Bring Your Own Software
For the last few years, it’s become very difficult for IT to police who brings personal devices into the enterprise…
First Look: OpenL Tablets
I got an update from Exigen Services recently on their OpenL Tablets business rules product. Exigen Services is a global IT…
Salesforce Fills Out the “Marketing Cloud”
Salesforce.com announced its intent to acquire email marketing and marketing automation vendor ExactTarget for ~$2.5B or $33.75/share, ending a few…
BYOD: An Unstoppable Force?
There are not many amongst us who would even consider leaving the house without some kind of mobile device in…
Social Data: The Arteries of the World, in Tweets
What happens when you plot billions of geotagged Tweets on a map? You can see the arteries of the world.…
Analyze Big Data Effectively and Efficiently: Five Opportunities [INFOGRAPHIC]
Harness the power of big data for a new economy infographic Harness the power of big data for a…
A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…
Software Development Project: Dot Your “I”s and Cross Your “T”s
A checklist for maintaining control over software development projectsHow can you ensure control over your software development project? Selecting a…
Shortage in Advanced Analytic Skills? Here’s an Indirect Approach
There are lots of articles these days about the challenges of recruiting enough data scientists, predictive analytic specialists or data…