Sign up | Login with →

Big Data: The 4 Layers Everyone Must Know

July 29, 2014 by Bernard Marr

The Big Data Guru column.

There is still so much confusion surrounding Big Data. I thought it might help to clarify the 4 key layers of a big data system - i.e. the different stages the data itself has to pass through on its journey from raw statistic or snippet of unstructured data (for example, social media post) to actionable insight.[read more]

How to Make Your Department More Data-Friendly

July 30, 2014 by Rishi Shah

Making data accessable. 

Big data is doing big things – or it isn't. That's the general sentiment across all industries when it comes to the topic and many professionals are coming up against the same questions: Is big data worth it? Does it produce ROI? Is it just a phase? Will data become an asset? Who are the major players? Does any of it matter?[read more]

Understanding User Expectations

July 30, 2014 by Lyndsay Wise

What do users expect?

Self-service access to analytics is becoming a key component when trying to expand BI and analytics access throughout the organization. For SMBs, this is especially important. Organizations need access to information that is relevant to business pains being experienced and to plan for the future.[read more]

Answer to OTP Bypass: Out-of-Band Two-Factor Authentication

July 30, 2014 by Thu Pham


Ultimately, OTP-based two-factor authentication using SMS just isn’t the best solution, as shown in these bypass scenarios. And that’s exactly why Duo Security has designed a more secure out-of-band authentication solution to outpace remote attackers and protect against threats that many older, legacy two-factor authentication solutions cannot.[read more]

Fraud Prevention and Customer Experience Management: How Banks Leverage Real-Time Analytics to Achieve a Balance

July 29, 2014 by Dale Skeen

Banks and real-time analytics.

The key takeaway here is that real-time analytics empowers banks to respond to the threat of a large-scale third party breach quickly, decisively and individually, thereby protecting the integrity of hassle-free fraud protection and mitigating losses. It’s good for the bank, and it’s good for customers.[read more]

How to Solve Data Fragmentation, or Why to Invest in a Distributed Data Warehouse

July 29, 2014 by Tracey Wallace

Data fragmentation.

A distributed data warehouse is a data concierge service for large companies, at which data platforms and services are fragmented, causing an inability to scale any data-driven strategies across the board. It’s about collecting big data ethically, storing it securely, making it understandable and accessible for all teams, and then putting actionability to it with ease, so that no one ever has to wait to make their data useful.[read more]

Signs Your Technology Is Outdated

July 28, 2014 by Kyle Cebull

Outdated technology.

It’s no secret that your customers and employees want an innovative experience with your company’s technology. Outdated technology can seriously impact employee happiness and productivity, not to mention the affect on your bottom line.[read more]

Big Data Analytics: 80/20 Rule Isn’t Good Enough

July 28, 2014 by Amir Dekel

80/20 rule.

The other day I was speaking with one of the top three global wireless CEO’s about big data. He said he had asked five other CEO’s at his level if they had seen the returns in big data that they expected. All five said they hadn’t seen enough returns to justify their investments.[read more]

IBM to Power California State’s CalCloud

July 28, 2014 by Natalie Lehrer


IBM will provide Infrastructure-as a-Service to the State of California, with a private-public cloud service called CalCloud. The State of California will be the first State in US to have a private cloud specifically for government agencies and municipalities. IBM landed on this deal after losing the $600 million CIA deal to Amazon last year.[read more]

How Machine Learning Is Improving Computer Security

Machine learning.

Machine learning is already a common part of security measures. Spam mail filters are one simple example, but other systems exist like antivirus software, intrusion detection programs, and even credit card detection codes. There is much progress still to be made, but machine learning is at the forefront of raising computer security to a new level. With machine learning properly deployed, business leaders can rest easy knowing their data is more secure.[read more]


3 Organizations That Can See the Future with Predictive Analytics

July 26, 2014 by Michele Nemschoff

Predictive analytics.

The ability to foresee the future would certainly be the ultimate competitive advantage. In reality though, no business has a crystal ball for making critical decisions. That’s why all critical business decisions have always carried a certain amount of risk. This risk has always and will always be part of the competitive game.[read more]

New Underground Data Center Trend Takes Hold

July 25, 2014 by Rachel McAree

Underground data center.

Recently, data center operators have been looking for new ways to establish computing facilities. One such example is the July purchase of the former Chicago Sun-Times building by QTS Realty Trust Inc. According to the Post-Tribune, the newspaper printing plant will be repurposed and rehabilitated to make way for a multi-tenant data center.[read more]

BYOD: Industry Experts Pick Their Top Advantages

July 25, 2014 by Jon Smith


What is BYOD? The trend for employees to use their own personal devices for work. This generally refers to smartphones and tablets. CompTIA’s Annual Trends in Enterprise Mobility shows that while just 4% of UK firms have a full BYOD policy, some 44% have a partial strategy in place.[read more]

America’s Favorite Pastime is Having a Data-Driven Renaissance

July 24, 2014 by Samantha Meckler

Baseball stadium.

Though live experiences are where sports fandom was born, the digital universe is what helps keep that fandom alive. So sports teams, leagues and venues are all charged with the task of owning and controlling the billions of data points collected each day when fans purchased merchandise, bought tickets, interact with a website, an app, a campaign, a social page, etc.[read more]

Pageviews are Dead, Engagement is King

July 24, 2014 by Tracey Wallace

Which analytics matter?

The pageview as a metric is dying a slow death, and you need little more than to keep your eye on the new digital "disruptors" to see the once hailed metric's downfall. Let's first define "disruptor," because not all new digital ventures are such. In order for a disruptor to truly disrupt, the created revenue stream, if or when there is one, needs to flow to different pockets than those previously worn by the legacy brands.[read more]

How Social Intelligence Can Identify Weak Points in Your Customer Journey and Drive Decision-Making

July 24, 2014 by James Ainsworth

Customer journey.

Taking an ineffective approach to social media leads to either shallow inferences from the data or a general lack of awareness about its effects on the business. This prevents understanding of current opportunities, how to explore them and how to mitigate the current threats and risks.[read more]


If You Think Data Security is IT’s Responsibility, Think Again

July 23, 2014 by Tamara Dull

The Big Data MOPS Series.

What does Ebay, Living Social and Adobe have in common? These companies, among countless others, have all experienced a significant data breach in the last year. While these breaches have cost millions of dollars to fix, they’ve also cost some executives their jobs. If you don’t think data security is important, especially in this new age of big data, think again.[read more]