Conversational User Behavior Analytics

Since the dawn of shared computing people have pushed to expand the envelop of productive group thinking. What once took an army of engineers and mathematicians a week to compute could be done in minutes, then in seconds, then in milliseconds, and now virtually instantaneously. And with that expanded envelop of productivity has come an explosion of data to be mined, analyzed, sifted, and reorganized into yet greater productivity. Shortly after the dawn of shared computing another interesting phenomenon developed: insider threats.

Sponsor: Veriato, Inc.