top
Our Blog: Expert thinking, writing and thought provoking ideas

Retailers need field scientists not lab rats

by Adam Burns
A single peanut

Data scientists are only one part of the data puzzle. Failing to pair them with someone that has industry insight is like going into battle with someone who’s really good at Call of Duty. Data without insight is a peanut without salt. For example, Starbucks offers 87,000 possible drink combinations. If you like plain facts, ...

Read More

Hacking the Pentagon

by Carla Curtsinger
wargames

Every time hacking makes headlines, I picture a very young Matthew Broderick and Ally Sheedy sitting at an antiquated computer console that reads: SHALL WE PLAY A GAME? The movie was WarGames, the year 1983, and I wasn’t born yet.  (Let me have that little white lie, okay?) The two teenagers had hacked into a top-secret computer ...

Read More

Are you liberated or in lockdown?

by Sasha Qadri
barcode

Barely a day goes by when you don’t read in the papers about some security breach or other. Did you hear about the one a few weeks ago where a fraudster hacked 272 million unique email addresses and passwords? In this instance, a security firm, Hold Security, persuaded him to hand the information over, which ...

Read More

Beware the content marketing monster

by Ben Thompson
Beware the content marketing monster

This may seem self-defeating coming from someone who uses words for a living, but here goes: marketers are producing too much content. Whoa there. Before all you creative types rush for the pitchforks and burning torches, hear me out. I know that content is hugely valuable. I appreciate that the right piece of content in ...

Read More

Engaging employees in your safety program

by Carla Curtsinger
shutterstock_151558676

I ride the subway back and forth to work, Monday through Friday. You’ll often find me there on the weekends as well, since it’s the fastest, least expensive way to travel around New York City’s five boroughs. Plus, there is usually a heck of a floor show. So it wasn’t that surprising to learn at ...

Read More

How Kelly Ripa’s Walk-Out Brought Workplace Respect In-Focus

by Carla Curtsinger
kelly michael

In the space of 24 hours, talk show host Kelly Ripa’s name went from being synonymous with bubbly morning fun to going AWOL from work. “Don’t go all Kelly Ripa on me,” a radio show announcer quipped a few days after Michael Strahan, co-host on Live with Kelly and Michael, blindsided her with the announcement ...

Read More

The problem with data analytics

by Adam Burns
Can a committee ever create anything awesome?

Data analytics is great for iterative evolution. But can a committee ever create anything awesome? According to WhatIs.com, “data analytics is the science of examining raw data with the purpose of drawing conclusions about that information. Data analytics is used in many industries to allow companies and organisations to make better business decisions.” The tech ...

Read More

Challenges faced by the Telecoms Industry in Africa…

by Georgia Scobie
light_switch

A few weeks ago, I traveled to Pretoria, one of South Africa’s three capital cities for our annual NG Telecoms Africa Summit. Now, I have been to a couple of Telecom summits before, but the conversations across this one felt a little obsolete… Africa’s experience of telecoms is somewhat hindered, something which is especially noticeable ...

Read More

Real Time Security Intelligence: an analyst’s view

by Ivan Niccolai
real-time-security-intelligence

Advanced persistent threats have evolved significantly, as has the well-funded intelligence behind them. An approach to security by prevention and ‘default deny’ alone is not sufficient, you need the security trifecta: prevention, detection, response. Real Time Security Intelligence can help. The excellent Next Generation Security Summit, hosted at the Fairmont in St. Andrews, Scotland on ...

Read More

Why the CISO is changing: lessons from a security summit

by Ben Thompson
Businessman and business sketch

What keeps the modern CISO up at night? Clue: it’s not what you might think. Today’s threat environment is unlike anything we’ve ever seen before. The sheer volume of attacks that take place every day, the variety of forms those attacks take, the number of different entry points they can target and the increasing criticality ...

Read More
Older posts