Zipcar Shifts into High Gear Using BI Tools
Today, Business Intelligence (BI) tools mean much more than sifting through volumes of historical data to create reports for future planning and decision making....
Can You Trust Your Current Operating System to Protect You?
Software, including operating systems, increases your level of assurance in the environment and can mitigate – if not remediate – most of the exposure from the...
21st-Century Global Banking Finds New Success Factors
The globalization of banks is not a new business model for revenue maximization; however over years of geographic expansion, banks have understood that maintaining...
Dealing with Imperfect Data? 5 Things to Consider
When customers are looking for ways of dealing with imperfect (substitute your own expletive here) data, there are five major factors that should be...
Blame It on Ted
Imperfect data – A historic perspective
Our world of computing in 1969 was very different from today. In 1969, Dr. E.F. (Ted) Codd published his...
Living in the Cloud: Cool vs. Critical
The critical elements you need to fully understand before living in the cloud are the physical attributes of the cloud center: staffing, patrols, power,...
Automate Risk Management with a Highly Secure IT Backbone
High performance, highly secure IT integration of business process systems is now becoming a requirement to compete. Without automated communication between disparate systems, a...
Reducing Project Duration by 25%: Magic or Common Sense?
For years, I’ve been telling IT folks how to shorten the duration of their projects: Make the upfront investment in getting the architecture right....
Nothing New in Cloud Security
Many in the business and academic communities have been up in arms that security risks are too high in cloud implementations, and therefore the...
Technology is at the Heart of Keeping Patients Safe
Health Insurance Exchanges (HIX) were supposed to be a cornerstone of the Patient Protection and Affordable Healthcare Act of 2010, providing a way for...

