new age of big data, think again.[read more]

exclusive

Multi-Channel Retail: Where Big Box Meets Big Data

July 22, 2014 by Charles Settles

Retail and big data.

Amazon’s highly publicized unveiling of their Prime Air project was seen as a warning shot across the bow of logistics giants UPS and FedEx, but Walmart would do well to pay attention too. As noted in part one of this two-part series on multichannel-retail, Walmart’s dominance is as much because of their investment in distribution as it is because of their low cost of goods sold.[read more]

exclusive

Businesses Learn the Hard Way When It Comes to Cyber Attacks

July 15, 2014 by Christian Crank

Cyber attacks.

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber security training organization.[read more]

exclusive

The Rule of Three Works for IT

July 14, 2014 by Paul Barsch

Risky Business column.

The rule of three is a teaching, writing or presenting device where a key concept is broken into three easy to remember pieces. Does the rule of three apply to the fields of technology and business? Going forward, let’s be sure to use more tricolons in our training materials, internal presentations and customer whitepapers.[read more]