In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.
Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.
Integrated video surveillance, intrusion detection and access control have been key security measures businesses have been using for years. They also happen to be some of the best resources businesses should be using to improve business intelligence.
Scientists in Australia's Rainforests and California's Beaches Use Business Analysis to Collect Data and Save the Ecosystem
June 3, 2013
As environmental regulations increase, industrialization’s effects stretch further and ecological scientists grasp for new ways to collect vital data, some parties are all reaching for the same thing: business intelligence.
Back in time, I was getting a personal tour of historic computers in the Smithsonian by none other than the famous computer scientist Captain Grace Murray Hopper, who is said to have coined the term “computer bug.”
Led by CEO Al Grasso, The MITRE Corporation is paving the way to practical solutions for critical challenges in the U.S. while helping to foster talent, innovation and security for future generations. Learn more about this organization’s methods and mentorship in the October issue. Other topics in the October issue include profiles on the Port of Los Angeles and Seattle Children’s Hospital, 4K video surveillance tips and technology, security career advice and more.