What can you do to improve your organization’s use of information? Here are our top five tips for implementing big data effectively to make the most of your digital campaigns. More>>
Author: admin
Five Ways Cloud Services Can Soothe Security Fears in 2014
Enterprise use of cloud services grew tremendously in 2013, but perceived security shortfalls continue to be the biggest block for companies in adopting the services. Here are five topics that companies should discuss with their cloud providers in 2014, according to security experts. More>>
2015 Hadoop Summit – June 9-11, 2015, San Jose, California
Hortonworks and Yahoo! are pleased to host the 7th Annual Hadoop Summit, the leading conference for the Apache Hadoop community. This event, expanded now to three days, will feature many of the Apache Hadoop thought leaders who will showcase successful Hadoop use cases, share development and administration tips and tricks,
Top analytics technology stories from 2013
16.6 Million People Experienced Identity Theft in 2012
Cloud and BYOD Data Security Storm is Brewing
A new survey reveals that enterprises are rushing to employ cloud applications and mobile devices for mission-critical operations, but most do not have the proper controls in place to prevent data breaches, fraud, and other threats. More>>
Data Scientist: The Sexiest Job No One Has
2013 was the year of deliberate data breaches: Sophos
2013 demonstrated how data breaches now come in “new flavours” and that big companies are not the only ones losing customer records. More>>
Study: Privilege management policies unaltered after Snowden leaks
Computer Security Day: why you should care
Every year since 1988, Computer Security Day has asked us to take a look at how we protect our data online. But messing with other people’s information goes back a long way before that—a long way before computers, in fact. What’s regarded as the first hack actually happened 110 years