Business Intelligence Collection

WatchIT
Show More

6 videos in this collection

Big Data in the Enterprise: An Introduction
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even…
Business Intelligence: Best Practices for Successful Project Management
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This…
Guerrilla Business Intelligence
Implementing Business Intelligence systems and solutions can be a lengthy and expensive process. Organizations today, looking to lower costs and achieve a faster turnaround, may want to consider a guerrilla-like…
Semantic Intelligence: The Enabler of Mobile Search and Advertising
On average every worker in every company spends 2.3 hours per day looking for information. Even with brand name systems, two-thirds of the information received is never used. These systems…
Semantic Technologies
Since its earliest days, the technologies of the Internet and the World Wide Web have been evolving. The journey has taken users from the embryonic stages of Web 1.0 with…
Big Data: Good for the Customer Not Just the Business
An important lesson learned about Big Data is that collecting and storing data may be the easier part of the job, analyzing and utilizing the data, well, that's the challenging…

Related videos

Guerrilla Business Intelligence
Part of the Series: Business Intelligence Collection
Implementing Business Intelligence systems and solutions can be a lengthy and expensive process. Organizations today, looking to lower costs and achieve a faster turnaround, may want to consider a guerrilla-like approach for their BI initiatives. In this report, Karl Boone, from the globally based IT consulting firm, PA Consulting Group,…
The Five Big Bang Theory of the Internet
In this WatchIT On the Horizon program, The "Five Big Bang" Theory of the Internet, Peter Vogel, a technology expert and attorney from the firm of Gardere Wynne Sewell LLP, based in Dallas, Texas explores the evolution of the Internet and provides interesting insights about its history and where it…
Rootkits: A Growing Security Threat
Rootkits are malicious programs, that when downloaded, can allow an intruder control over a system without ever being detected. Once installed, Rootkits can enable access to personal information, track a user's Internet activity or even hijack a computer for botnet attacks or spam distribution. In this program viewers will learn…
Business Intelligence: Best Practices for Successful Project Management
Part of the Series: Business Intelligence Collection
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This program discusses best practices for organizing and managing a BI project. David Sterling, CEO and principal consultant for Sterling International…
WatchIT Computer Science Collection
A collection about SPA Computer Science from WatchIT
Global Connectivity: Revolutionizing the Way We Do Business
Imagine a world where ubiquitous connectivity joins all global citizens to the people, products and services they need - anytime, anyplace and anywhere. This vision of the not-too-distant future is presented in a groundbreaking book titled, Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business, by author Emily…
Insider Threats and Attacks: Detection and Prevention
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled…
Red Teams: Securing the Enterprise
To protect business critical networks and applications from a malicious cyber-attack, organizations today often employ Red Teams to challenge and test enterprise system defenses. The Red Team's goal is to covertly seek out vulnerabilities and identify them before the "bad guys" can do any damage. In this report, expert and…
Semantic Intelligence: The Enabler of Mobile Search and Advertising
Part of the Series: Business Intelligence Collection
On average every worker in every company spends 2.3 hours per day looking for information. Even with brand name systems, two-thirds of the information received is never used. These systems are brittle, imprecise and ambiguous. They are largely a waste of time. Semantics is the science of eliminating ambiguity. Organizations…
Data & Storage Management Collection
A collection about Data & Storage Management from WatchIT
IT Project Management Collection
A collection about IT Project Management from WatchIT
Security & Risk Management Collection
A collection about Security & Risk Management from WatchIT