• 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

  • 00:37

    Presenting Your Data: Visualizing the Data

    in Technology

    Join us for Session 3 of the All Analytics A2 Academy, The Results Are In: Presenting Data to Decision Makers. As data continues to grow in size and scope, it is easy to get lost in it. The spreadsheet is no longer the best way to look at most data. As data changes, the way we work with data needs to change as well. Complex data means we need to rely more on computer assistance and on figuring out ways for humans to digest more complicated information. In this episode we will explore:



    New methods of displaying data
    The value of automating some complex decisions
    3D printing as used in data visualization
    When to use visualization
    How to tell a story with data

  • 00:25

    Database Security Best Practices for Databases and Big Data

    in Technology

    Caleb talks with Joe DiPietro about practical security controls for databases and big data environments.  The following aspects of security and compliance will be covered:

    - what to monitor
    - how to discover sensitive information
    - validating security controls & database policies
    - what role does the business owner play in the security framework
    - what to protect in a big data environment
    The Ready for IBM Security Intelligence Partner Program Webinar link reference in the show is as follows:   https://www-950.ibm.com/events/swgeer/swgeer06.nsf/signin?openform&seminar=kwoamoe8zkpv4&lang=en
     

     

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:59

    Exploring the Data Minefield in Franchising

    in Business

    This week on Franchise Today the focus is on something that seems to be in the news every day - data breaches! With data breaches more than doubling since 2009 to more than 25,000 incidents in 2013 and with 467 of those breaches occurring in the retail sector, franchises have been affected as well. Our guests this week are Tom Epstein, CEO of Franchise Payment Network and Lee Plave, Partner at the law firm, Plave Koch. Both are active IFA members on the Marketing & Technology Committee and are also some of the leading thought-leaders in franchising on today's topic.


    About Our Guests


    Lee Plave has extensive experience counseling distributors and franchisors, including drafting and negotiating franchise agreements for complex international and domestic transactions and advising clients on all aspects of franchise and distribution law. He also counsels clients on the application of technology to franchise and distribution systems. Lee focuses his attention on matters such as social networking and social media issues, e-commerce, data use and security policies, cybersquatting and domain name disputes, consumer complaint and cybersmear sites, as well as software and hardware licensing. In addition, he represents clients in matters before the Federal Trade Commission.


    In addition to his role as CEO of Franchise Payments Network, Tom Epstein continues works with the IFA, serving on Supplier Forum, The Marketing & Technology Committee, FranPac supporter, host of IFA FBN (Franchise Business Network) in Orlando, has been published in all major Franchise Trades as well a sponsor of countless industry events though out the year. FPN works exclusively in the franchise space, utilizing Tom’s extensive knowledge in retail and payment processing to facilitate the unique needs of franchise systems.


     

  • 00:34

    Prepare for the Internet of Things Data Blitz

    in Technology

    As enterprises steadily connect production equipment, transportation networks, environmentals, and other technologies, those organizations will face the challenges of analyzing, digesting, and acting on volumes of new data. No, we won't throw a switch and suddenly have an Internet of Things, but it is something that will evolve in the coming years, and it could pick up its early momentum in the enterprise space.


    Now, how are you going to bring all of that data into enterprise applications, and discover benefits?


    Steve Sarracino of Activant Capital will join All Analytics Radio at noon (ET) on December 16 to outline some of the opportunities and challenges for the IoT in the enteprise realm. Steve is a founding partner of Activant, and has been deeply involved in funding and advising companies that provide enterprise applications in the vertical and horizontal spaces.


    In this session you will learn:



    Why the people tasked with collecting the data on the IoT may have the toughest job
    What role dashboards play in viewing IoT data
    How your organization can navigate the hard road to predictive analytics
    How you can someday enable sensor-driven decision making


     

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:30

    Statistics Resources and Big Data

    in Internet

    This program will be featuring Statistics Resources and Big Data Subject Tracer™. This Internet Annotated Link Dataset Compilation is dedicated to the latest and most competent resources and tools for statistics and big data available over the Internet. The discussed selected research resources, sites, indexes and alerts offer excellent knowledge and information discovery sources to help you accomplish your statistics and big data research and discovery goals! We will also discussing my latest freely available Awareness Watch Newsletter V12N11 November 2014 and my freely available November 2014 Zillman Column covering Accessibility Resources On the Internet You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EST on Saturday, November 8, 2014 and then archived for easy review and access. Listen, Call and Enjoy!!

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

Results Per Page: 12 | 24 | 48
Loading...
Loading...