Predictive Maintenance AI GRT Resources

Security Protection or Morality Police?

Security Protection or Morality Police?

Businesses have a right to pick and choose the customers they do business with, so long as they do not violate anti-discrimination laws. And decisions by a particular firm not to cater to specific customers do not keep those customers from doing business elsewhere....

Oracle Looks at EPM Trends

Oracle Looks at EPM Trends

No branch of business operations has been more thoroughly transformed by the computer age than finance, the original "data-driven" business discipline. Successive technology revolutions have given rise to Enterprise Performance Management (EPM) solutions that seek to...

Compliance Challenge For Cloud Computing

Compliance Challenge For Cloud Computing

The single biggest concern for large organizations looking at cloud adoption is still compliance issues, according to a new report by cloud security experts CipherCloud. The survey found that among over 100 respondents, 64% saw compliance as the biggest obstacle to...

Integration Still a Problem Despite Adoption

Integration Still a Problem Despite Adoption

While uptake has certainly been high—some 93% of businesses now use cloud technology in some form—integration is still an issue. A survey of 930 IT professionals showed that 88% of businesses are using public cloud technologies, while 63% are using private cloud...

Security and Compliance Concerns in the Cloud

Security and Compliance Concerns in the Cloud

A Rackspace study shows that resilience and security will remain top motivations for businesses moving into the cloud throughout 2016. While cost is always a major factor, in a poll of 500 UK IT and business decision makers, resilience, disaster recovery, and security...

Five IoT predictions for 2016

Five IoT predictions for 2016

The Internet of Things (IoT) has been discussed for many years, but it still seems to be falling short of its potential. It seems that this year, the promise of software sitting inside a wider variety of devices is set to open up new revenue streams. Device...

How to Fix Mobile BI

How to Fix Mobile BI

With the advent of big data, business intelligence has again been pushed to the forefront of IT's attention. With so many organizations conducting more and more business on the move, mobile devices have been looked to as the answer. That said, the lackluster nature of...

Secure Network Access for Personal Devices

Secure Network Access for Personal Devices

The smartphone phenomenon has reached global proportions, and every day more and more people are expecting to be able to access work materials from their own devices. In fact, almost half of companies now allow employees to use their personal devices to access the...

Location Based Intelligence Software

Location Based Intelligence Software

Using maps to present data is hardly a new phenomenon. Even modern Geographic Information Systems (GIS) have been around for decades, albeit in their own little bubble. These systems, while incredibly useful, required special training and were rarely used outside of...

Data Loss Prevention

Data Loss Prevention

In spite of the big headlines about external hacks or insider attacks leading to data loss, it is true that most of the corporate data that gets exposed is through messaging systems. Employees accidentally sending out confidential information through email, instant...

Data Masking

Data Masking

In the modern world of financial services, the protection of your customer's data is critical. Not only critical for your company's reputation but to avoid a whole host of legal and financial obligations should a data breach ever happen. Encryption is one way of...