Great Analytics Vendors: 5 Must-Have Traits
Let’s face it; the best way to make your organization more data-driven is to get the best analytics talent within…
BYOD: An Unstoppable Force?
There are not many amongst us who would even consider leaving the house without some kind of mobile device in…
IBM’s 2013 Vision Bodes Well for Finance
I recently attended Vision 2013, IBM’s annual conference for users of its financial governance, risk management and sales performance management…
7 Habits of Highly Successful Big Data Pioneers
The Big Data age is dawning. Just like every major emerging opportunity that presents an unprecedented competitive advantage across sectors,…
Getting ROI from ERP
In the world of business, there is no getting past the fact that at the end of the day, the…
Analyze Big Data Effectively and Efficiently: Five Opportunities [INFOGRAPHIC]
Harness the power of big data for a new economy infographic Harness the power of big data for a…
The Role of Decision Requirements in the Analytical Life Cycle
Earlier this week I posted on the value of decision requirements modeling in analytic projects when it comes to coping with…
A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…
Turn Analysis Into Action: 3 Tips
Today’s analytics tools offer deeper insights into your data than ever before. But if you were to take an objective…
Software Development Project: Dot Your “I”s and Cross Your “T”s
A checklist for maintaining control over software development projectsHow can you ensure control over your software development project? Selecting a…