September 30, 2014
It’s pretty clear by now: data is the new natural resource. I spent the last two days at IBM’s Chief Data Officer (CDO) Strategy Summit, along with 120 participants, most of which were CDOs, de-facto CDOs and future CDOs. We can all certainly see why this new role is rock star material, but what about the reality of the role today?
September 29, 2014
When big data involves personal data, the principles of data protection still apply. This is not just a compliance issue—it’s about fairness, transparency and trust. Getting data protection right helps organizations to realize the benefits of big data.
September 26, 2014
Before business users can start to analyze data and consider the next best actions to improve results, it is typically required to submit a request for the data. Depending on the backlog of requests to IT, the business user might have to wait days, weeks or more before moving ahead with analysis and action. How do you overcome this constraint?
September 22, 2014
The emerging role of the chief data officer (CDO) was a key topic discussed at the UK Data Governance Forum’s second annual seminar held in London this September. At the seminar, representatives from organizations across many industry sectors addressed the increasing importance of data, the rise of the CDO role and the necessity for successful information governance in generating business value from data.
September 19, 2014
It seems that everyone these days is interested in big data: using more data, more quickly and making better decisions from it. How does your company interact with data? Or, more specifically, how do business users interact with data?
September 18, 2014
The Internet of Things (IoT) continues to gain momentum as organizations explore the opportunities and challenges around connecting the unconnected—from people, to devices and everything in between. These efforts will also significantly expand the volume of captured data. Learn how you can securely combine structured, unstructured, TimeSeries, spatial and other sensor data from the Internet of Things into a single source of intelligence with the Informix Warehouse Accelerator.
September 15, 2014
Hackers claimed to have released a list of five million Gmail usernames and passwords this past Thursday, resulting in coverage of yet another high profile data breach in the news. Who was responsible for the leak: Google or its users? What does this incident teach us about the public view on companies’ digital security?
September 12, 2014
Apple’s product reveal on Tuesday introduced thrilling new capabilities in mobile. The launch of their Apply Pay program will allow iPhone users everywhere to forego credit cards. Management of this type of sensitive big data requires dependable information governance measures from the start. What is Apple doing to protect its users’ financial information?
#IoTChat with Ovum's Gary Barnett
September 3, 2014
The “Internet of Things” (IoT) describes the phenomenon of “ubiquitous connectivity” with physical objects, made possible by the widespread use of sensory devices and wireless technologies throughout our environments.
September 3, 2014
When I think back to last year’s Information on Demand (now Insight) conference, one customer story in particular comes to mind: Memorial Healthcare System’s uncovering of vendor fraud, a bid rigging scheme and a potential staff risk in what began as an effort to simply streamline and improve the accounts payable process. When this routine investigation turned ugly, it became apparent that there was a real need for attention to fraud identification and reduction in all businesses today.