What is Digital Transformation? The term Digital Transformation is used all over the place these days, with little agreement on what the term actually means. In this post I will describe what I believe the term covers. I will also describe the phases an organisation must go through on their transformation journey. Originally, digital transformation […]
Process improvement
What is a ‘data breach’?
A data breach doesn’t need to be a big headline grabbing event (think of some of the high profile breaches by the likes of Equifax, TalkTalk or Wonga) to do your organisation serious harm. In this blog I am going to cover what constitutes a data breach and what can you do to avoid them. […]
The Fourth Industrial Revolution and Why the GDPR Matters
I make no apologies for another blog on the subject of data, because I believe data is one of the most important subjects in both our personal and working lives at the moment. But first let’s talk about the Fourth Industrial Revolution. I was at a conference this week listening to a great keynote presentation […]
New Product: Triyo project collaboration software
According to the Gallup 2017 Digital Workplace Survey, 31% of senior executives state their biggest workplace challenge is the lack of “Cross-Departmental Collaboration”. The same survey reported that 33% of executives stated their biggest digital priority was “Enterprise Social / Real-Time Collaboration”. My experience working with organisations of different sizes is that enterprise wide collaboration […]
Power Pivot for Excel: Top Use Cases and Examples from Toptal
Editor’s Note Everyone I know uses Excel to some extent, but few (including me!) even scratch the surface of its capabilities. In this article, written by Ellen Su, Finance Expert at Toptal, the capabilities of Excel’s PowerPivor addin are demonstrated to provide a number of time saving analysis techniques. The original post can be read here. Ellen […]
How Safe is Your Data?
With cyber security hitting the headlines almost daily, many organisations are rightly concerned about the vulnerability of their data and are devoting serious time and resources to protecting this vital business asset. Traditional security methods have focused on improving the boundary defences of the organisation; aiming to prevent undesirable penetration of the network and to […]