Ask The Expert: Data Analytics

By | 2017-07-17T10:41:16+00:00 July 11, 2017|Categories: Fusion Blog|Tags: , , , , |

In today’s market, data analytics play a large role in the success of an organization. Analyzing data leads organizations to uncover insights to make more intuitive business decisions. In the age of digital transformation, utilizing analytics within your business is a necessity to stay competitive. In this Ask the Expert interview, we sat down [...]

Rethinking the Corporation: The Digital Innovation Lifecycle Part 3

By | 2017-06-15T14:49:08+00:00 May 1, 2017|Categories: Fusion Blog, Innovation Posts|Tags: , , , |

Throughout this blog series, we’ve been suggesting that the traditional departmental corporate form (i.e. sales, marketing, finance, ops, IT, etc.), universally applied, and virtually unchanged for over two centuries, is killing innovation in leading corporations around the world. From the way companies develop strategy, serve customers, and attract employees, to the way they create [...]

#Humans-Vs-TheMachine: Privacy and Security in the Information Age Part 3

By | 2016-12-06T15:47:40+00:00 October 28, 2016|Categories: Fusion Blog|Tags: , , , , , |

The first two missives in this series focused on the eroding right of privacy, its effect on human congress, and in particular, its effect on the global markets in which we work. The first blog explored an Apple vs. FBI case, in which the FBI was asking Apple to hack its own phone in pursuit [...]

#MicrosoftVsDOJ: Data Privacy & Security in the Information Age Part 2

By | 2016-12-06T15:47:42+00:00 July 21, 2016|Categories: Fusion Blog|Tags: , , , , , |

In our first post in this series, we discussed the recent Apple vs. FBI case in which the FBI was asking Apple to hack its own phone in pursuit of the perpetrators of the San Bernardino terror attack. Though the complaint was withdrawn, government, business, and individuals will be wrestling with the contradictory impulses of [...]

#AppleVsFBI: Privacy and Security in the Information Age

By | 2016-12-06T15:47:43+00:00 May 1, 2016|Categories: Fusion Blog|Tags: , , , , , |

In February 2016, the FBI obtained a court order compelling Apple to assist in the investigation of the December 2015 San Bernardino terrorist attacks by hacking Syed Rizwan Farook’s government issued iPhone 5c. Relying on a centuries old law which authorizes the United States federal courts to "issue all writs necessary or appropriate in aid [...]

Has Spark Become a Five Alarm Fire?

By | 2016-12-06T15:47:44+00:00 January 26, 2016|Categories: Fusion Blog|Tags: , , , , |

There are new technologies popping up daily in the world of Big Data. It’s impossible to keep up with them all and it’s even more challenging to predict the winners and losers. However, an influential player in 2015 was Apache Spark, which is fast and general engine for large-scale data processing. Interest in this open [...]

15 Ways Google Enhanced Data Security in 2015

By | 2016-12-06T15:47:45+00:00 December 28, 2015|Categories: Fusion Blog|Tags: , , , , , |

Google worked hard in 2015 to ensure stronger, simpler security of your data in Google Apps. Because security has always been a top priority for Google, they're continuously working to stay ahead. Here are the 15 steps that Google took to enhance data security at work in 2015. Security keys make two-step verification easy and [...]