Uncategorized

Greg Henderson 0
Combating fraud in South Carolina

Several weeks ago, South Carolina was the victim of what some experts believe to be the largest cyber-attack against a state tax department in history. Approximately 3.6 million personal South Carolina income tax returns were exposed, and nearly 657,000 businesses compromised, in an international hacking attack. Coincidentally, SAS and the SC

Alison Bolen 0
Four lessons from a data vigilante

There's an interesting and relevant read in this month's issue of The Atlantic about a "data vigilante." Uri Simonsohn, a social psychologist, has been outing fraudulent research based on his re-inspection of the data in the published works. I've pulled a few facts from the article that are going to sound obvious

David Pope 0
Are your applications designed tactically or strategically?

Organizations must find the right balance between tactical use of their data and strategic use of their data.  The following statement encapsulates the difference between an application that was primarily designed from a tactical perspective versus a strategic one.: "Thanks, you delivered what I asked for (tactical), but not what I

1 169 170 171 172 173 260