Sign up | Login with →

Data Management

exclusive

The Data Lake Debate: Questioning the Pro

March 27, 2015 by Anne Buff

The Data Lake Debate.

Technology is not the answer for every big data issue (well any data for that matter). I get it - Hadoop and the concept of data lakes are hot topics. However, just because they are trending in the world of technology does not mean that they will solve critical business issues such as taking full advantage of an organization’s data. I stand firm that data storage, data lake or any other type, is not the essential element for an organization to take full advantage of its data.[read more]

From Social Listening and Social Media Analytics to Social Data Intelligence

March 27, 2015 by Julie Hong

Christophe Folschette.

The early adopters who first saw the value of social listening and analytics were all communications specialists and early pioneers in digital marketing. But almost overnight, the sector exploded and went mainstream, across management silos in enterprises large and small, traditional and new. The birth of the digital native confronted corporates with a new set of challenges, and opportunities.[read more]

exclusive

5 Non-Standard Ways to Use Cloud Storage

March 21, 2015 by Terry Smith

Cloud storage.

We all get used that cloud storages like Dropbox and Google Drive serve one definite purpose: to keep our data online. Thus, we can easily add, remove, share access, open, or edit files and rest assured that the storage would backup and synchronize all our changes. This is a standard way to utilize a service like this. However, more advanced users are constantly finding new ways to benefit from certain cloud storage options. Have a look at five most non-standard tricks you can do with your Dropbox or Google Drive.[read more]

exclusive

You May Not Be as Anonymous as You Think

March 11, 2015 by Tamara Dull

The Big Data MOPS Series.

What may be classified as anonymous may, in fact, be pseudonymous. With pseudonymity, an ID or number of some sort is typically used to tie back to an individual – without revealing any PII, such as the person’s name.[read more]

exclusive

Abolish Daylight Savings Time

March 8, 2015 by Shawn Gordon

Daylight savings.

The time is long past to leave the anachronistic use of Daylight Savings Time behind us, and here is why. Ultimately, it is the arrogance of politicians that seem to think they are creating or giving you an extra hour of daylight, when in fact they are just controlling everyone's behavior.[read more]

exclusive

The Data Lake Debate: The Introduction

March 6, 2015 by Jill Dyché
2

Data Lake Debate column.

Will filling up your data lake will help or hurt the cause? On the one hand, a data lake full of raw, multi-structured, and heterogeneous data from across systems and business processes, could be the proverbial “single version of truth” that up until now had just been the unconsummated hope of many an executive.[read more]

exclusive

Hygienic Hadoop Data Lakes Not Just Happenstance

February 23, 2015 by Paul Barsch

Risky Business column.

If you work with Hadoop on a daily basis you already know that data cannot simply be dumped into Hadoop’s file system and be of high value to rank and file business users. To be sure, data management is crucial if you’re planning on Hadoop serving as a true lake or “hub” for all your organization’s data.[read more]

The Establishment of Data Preparation

February 22, 2015 by Mark Smith

Data prep.

Data preparation efforts often encounter challenges created by the use of tools not designed for these tasks. Many of today’s analytics and business intelligence products do not provide enough flexibility, and data management tools for data integration are too complicated for analysts who need to interact ad hoc with data. Depending on IT staff to fill ad hoc requests takes far too long for the rapid pace of today’s business.[read more]

Digital Risk Management: Why Cyber Security Measures Aren’t Enough

February 19, 2015 by Michael McQuinn

Cyber security.

Most companies of scale have cyber security measures in place – software solutions, policies and protocols, and regular assessments conducted by IT staff members around compliance and efficacy. With these measures in place, the executive management team might feel confident that their digital data is secure – until they’re blind-sided by crisis-inducing error or a data leakage event.[read more]

Joining Multiple Sources 101: Inner and Outer Joins

February 17, 2015 by Eran Levy

Multiple data sources.

Mashing up multiple data sources to generate a single source of truth is an integral part of data analysis. It allows you to compare and cross-reference records stored in different formats and locations, and to perform queries and calculations. This article will run you through some basic concepts in data analysis that you should become familiar with when joining data stored in multiple tables.[read more]

3 Ways to Get Your Customers to Share More Data

February 17, 2015 by Larisa Bedgood

Share more data.

Consumers are more likely to give up information when they receive something in return. While low-value data like contact information is easier to get, consumers are more willing to share higher value data such as preferences, hobbies, and interests when they receive something in return.[read more]

exclusive

PII, Anonymized Data, and Big Data Privacy

February 12, 2015 by Tamara Dull

The Big Data MOPS Series.

Did you know that most Americans (87%) can be uniquely identified from just three pieces of personal data: a birth date, five-digit zip code and gender? Sort of disconcerting, right?[read more]

How to Position Big Data

February 11, 2015 by Martyn Jones

Position big data.

Fueled by the new fashions on the block, principally Big Data, the Internet of Things, and to a lesser extent Cloud computing, there's a debate quietly taking please over what statistics is and is not, and where it fits in the whole new brave world of data architecture and management. For this piece I would like to put aspects of this discussion into context, by asking what 'Core Statistics' means in the context of the DW 3.0 Information Supply Framework.[read more]

exclusive

Why Are Mid-Market Companies Waiting to Embrace Big Data?

February 7, 2015 by Mithun Sridharan
1

Big insight.

Though many companies endorse the potential benefits of Big Data, very few are actually giving this development some serious thought. Particularly, many mid-market companies view this trend with much skepticism and closely seek confirmation from their risk affine industry peers. Among the numerous factors that hamper Big Data adoption in this sector, the most dominant is the Penguin Effect.[read more]

Are You Still Torturing Your Data?

February 2, 2015 by Timo Elliott

Torturing your data.

Are you still torturing your data to get what you want? There’s now a better way. The next generation of business analytics tools include more “magic“, — in other words, they automatically analyze the data for you and make default proposals for what you might find interesting.[read more]