by Shlom | Jun 12, 2017 | Uncategorized
Your company could be compromised, even with a relatively tech-savvy workforce. Fooled into allowing attackers access to company networks, it is this mode of access that is one of the biggest cyber security challenges. Perceptive, well-meaning employees can be fooled...
by Shlom | Jun 12, 2017 | Uncategorized
Many companies’ experience of self service business intelligence (BI) is similar to the early days of agile development; companies were then drawn to a model that promised improved business-IT relations and expedited delivery cycles. This was particularly...
by Shlom | Jun 12, 2017 | Uncategorized
Social media is surely one of the phenomena of the 21st Century. Everyone has a favorite social media platform and this has changed the way we communicate – sharing news and gossip. Twitter and Facebook, for example, are force multipliers when it comes to the spread...
by Shlom | Jun 12, 2017 | Uncategorized
Self-service business intelligence makes data discovery and analysis remarkably easy. The three next generation tools only make this statement more true. Watching these new, easy-to-use and exploratory BI products outsmart and outperform the older platforms is seeing...
by Shlom | Jun 12, 2017 | Uncategorized
Social media is a useful tool for any business. Its ability to reach and engage with customers is unrivaled. However, with the rise in use, so comes the rise in attacks using this medium. Hackers and fraudsters have also cottoned on to the ‘potential’ in...
by Shlom | Jun 12, 2017 | Uncategorized
Most companies now have smartphones, if not as standard, for a select group of key employees. These devices are now capable of calculating numbers in spreadsheets, email and storage of commercially sensitive documents. As workforces become ever more reliant on remote...