By Carl Butler Qlik Data Integration sales executive, iOCO. The challenge of moving data from its source in its raw state to its analytics-ready target state has become increasingly difficult. This is due to the exponential growth of data creation and collection in recent years due to digital transformation processes and adoption. Businesses are eager to […]
Continue readingMore TagAuthor: iOCO
Infor – The biggest software (ERP) company you might not have heard of…
Infor – The biggest software company you might not have heard of…. Very few people seem to know much about Infor and even those in the software industry seem to know little about what happened to the portfolio of products it acquired. Infor appears to be one of the industry’s best-kept secrets and yet it’s […]
Continue readingMore TagThe Security Risks of ChatGPT
By Byron Horn-Botha, Business Unit Head Arcserve Southern Africa. ChatGPT, developed by the artificial intelligence lab OpenAI, is a humanoid chatbot causing a global sensation. It is now the fastest growing app in history, hitting 100 million active users in just two months – much faster than the nine months it took previous record-holder TikTok to reach that […]
Continue readingMore TagData leaders’ challenge: The growing data skills shortage
One of the major challenges faced by data leaders today is the daunting task of collecting and transforming raw data into analytics-ready data. Moreover, the increasing volume and variety of data, along with the need to manage both cloud-based and on-premises data, makes this an increasingly complex and expensive undertaking. Additionally, data leaders are faced […]
Continue readingMore TagCA Southern Africa, Veracode reveal that when it comes to application flaws, the devil is in the data
A Southern Africa reveals that the latest edition of the annual Veracode 2023 State of Software Security reports that applications grow in size by about 40% year on year irrespective of their original size. The research aims to assist businesses to meet the multiple challenges of reducing security debt and avoiding the introduction of security flaws that accumulate over […]
Continue readingMore TagArcserve global research reveals cloud investments grow while data protection lags
Eighty-two percent of IT decision-makers expect an increase in hybrid cloud investments. Seventy percent of IT decision-makers expect an increase in multicloud investments. Forty-three percent of IT decision-makers believe cloud providers are responsible for data. Arcserve Southern Africa has revealed the key findings of an annual independent global study by Arcserve – the world’s most […]
Continue readingMore TagBreach and attack simulation: What are the drivers?
Active breach and attack simulation does not gain credibility by exposing more problems; it gains it by contextualising them and continuously testing attack paths.Let’s start by taking a bird’s-eye view of what the global breach and attack simulation (BAS) market looks like.The market for automated breach and attack simulation is being pushed by an increase […]
Continue readingMore TagThe Value of an Effective Data Funnel with d/EPM
Creating an effective and reliable funnel to direct data from enterprise applications into governance, risk and compliance, performance management, and analytics offers immense benefits in today’s data-rich world. If the insights are pulling from a single, real-time set of data, immense opportunities for sound decision making are created. “The goal is full business visibility,” says […]
Continue readingMore TagReduce Spreadsheet Risk, Drive Efficiency with Infor d/EPM
By Paul Bouchier Sales Director at iOCO, within iOCO Software Distribution, an Infor Gold Partner Modernity demands that business leaders leverage data for better and more strategic decision-making. Unfortunately, in many cases analysts still choose to bypass the IT department and opt for spreadsheets. While spreadsheets are often the tool of choice to store, manage, […]
Continue readingMore TagYou don’t know what you don’t know
Breach and attack simulation is the method that tests everything and replaces speculation with certainty in terms of security posture.What is breach and attack simulation and why does your organisation need it?The simple answer to this question is that breach and attack simulation (BAS) is a form of security control testing. The latter is defined […]
Continue readingMore Tag