Articles about QandA

Bringing machine learning to the masses [Q&A]

Machine learning

Big businesses are increasingly recognizing the potential of data science and machine learning. Until recently, however, it hasn't been readily available to smaller organizations and individuals.

But now companies like Amazon and Google are beginning to make machine learning available more widely. Is this the start of a new trend? What will it mean for businesses, and will we see the rise of a new generation of ‘citizen data scientists’?

Continue reading

The future of mobile messaging in connecting with customers [Q&A]

Happy mobile user

In the past few years mobile has become the preferred communication channel as consumers demand fast, easy access to information.

But how will mobile develop in future? Can we expect to see more apps, a switch towards mobile friendly websites, or even a move back towards SMS as the preferred tool of business-to-consumer (B2C) communication? To find out we spoke to Steve French, VP of Global Product Management and Marketing at mobile messaging provider, OpenMarket, a division of Amdocs.

Continue reading

How BSIMM improves security by letting developers compare security practices [Q&A]

Boardroom security

Every organization believes that it's making its systems secure, but because they usually work in isolation from competitors and other businesses they have no way of knowing how they compare.

The Building Security In Maturity Model (BSIMM) aims to quantify security practices and present them in a measurable way to allow companies to compare their performance.

Continue reading

The future for enterprise mobility [Q&A]


The shift towards mobile computing and BYOD has been the big story in enterprise IT over the past couple of years.

But has the trend towards mobile peaked? Can we expect BYOD to move into smaller organizations and what effect will legal and regulatory frameworks have? We spoke to Gary Greenbaum, CEO of BYOD billing specialist Syntonic to find out.

Continue reading

How spam and botnets have become big business [Q&A]


Botnets are not a new problem, but they remain a key part of the cyber criminal's armoury. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), a global industry forum dedicated to promoting best practices in cyber security, has issued its first report looking at the level of botnet infection. Based on information provided by ISPs covering over 43 million subscribers in the US and Europe it concludes that around one percent of consumers are infected by a bot. The good news is that notification rates are high with between 94 and 99.82 percent of those infected being notified of the problem by their ISP.

Even on those numbers botnets are a major problem. We spoke to Ken Simpson CEO of outbound traffic security company MailChannels and co-chair of M3AAWG's Botnet Subcommittee to find out about how botnets and spam have become big business.

Continue reading

Predictive Analytics and Customer Intelligence: The benefits and challenges facing organizations today [Q&A]


The level of accuracy in predictive analytics relies heavily on the quality of data. However, it is often overlooked that the quality of data relies on an organization’s ability to seamlessly integrate with the various systems that collect unique customer data, as well as the ability to analyze the data in context. Predictive analytics can come up short if the data remains in silos across the organization (the web team sees website analytics, loyalty teams see membership levels, marketing team sees email conversions, etc.).

I spoke to Dominik Dahlem, Senior Data Scientist at Boxever -- a customer intelligence and predictive marketing company for airlines and travel retailers -- about the past, present, and future of predictive analytics.

Continue reading

Trends and opportunities in enterprise storage [Q&A]

Servers and Storage

The enterprise storage market has undergone significant change in recent years. In particular it's seen the rise of flash and the consequent decline of disk as a storage medium.

But what effect are these changes having on business? And what trends can we expect to see in the future? We spoke to Arun Agarwal, CEO of storage specialist Infinio, to find out his view of the market.

Continue reading

Addressing the IT security talent gap [Q&A]

Vacant chair

October is National Cybersecurity Awareness Month in the US and the Department of Homeland security is calling for more attention to be paid to securing systems.

But whilst cybersecurity is a growing industry we risk a developing skills gap where workers aren't qualified or prepared for jobs in the field. We spoke to Andrew von Ramin Mapp, CEO of Data Analyzers, a cyber security and digital forensic firm, to get his view on how the industry can address this.

Continue reading

Who's looking at your screen and how can you stop them? [Q&A]

Screen snooping

We can all remember seeing kids at school hunched over their desks to prevent anyone seeing what they were writing on their test papers. But when it comes to hiding sensitive information on your screen things aren’t that easy.

How big a problem is eavesdropping in this way and what can be done to guard against it? To find out, we spoke to Dr Bill Anderson, Chief Product Officer of technology company OptioLabs which has just announced a collaboration with AMD to help solve the issue.

Continue reading

How the mobile security landscape is changing [Q&A]

Tablet mobile security

As our mobile phones become increasingly central to both our personal and working lives, securing them and the data they hold has become paramount. The nature of the mobile space means that threats are more dispersed and change fast, so traditional security solutions are struggling to cope.

How does this change in the security landscape affect businesses who may be faced with supporting a range of different devices and operating systems thanks to BYOD policies? We spoke to Gert-Jan Schenk, VP for EMEA at mobile security specialist Lookout, to get his view.

Continue reading

Securing the Internet of Things [Q&A]

Internet of things

The Internet of things is set to worm its way into many areas of our lives, but as our cars and domestic appliances become connected how can we be certain that they're secure? We've already seen issues with cars being hacked and do you really want to be installing security software on your fridge?

We spoke to Lev Lesokhin, Executive Vice President, Strategy and analytics, of software analysis and measurement specialist CAST to find out how developers of IoT products can keep them secure and retain consumer confidence.

Continue reading

The state of Android security [Q&A]

Android malware

In recent times Android has come under increasing threat from malware which has led to more people looking to install security software on their phones and tablets.

Mobile security specialist 360 Security recently announced that it had gained 11 places on the Android download charts in August, indicating a renewed interest in protecting devices.

Continue reading

Minority Report could one day be real, thanks to big data and predictive analytics [Q&A]

minority report

Everyday humans create 2.5 quintillion bytes of data, according to IBM. This data comes from virtually everywhere -- sensors used to gather environmental information, posts to social media sites, cell phone signals and more. In order to best determine how to put this data to use in meaningful ways, the science of analytics has changed (think: the amount of data that can be analyzed, the tools and methodologies that enable us to do so, etc.). Most importantly, companies can now be predictive based on data analytics, enabling them to better forecast demands and proactively prevent certain issues.

I spoke to Murali Nadarajah, Global Head of Big Data Analytics for Xchanging, a publicly listed multi-national business technology and services provider, about how organizations today are using predictive analytics, and how the ability to be predictive has -- and will continue -- to change the business landscape enabling the development of new approaches and products.

Continue reading

The importance of education in combating phishing attacks [Q&A]

Phishing magnified

It's usually the case that the weakest link in any security system is the human element. That's particularly true when it comes to phishing attacks. Hackers have become more creative in the social engineering methods they use to gain access to sensitive information.

A new service called LUCY, aims to educate people and identify vulnerable endpoints by allowing businesses or individuals to simulate phishing attacks. We spoke to LUCY founder Oliver Muenchow to find out more about this approach.

Continue reading

How mobile can improve capture and analysis of retail sales data [Q&A]

Geo-location marketing shopping

Modern organizations collect large amounts of data across multiple platforms, but they can find it hard to extract useful, actionable insights from the raw information.

San Francisco-based Zenput provides real-time data capture and analysis to retail, restaurant and consumer goods companies to help them centralize operations and support more informed decision-making. How much difference can this technology make to businesses? We talked to Zenput CEO Vladik Rikhter to find out.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.