The technology can be easily hacked, leaving many digital devices open to attack.
Coaching and mentoring are vital for the success of business analysts.
In today`s converged world, network access control is all or nothing.
What is the difference between identity management, identity and access management, and a user directory?
Regulatory obstacles may trip up VOIP-based services in SA.
Companies must not procrastinate when it comes to enterprise architecture.
Security of content and data is a non-negotiable, especially in this era of compliance awareness.
To get to the real heart of BI, companies must be prepared to take ownership of the solution.
There can be no doubt that enterprise performance management lies at the heart of business management.
Companies underestimate BI implementation issues and challenges at their peril.
Implementing new HR technology requires a balanced, considered approach.
Successful CRM projects require, in part, a strong business intelligence foundation.