
Electrical Industry Predictive Asset Maintenance
Through electrical signature analysis (ESA), GRT PowerLink performs careful electric asset health monitoring, detecting developing faults in the asset itself and in the coupled mechanism it drives. PowerLink can perform these operations from outside the asset, reading...

Preventing disaster at Power Plant
KievPost FoxNews Chernobyl accident A power plant must be monitored to ensure that it doesn’t fail, which could be a real disaster. That’s why you need an effective monitoring solution to prevent such a scenario. An integrated power plant operation monitoring (PPOM)...

Achieving Commercial Success From IoT
Intro What will break Internet of Things (IoT) out of the novelty basket and into the mainstream? When we say mainstream, we mean television and mobile phone mainstream, i.e. in every household and in every pocket. The answer is data - people pay for data-based...
Oracle Looks at BI Trends
Mobile is taking over the Business Intelligence (BI) world. So is the cloud. And Big Data, especially "unstructured" Big Data, is just beginning to revolutionize the ways that enterprises conduct their strategic planning. Those are a few headline results from a new...
The Breaches We Don’t Know About
Stories of major data breaches continue to roll in. One victim announced during the spring was hard drive maker LaCie (now owned by Seagate). In March the firm confirmed a security blog's report that its customer data was exposed to hackers for nearly a year. For...
Security Protection or Morality Police?
Businesses have a right to pick and choose the customers they do business with, so long as they do not violate anti-discrimination laws. And decisions by a particular firm not to cater to specific customers do not keep those customers from doing business elsewhere....
Oracle Looks at EPM Trends
No branch of business operations has been more thoroughly transformed by the computer age than finance, the original "data-driven" business discipline. Successive technology revolutions have given rise to Enterprise Performance Management (EPM) solutions that seek to...
Ignore Bad Data… Sort Of
In George Orwell's classic Animal Farm there is a well-known quote that sums up the issues tackled in the book: "All animals are equal, but some animals are more equal than others". In terms of data, this is a truism: all data is equal, but some data is more equal...
Data May Not Lie – But Liars Can
Figures don't lie, the old saying, but liars can figure. Put another way, even accurate and honest-in-itself data can be presented in misleading ways to support a less-than-honest result. To protect against data-rich lies, we must learn to understand the limitations...
Peeling the Onion of Ransomware
Ransomware attacks on computers are increasing, and they can have devastating consequences. Just look at the heart-breaking story of 17-year-old Joseph Edwards, an autistic college student who killed himself after being on the receiving end of a ransomware email...
Data Governance for Big Data
How many times have you read an article about data quality that uses the phrase "garbage in, garbage out"? It is almost a cliché, but when it comes to big data, there is no other phrase that better sums up the challenges faced by organizations that want to use data...
CyberWars – The Rules of Engagement
The internet has given the world many new things, including a new theatre of war. Attacks, defense and counter-attacks take place in cyberspace as much as they do on land, in the air, and at sea. So, in defense of national security, is it okay for a government to...