Big data isn't just about growing data volumes or integrating new data sources. Human beings need to interpret the results of big data and build trust in the data. More>>
Articles
Symantec report finds small businesses battered by cyber crime
Cyber criminals are increasingly targeting small businesses due to their less sophisticated defenses, according to a new report from Symantec. Symantec’s Internet Security Threat Report 2013 , released in April 2013 says that companies with 250 employees or less absorbed 18 percent of targeted cyber-attacks in 2011, but the figure jumped
7 misconceptions about cloud computing that could be holding your business back
Is cloud computing a fad? Is it complicated and meant for only big companies? Is it costly and will become useless when there’s no Internet connection? Is it true it’s not as secure as conventional data centers? Though it has been projected as an unreliable and risky approach to storing your
5 strategic tips for avoiding a big data bust
Privacy and data protection governance in five steps
Data is the lifeblood of any business. However as the volumes explode, it becomes a herculean task to protect sensitive data and prevent privacy infringements. Companies must understand the laws, regulations and standards for privacy and data protection, as well as ensure compliance with those rules. But where do you go
Your Data: Managing Gigabytes, Terabytes and Beyond
When talking computer disk space most people are familiar with the term gigabyte (GB). Disks are usually sold with some multiple of gigabytes available. However, terabytes of data are becoming more common particularly when formed by RAID or the joining of disks to create arrays. But what comes next? Well, there is
3 Outside Forces That Will Impact Database Management
Will Privacy Laws Ruin Your Big Data Plans?
Safeguards against Data Security Breaches (Part One)
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to hacking, malware and other potential risks. Concerns about security, trust and PII, personally-identifiable information, are all taking center stage