Tableau Deep Dives are a loose collection of mini-series designed to give you an in-depth look into various features of Tableau Software In the first three articles of this Deep Dive on Dashboard Design , we’ve constructed our proof of concept. All of the worksheets have been planned, built and laid out in the structure best suited for our dashboard objective. Now we’re going to talk about how we can make our dashboard interactive. Remember, this is Tableau, not just a pretty picture. Tableau is interactive and our dashboard should be, too. As before, we’ll start by discussing the theory and concepts behind dashboard interactivity and then we’ll apply it to our sample dashboard, a Search Engine Marketing reporting tool. Concepts User Adoption The goal of any developer is to create a tool…
Tip of the Week: How Do You Reduce Maintenance Costs?
A thorough maintenance program will help prevent high-cost repairs
Tip of the Week: Simple Device Turns Your Car Into a Wi-Fi Hotspot
The Zubie dongle is a great way to get smart car technology in your older non-electric car.
Free MarkLogic NoSQL database tutorial
First in a series of videos covering key concepts about creating Operational Data Hubs in MarkLogic using the Data Hub Framework. Part of the Operational Data Hubs series. Learn about MarkLogic with Free Training.
How virtualization roots out malware
Every IT solution in your organization will encounter malware at some point or another. Some solutions are malware liabilities, others are assets. When it comes to virtualization, there are several cyber security benefits for improving your malware readiness. One of our favorites is called sandboxing, and it’s a good one for you to know about What is sandboxing Sandboxing is one of the rare concepts in virtualization that the average person can usually grasp in just a couple short sentences. Essentially, sandboxing is the practice of tricking an application or program into thinking it is running on a regular computer, and observing how it performs. This is especially useful for testing whether unknown applications are hiding…
Booth 1935 + Free Westec Pass = See you There
Where & When: Booth 1935, the Los Angeles Convention Center, September 12th through the 14th Quick Info: Come see demonstrations of DNC software, machine monitoring, job scheduling, and more. We will also have our USB and wireless solutions, along with the highly-anticipated Multi Connect device. Free giveaways of hardware, t-shirts, and mousepads will be available Register. Free tickets are available through September 10th by clicking here and entering code 10605599. Why you should visit SFA at Booth 1935: Learn about Predator's Manufacturing Suite of Software, which includes DNC, Document Control, Machine Monitoring, Tool Crib Management, and our integration services. See how as little as $45 per month, per machine, can help increase your shop floor productivity…
Simple Tips to Care for your Furniture (toogoodsa.com)
A small desk or cabinet may be just what you need to fill the open space in your house. With time, you’ll begin to notice that when you open the drawers, a musty or moldy odor will develop. Don’t worr
How to Stop Your Computer from Slowing Down
As months and years pass by, even the most powerful computer can start to slow down and show signs of age, much like a car. But as with your automobile, there are steps to take that will minimize the creeping sluggishness and keep your laptop running as fast as possible for as long as possible. Here are a couple of easy steps you can take to keep your computer from slowing down.
Tip of the Week: Free Tool Lets You Play YouTube Videos on Repeat
For this week's tip we show you how to loop a youtube video. For more great tips and tricks visit our blog on Wednesdays.
How To Keep Your Employees From Leaking Confidential Information
Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. Their killer had used some standard techniques, but the most effective was getting an unwitting Code Space employee to help — likely via a phishing attack.