The Key To Uncovering Fraud Lies in Uncovering Hidden Relationships
Emil Eifrem of Neo Technology discusses how graph databases offer new techniques for uncovering fraud rings and other sophisticated scams.
Published On16:30, December 2 2015
How online betting sites are beating the odds
David Maitland, GM at Couchbase, looks at how online betting sites are using database technology to meet the huge demand.
Published On16:27, December 2 2015
Don’t be haunted by shadow IT
Riverbed Technology's Karl Campbell, provides a checklist for businesses on how they can better understand potential pain points and how to embrace...
Published On16:26, November 24 2015
The role of data science in media today and in the future
Steve Plunkett, CTO, Ericsson, talks about human data, machine generated data and their role in the TV world of today and the future.
Published On16:19, November 24 2015
Is your data as secure as you think?
Charlie Horrell, MD, EMEA of Diligent, on what needs to be considered when hosting and securing sensitive data.
Published On16:18, November 13 2015
What's the big deal about the new 'tech-levels'?
Lisa Forrester, Director, GCS Recruitment, looks at the why IT should care about the new tech levels.
Published On16:12, November 13 2015
Practice what you preach
Zahl Limbuwala, CEO, Romonet, on how data centre owners & operators can harness the power of their own data for business insights.
Published On15:55, November 13 2015
Empowering Your Staff to Become Ethical Hackers
Denise Hudson Lawson, Enterprise Learning Architect at Pluralsight, on why the ethical hacking skillset is so important to businesses.
Published On16:36, November 9 2015
Halloween Wi-Fi Top Trumps
Perry Correll, Chief Technologist at Xirrus, takes a light-hearted look at four of the scariest Halloween beasts and offers a little bit of Wi-Fi...
Published On16:43, October 30 2015
Mobile is Unified Communication’s engine for growth
John Howard, Director UC Collaboration, EMEA, Logitech for Business, looks at how mobile and BYOA is forcing businesses to deploy UC.
Published On15:52, October 30 2015
Unstructured Data’s Final Frontier
Jack Springman, Head of Customer Analytics at Sopra Steria, explains why he thinks our brains may well be the final frontier for data.
Published On15:49, October 29 2015
CIO job insecurity in the app dev age
Iain Chidgey, vice president, International Sales at Delphix looks at the CIO’s role in maintaining the delicate balance between security and...
Published On16:30, October 28 2015
Making Internet of Things Commercially Viable
Sean Paxton, product manager at Redcentric, looks at the challenges facing businesses when it comes to making money from IoT.
Published On09:36, October 27 2015
Making every transaction pay its way – using data as part of your business model
Matt Pfeil, Chief Customer Officer & Co-Founder, DataStax, on how to make each business transaction smarter.
Published On10:33, October 21 2015
Why IT Contracts Fail
Suzie Miles, a Solicitor at Ashfords LLP, looks at why the provision of software, over other goods, requires a different set of terms.
Published On16:05, October 19 2015
Trending on CBR
In the spotlight
- Why moving to cloud and mobile might be a security advantage
- How to move from web app to mobile app: 5 top development tips
- How big data analytics is changing the Super Bowl, RBS 6 Nations rugby and how Football Manager is predicting who will win the Premier League
- War deck, water & space: 5 data centre projects revolutionising the hosting game
- How new tech investment should shine a light into dark pools
The Critical Need for Encrypted Email and File Transfer Solutions
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statues that require...
Why Should your Cloud be Designed with Open and Hybrid in Mind?
Choosing how to build a cloud is the most strategic decision IT leaders will make this decade.
Making Your Website Safe for Online Buyers with the Qualys SECURE Seal
The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a...
The Web in 2020
The web in 2020 looks at the way in which the Internet will shape the lives of individuals and businesses taking into account legal, political,...
Teneo - Infrastructure Management, Performance and Virtualization Services
Teneo is an infrastructure optimization company, providing solutions that help customers with the management, performance and virtualization of...
The Neverfail Group is dedicated to creating a world where business applications are continuously available. High Availability, Disaster Recovery...
Qualys - IT security risk and compliance solutions
Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable...
Webroot - Security Solutions
Webroot provides industry leading security solutions for consumers, enterprises and small and medium businesses worldwide.