Sign up | Login with →

All Posts

Data Controls and Customer Loyalty: How Big Companies Keep Clients

July 16, 2014 by Kristen Paral

Data controls and customer loyalty.

Data controls may go hand-in-hand with maintaining accurate financial information and compliance reports, but IT leaders from some of the nation’s biggest enterprises say they also use controls for something else: Customer retention.[read more]

Get Deep Audience Intelligence Where It Matters: From Your Ads

July 16, 2014 by gennaro leo

Deep audience intelligence.

Intelligent ads are truly transformative across the sales landscape. The additive value of rich audience analytics accompanied with pure ad performance "metrics" allows our partners to articulate the premium value of their audiences and enables them to tell much more comprehensive stories in sales pitches.[read more]

exclusive

3 Ways Big Data Is Changing Financial Institutions Forever

July 15, 2014 by Bernard Marr
1

The Big Data Guru column.

Big data and financial services are natural match – after all, with nothing to manufacture, and no physical product to sell, data is the bedrock the industry is built on. On top of that, most of their business is quantitative – they mainly deal in good old-fashioned numbers – the simplest data to record and analyse.[read more]

exclusive

Businesses Learn the Hard Way When It Comes to Cyber Attacks

July 15, 2014 by Christian Crank

Cyber attacks.

When it comes to how businesses are approaching cyber security, most know what to do in the event of a cyber incident, defending against phishing and social engineering attacks is priority, and concern over company web facing applications is high, according to a recent survey by TrainACE, a cyber security training organization.[read more]

Data Collection 101: Where Is Your Data Coming From?

July 15, 2014 by Tracey Wallace

Where is your data coming from?

Data verbiage is confusing at best and nonsensical at worst. Big data implies little other than amount. Identity data implies little more than behavior. And data scientist implies little else than data mining which implies an abundance of code and algorithms, to say the least.[read more]

exclusive

The Rule of Three Works for IT

July 14, 2014 by Paul Barsch

Risky Business column.

The rule of three is a teaching, writing or presenting device where a key concept is broken into three easy to remember pieces. Does the rule of three apply to the fields of technology and business? Going forward, let’s be sure to use more tricolons in our training materials, internal presentations and customer whitepapers.[read more]

Is There One "Right" Strategy to Implement Business Intelligence?

July 14, 2014 by Ray Major

How do I implement BI?

o avoid disappointment, plan on a BI strategy full roll out to take not just a few months, but more in the range of 1-2 years. Provide new capabilities in stages, or phases. This allows your users to acclimate to the new way of doing business, and provide feedback on a contained functionality set.[read more]

exclusive

Retail is Dead. Long Live Retail!

July 14, 2014 by Charles Settles

Using data for retail.

Walmart has several strategies to grow their ecommerce operation. Their distribution system is already the model upon which others are built — including Amazon’s. They have already been leveraging their supply chain management system, built on collaborative, vendor-managed inventory, to secure their place as the largest retailer in the world.[read more]

Schlaaaaand! A Data-Driven Prediction of the FIFA World Cup 2014 Final Germany vs Argentina

July 13, 2014 by Kalie Moore

FIFA World Cup 2014 Final.

Schlaaaaand! A Data-Driven Prediction of the FIFA World Cup 2014 Final Germany vs Argentina. So what kind of final can we expect this Sunday? Let’s break down the stats of both teams during previous games this World Cup.[read more]

exclusive

For the Greater Good: Cops Embracing Google Glass

July 12, 2014 by Philip Cohen

Cop wearing Google Glass.

At least two law enforcement agencies are trying or plan to try Google Glass so far. The New York City police department acquired a few pairs to try out, and a number of law enforcement and other government agencies in Massachusetts are interested in the program.[read more]

exclusive

Who Owns the Data? Well, It’s Complicated

July 11, 2014 by Tamara Dull

The Big Data MOPS Series.

I don’t know if Edward Snowden – the NSA contractor turned whistleblower currently living in exile - is a hero, traitor or a schmuck. What I do know is that he has brought the data issue much closer to home for me as a consumer and a U.S. citizen. It has left me scratching my head and wondering, “Who owns my data, anyway?”[read more]

Stream vs. Batch Processing: Which One is the Better Business Operations GPS?

July 11, 2014 by Dale Skeen

Stream vs. batch processing.

Many organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries.[read more]

Is Big Data Good or Evil?

July 11, 2014 by Bill Franks

Analytics matters.

With all of the lawsuits working through the courts and all of the scary possibilities being discussed in the media, it has led some people to assume that big data is inherently evil. Once you believe that big data is evil, a natural response is to try and shut down the collection and analysis of big data to the maximum extent possible. While big data certainly has risks, it would be a classic case of throwing out the baby with the bathwater if the use of big data is shut down.[read more]

exclusive

Data Infrastructures

July 10, 2014 by Hallam Stevens

Data infrastructures.

It is obvious to say that big data rely on computers. It would be practically impossible to implement big data algorithms with pencil and paper – it would just take too much paper and too long to write all the data down. Data infrastructures - the software and hardware that holds our data - have histories that affect what big data can be and what we can do with it.[read more]

exclusive

4 Things You Should Know About Operation Clandestine Fox

July 10, 2014 by Philip Cohen

Operation Clandestine Fox.

At the end of April, computer security firm FireEye discovered a flaw in the Microsoft web browser Internet Explorer. If hackers are able to exploit this flaw, which the security firm has dubbed Operation Clandestine Fox, it could lead to the entire computer being compromised.[read more]