The prostate is a walnut-sized gland located between the bladder and the penis. The prostate, along with the seminal vesicles, produces semen, which contains and nourishes sperm and is transported through and out of the urethra during ejaculation. This article focuses on what men can do to diagnose prostate cancer in its earliest stages. Six… Read more »
Spurred by dramatic growth of large consolidators, as well as many regional and local MSOs, consolidation continues to evolve and impact the collision repair industry. Let’s take a look at the numbers on acquisitions, valuations and markets.
Sixteen years ago, after David Roberts and his partner, Matthew Ohrnstein, founded Caliber Collision, he wrote a series of industry articles that were presciently accurate. His subject then? “Shop Consolidation: Is It Inevitable?” His answer was an emphatic “Yes.” Over a period of 8 years as Caliber’s Chairman, Roberts helped lead the initial capital raises and the acquisition of its first 37 shops. Now a leading investment banker in the Automotive Services industry with FOCUS Investment Banking, Roberts has a unique 20-year perspective on the industry. With the dramatic growth of the large consolidators as well as many regional and local MSOs, we asked Roberts to update our audience on consolidation developments, their impact on the industry and how consolidation continues to evolve.
Bring Your Own Device (BYOD) has been a catalyst for a new IT revolution. CNET TechRepublic’s BYOD Business Strategy Survey reveals that 62 percent of companies either allow Bring Your Own Device, or plan to by the end of 2013. However, the prospect of employees using their personal mobile devices to access corporate resources might… Read more »
Data masking, sometimes called de-identification, obfuscation, or redaction, is data security technology that is an ideal fit into an overall Governance, Risk Management, and Compliance (GRC) strategy. It’s an economical method for creating an inauthentic but structurally similar version of business data for use in user training or software testing, thus reducing risk. The data… Read more »
There Are No Firewalls. There Is No Inside Or Outside. We Are All Swimming In The Same Cyber Sea—With Sharks Circling. We Have No Protective Cage. Bottom Line: In The Realm Of Cyber, Nothing Is Secure. Cyber security experts have cried wolf before—and the sky is still standing. But we have finally reached the tipping… Read more »
While cloud adoption is standard in many industries today, there are still some sectors lagging behind. Typically, these reasons revolve around compliance, regulations, and governance. However, FOCUS is seeing potential opportunities on the horizon for companies and investors prepared to seize upon cloud opportunities in the financial services, utilities, and healthcare industries. “Cloud adoption is… Read more »
Large companies in regulated industries such as financial services and healthcare generate and consume reams of data about their customers, business operations, and the markets at large. Traditionally, these companies capture data in “information silos,” often with different legacy systems and formats leading to security issues. Improving data security requires major process changes, and automatically… Read more »
Most of us know someone—relative, friend, or colleague—suffering from dementia, a medical term that describes symptoms of impaired cognition (memory and thinking), behavior, social abilities, and daily functioning. Dementia isn’t a specific disease and can range in severity from mild to severe. It has many different non-reversible and reversible causes. Alzheimer’s, a progressive degenerative brain… Read more »
In April 2012 the JOBS Act became law. The main purpose of the Act was to stimulate development of new businesses in order to create more jobs. As part of the stimulus plan the SEC was directed to develop rules that would make it easier for entrepreneurs to access capital in order to launch and… Read more »