Quantcast
Channel: Posts by Ian McGrath
Browsing all 27 articles
Browse latest View live

Marketing Automation AI Trends For 2017

The past couple of years has seen an impressive rise in the adoption of marketing automation. Between 2011 and 2014, the industry reportedly grew over 11 times. Since 2014,...

View Article



Security Considerations When Choosing A Virtual Data Room Provider

Due diligence is one of the most important processes that both enterprises, and young companies need to take care of. Not only it can be a legal obligation, it is a good...

View Article

What To Consider Before Automating IT Services

Automating IT services can be a fantastic time saver for businesses. IT services often involve a large number of repetitive but not complex tasks, like password resets,...

View Article

How Do One Click Installers Work

You do not need to be a geek to be able to manage and run websites today. Graphical User Interfaces (GUI) make it possible for layman entrepreneurs to point and click at...

View Article

Bringing Cloud And Big Data To Inventory Management

It may not seem like a big deal for a boutique store selling a few dozen items (SKUs) to be managing all of its inventory on a ledger or a spreadsheet software. The business...

View Article


Smart Contracts and Why They Are the Future

Blockchain technology is generating significant interest across a wide range of industries. Smart contracts are a part of Blockchain technology’s progression from a monetary...

View Article

Extending The Office: MS Office And G Suite

Google and Microsoft are head to head in the fight to take over the enterprise mind-share for business apps. While Google has started offering G Suite in the recent years,...

View Article

Will VR Be The Death of Personal Space and Security?

In a world where advancement and improvement are key, the demand for novel experiences continues to grow. Our culture strives for not only improvements in technology we...

View Article


Understanding Time-Sharing, The Precursor To Virtualization

Time sharing as a concept started in the 1960s to allow a large number of users to concurrently make use of resources from a single computer. Today, time sharing is regarded...

View Article


'Safety First': Steganography for Encrypting Data Transfers

Data is the foundation with which a business is formed and their future is modeled. However, with a rise in data intrusion and manipulation in the last few years, many...

View Article

How Does A Webinar Streaming Server Work

Web video streaming technology, especially live streaming ones for marketing purposes like webinars, have come a long way in the past decade. Plug and play technologies make...

View Article

Why Your Application Might Require A Message Queue

Message queues are a great abstraction layer for applications that require decoupling the data layer from the logic layer. A message queue does exactly what it sounds like it...

View Article

Combating Financial Fraud With Big Data

There are nearly 34 billion credit card transactions in the United States alone each year. The sheer scale at which digital transactions happen in the country make identity...

View Article


Top 4 Security Vulnerabilities in Web Apps

Writing bug-free software is virtually impossible. One can write software that is backed by mathematics and can be formally verified, but it still would not guarantee that...

View Article

Building Sophisticated Platforms with APIs

In the past, tech enterprises attempted to build technologies from the ground up to compete against rival firms. This was because business didn’t really have any choice but...

View Article


Big Data Modelling in the Education World

Most consumers are well aware at this point that their lives are tracked in a myriad of different ways. From web search history to purchasing patterns on credit cards to what...

View Article

The Three Step Process of Building Bots for Third Party Online Platforms

A recent study predicted that nearly 48 million accounts on Twitter are bots. That’s nearly 15 percent of the Twitterverse. The bots on Twitter have created controversy in...

View Article


Protecting Your Personal and Business Information

If you own a business, you know all too well the importance of securing not only your personal information but also the information obtained from your clients. Technology...

View Article

Securing Critical Data - An End-to-End Overview

Critical data is a security liability. The more data an organization collects, the more interfaces it has to take care of, and the more attack surfaces it exposes. Formal...

View Article

The Future Is Blockchain-Based Smart Contracts

A study by the US National Association of Purchasing Managers revealed that the average Fortune 1000 company had anywhere between 20,000 and 40,000 active contracts. And...

View Article
Browsing all 27 articles
Browse latest View live




Latest Images