Tom Erskine of Pegasystems talks about using visual tools that allow business and IT teams to collaborate on the agile development of analytics.
Watch a video of the network asset assurance panel held during the Subex 2013 User Conference.
A legal complaint by Privacy International and seven comms providers may have been derailed by a little-discussed change to the Computer Misuse Act, making it lawful for spies to hack.
British vendor Revector is known for bypass detection, but talking with their boss and developers reveals a firm that innovates technologically whilst maintaining robust values.
Tomorrow’s Company have issued an excellent report describing what non-financial businesses need from their risk leaders. Here are 7 conclusions that you should know about.
US Senator Rand Paul retained the floor of the Senate for 10 hours and 31 minutes whilst voicing his objections to bulk collection of phone CDRs by the NSA. These were the highlights.
The Irish RA and FMS vendor has added France’s largest MVNO to a customer list focused on smaller telcos.
University researchers have criticized the cryptography in ETSI’s Open Smart Grid Protocol (OSGP). They explain how hackers would break its privacy and authenticity.
Congratulations to Derek Burgess, who wins the prize for best answer to LTT-14. The optimal solution required two supply ships, with a comfortable surplus for the journey’s final leg.
The audited figures for Subex, the Indian assurance vendor, show modest improvement. Turnover, EBITDA and profits are all up, though Subex is weighed down by finance costs.