Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:30

    Randy Roberts talks Data Security on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches. 


    Connect with Randy: www.linkedin.com/in/rsroberts

  • 00:16

    Ocoos.com: The Democratization of Data and Design

    in Business

    An overview about Ocoos.com, and the democratization of data and design.

  • 00:07

    Charles Handler, PhD breaks down big data for selection with Thug Metrics

    in Technology

    Rapping with Charles Handler from Rocket Hire about Big Data used in selection and screening. 


    Everyone meet Charles, Charles meet everyone:  


    As a technologist, futurist, business advisor, and selection systems scientist he has spent over 20 years helping organizations across the globe to realize quantifiable value through their processes for selecting and developing human capital. 


    Charles has helped design hundreds of selection systems putting through 10's of millions of jobseekers. He knows how to architect a hiring system.

  • 00:30

    David Bernstein eQuest on Data Resistance on Thug Metrics with Bryan Wempen

    in Technology

    David Bernstein is Vice President - Data Analytics Division, eQuest.

    He leads eQuest's new Big Data/Predictive Analytics Division. Responsible for developing the consulting services and custom business solutions based on eQuest's Big Data capabilities. The solutions include a focus on yielding critical insights for HR departments that drive Talent Acquisition and Workforce Planning strategies.


    An innovative senior HR leader with a proven track record of success in creating Global HR Technology and Operations strategies. Adept at then designing and implementing technology solutions and business processes that create high value. Highly effective in creating strategic HR capabilities through my strong experience at the intersection of people, processes, and technology coupled with my deep understanding of the business process requirements of all the HR disciplines.


    Particularly skilled at examining dynamic environments and developing and implementing action plans that support the business needs. Reputation for delivering World-Class HR Technology solutions and processes, designing, and facilitating the execution plan, and leading the Change Management process to enable rapid return on the investment. 


    • Partnered with and influenced senior management as well as employees at all levels.
    • Successfully managed/brokered the relationships between third party partners, service suppliers and Human Resources Management
    • Sought out to advise/consult on the use of HCM and Reporting technologies that create strategic capability and support efficient, cost effective HR Operations and Shared Services

  • 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:30

    Data Mining Resources

    in Internet

    This program will be featuring my Subject Tracer™ titled Data Mining Resources. We will be highlighting the latest and greatest resources covering data mining resources including search engines, subject directories, articles, guides and tracers - literally everything needed for DATA MINING !!! We will also discussing my latest freely available Awareness Watch Newsletter V13N4 April 2015 featuring Knowledge Discovery Resources 2015 and my freely available April 2015 Zillman Column highlighting Healthcare Online Resources 2015.  You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Saturday, April 25, 2015 and then archived for easy review and access. Listen, Call and Enjoy!!

  • 00:30

    Statistics Resources and Big Data

    in Internet

    This program will be featuring my white paper titled Statistics Resources and Big Data. We will be highlighting the latest and greatest resources covering statistics and big data including search engines, subject directories, articles, guides and tracers - literally everything needed for STATISTICS and BIG DATA !!! We will also discussing my latest freely available Awareness Watch Newsletter V13N4 April 2015 featuring Knowledge Discovery Resources 2015 and my freely available April 2015 Zillman Column highlighting Healthcare Online Resources 2015.  You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Saturday, April 11, 2015 and then archived for easy review and access. Listen, Call and Enjoy!!

  • 00:14

    Embracing The Age of Mobility - Part 6 of 6

    in Technology

    4 Essential Pieces to Any Small Business BYOD Strategy


    Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.


    We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.


    Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

  • 00:30

    Embracing The Age of Mobility - Part 2 of 6

    in Technology

    Why SMBs Must Proactively Address the Threat of Mobile Hacks


    More cyber criminals are targeting small-to-medium sized businesses.  One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place.  Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.


    This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.


    If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:35

    Secure Your Big Data in the Cloud

    in Technology

    As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?


    Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.


    Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.


    Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.


    In this event you will learn:



    About the progress that the cloud sector and its customers have made in building a secure environment
    About some of the best practices for enterprises that the Cloud Security Alliance has already identified
    What types of big data applications are ready for everyday life in the cloud
    How security and privacy protections in the cloud environment may evolve in the year or so to come


    Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.

Join Host Live Chats

From the BTR Blog