CAPEX for IT: Why So Painful?
CAPEX dollars reserved for investments in plant, property or equipment (including IT) are notoriously hard to secure. In fact, IT…
Data Design Is Not Optional
The data model is designed to enforce certain rules on the information – such as ensuring that customer identifiers are…
Bring Your Own Software
For the last few years, it’s become very difficult for IT to police who brings personal devices into the enterprise…
First Look: OpenL Tablets
I got an update from Exigen Services recently on their OpenL Tablets business rules product. Exigen Services is a global IT…
Salesforce Fills Out the “Marketing Cloud”
Salesforce.com announced its intent to acquire email marketing and marketing automation vendor ExactTarget for ~$2.5B or $33.75/share, ending a few…
BYOD: An Unstoppable Force?
There are not many amongst us who would even consider leaving the house without some kind of mobile device in…
Social Data: The Arteries of the World, in Tweets
What happens when you plot billions of geotagged Tweets on a map? You can see the arteries of the world.…
Analyze Big Data Effectively and Efficiently: Five Opportunities [INFOGRAPHIC]
Harness the power of big data for a new economy infographic Harness the power of big data for a…
A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…