en flag +1 214 306 68 37

Blog

The Biggest Fear about Artificial Intelligence: Will Robots Steal Our Jobs?
Internet of Things

The Biggest Fear about Artificial Intelligence: Will Robots Steal Our Jobs?

We dwell on the opportunities offered by AI and shed light on the technology's potential risks.
Dynamics 365 & LinkedIn Sales Navigator: What the duo can bring for sales departments
CRM

Dynamics 365 & LinkedIn Sales Navigator: What the duo can bring for sales departments

Following up on Microsoft Business Forward conference, our MS Dynamics consultants advise on the potential of the announced Microsoft Relationship Sales solution.
Office 365 Collaboration Tools: Comprehensive Overview
SharePoint

Office 365 Collaboration Tools: Comprehensive Overview

Get a detailed guide to cloud-based collaboration in Office 365 and learn how to choose suitable team collaboration tools.
Magic Out-of-the-Box – Does It Apply to SIEM Solutions?
Information Security

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Our information security consultants give you the checklist to decide whether to replace or just upcycle your out-of-the-box SIEM system
The Great Expectations of the ImageNet Challenge 2017
Image Analysis

The Great Expectations of the ImageNet Challenge 2017

Computer vision scientists from around the world are competing to create the most accurate image analysis algorithm.
Data quality assurance in BI - based on CRM data
CIO Blog, Business Intelligence, Data Analytics

Data quality assurance in BI - based on CRM data

No more wrong data analysis caused by bad data! Be armed with our new blog post on data quality assurance in the context of CRM.
No Wanna – No Cry or the Ways to Prevent Ransomware Attacks
Information Security

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

There are ways to prevent or, at least, minimize the harm of WannaCry or suchlike attacks, as experts providing information security consulting say.
Detecting APT Activity with Network Traffic Analysis
Information Security

Detecting APT Activity with Network Traffic Analysis

APT protection has recently become a byword as thousands of organizations keep facing network intrusions. The article focuses on network traffic analysis as a major means to detect advanced persistent threats.
Consumers' Attitude to Mobile Security: RiskIQ Report Takeaways
Mobile App Development

Consumers' Attitude to Mobile Security: RiskIQ Report Takeaways

As RiskIQ introduces disturbing findings on mobile users’ attitude to security, we reflect on some possible steps to address the situation.