Predictive Maintenance AI GRT Resources

Achieving Commercial Success From IoT

Achieving Commercial Success From IoT

Intro What will break Internet of Things (IoT) out of the novelty basket and into the mainstream? When we say mainstream, we mean television and mobile phone mainstream, i.e. in every household and in every pocket. The answer is data - people pay for data-based...

Machines Can Learn, But How?

Machines Can Learn, But How?

Many experts predict that machine learning (which any companies are currently investing in significantly) will be responsible for the most important breakthroughs in history. That includes being more important than the industrial revolution or the introduction of...

The Action Is Not In AI, Its In Machine Learning

The Action Is Not In AI, Its In Machine Learning

In mainstream news (non-tech news) or the entertainment industry (movies and TV in particular), artificial intelligence (AI) appears to be a singular technology. This technology often takes a human form and is consigned to performing menial tasks or overtaking the...

Is Your Biggest Threat Internal

Is Your Biggest Threat Internal

Your company could be compromised, even with a relatively tech-savvy workforce. Fooled into allowing attackers access to company networks, it is this mode of access that is one of the biggest cyber security challenges. Perceptive, well-meaning employees can be fooled...

Self Service Still Needs Self Actualization

Self Service Still Needs Self Actualization

Many companies' experience of self service business intelligence (BI) is similar to the early days of agile development; companies were then drawn to a model that promised improved business-IT relations and expedited delivery cycles. This was particularly attractive...

Social media by nature easily exploitable

Social media by nature easily exploitable

Social media is surely one of the phenomena of the 21st Century. Everyone has a favorite social media platform and this has changed the way we communicate – sharing news and gossip. Twitter and Facebook, for example, are force multipliers when it comes to the spread...

Top Three BI Tools

Top Three BI Tools

Self-service business intelligence makes data discovery and analysis remarkably easy. The three next generation tools only make this statement more true. Watching these new, easy-to-use and exploratory BI products outsmart and outperform the older platforms is seeing...

Rising Threat of Social Media Attacks

Rising Threat of Social Media Attacks

Social media is a useful tool for any business. Its ability to reach and engage with customers is unrivaled. However, with the rise in use, so comes the rise in attacks using this medium. Hackers and fraudsters have also cottoned on to the 'potential' in this new...

Self Service BI All About Me

Self Service BI All About Me

By 2017, it is predicted that most business users – in addition to the analysts – will have access to their own version of self-service business intelligence tools. The ability to prepare their own data for analysis has been a long time coming, and the pace of change...

Choose The Right Smartphone Encryption

Choose The Right Smartphone Encryption

Most companies now have smartphones, if not as standard, for a select group of key employees. These devices are now capable of calculating numbers in spreadsheets, email and storage of commercially sensitive documents. As workforces become ever more reliant on remote...

Solid Foundation Needed for Self Service BI

Solid Foundation Needed for Self Service BI

The world of business intelligence is continuing to embrace self-service analytic tools, and the use of these continues to grow, almost exponentially. It is expected, that by the end of 2016 a majority of businesses will have some sort of self-service BI in place and...

Detecting Mobile Malware

Detecting Mobile Malware

Since the breakthrough in botnets specifically for mobile began in 2011, they have been a major headache, and cause for concern, for all those involved with the security of mobile devices. While early generations of botnets have been in operation on computers and...