Blogs

4 steps towards achieving your analytics "yield of dreams"

4 steps towards achieving your analytics "yield of dreams"

June 4, 2015 | by Richard Christner, Partner, Business, Customer & Operations Strategy Consulting, IBM
In a recently published IBM Institute for Business Value whitepaper, a team of internal consultants discusses real examples of analytics projects at IBM. Lessons learned from these projects have led to a framework of four critical best practices that can help any organization build a solid...
The renaissance age of risk management

The renaissance age of risk management

May 29, 2015 | by Craig MacPherson, Worldwide Content Marketing Manager - Financial Services Sector, IBM Analytics
The governance, risk and compliance (GRC) sessions at IBM Vision 2015 kicked off with a thought-provoking keynote address: The renaissance age of risk management.
Who are today's analytics professionals?

Who are today's analytics professionals?

May 27, 2015 | by Pavel Abdur-Rahman, Senior Managing Consultant, IBM
Discover nine fields of study for corresponding data analysis professionals that contribute significantly to analytics projects, their key value propositions and challenges and high-level suggestions for categorizing and organizing the rapidly growing analytics resource pool.
A maturity model for big data and analytics

A maturity model for big data and analytics

May 26, 2015 | by Chris Nott, CTO Big Data & Analytics, IBM UK & Ireland, IBM
The speed at which executives expect data-driven insights is accelerating. How can organizations ensure that investments they make in analytics today will have the flexibility to cope with the demands of tomorrow? Successful outcomes require a business-driven approach, and the big data and...
Fight the cold cyberwar with analytics

Fight the cold cyberwar with analytics

May 21, 2015 | by Andrew Friedrich, Big Data, Analytics & Cyber Solution Leader, IBM
Malware, in and of itself, is not malicious; the cybercriminal behind the malicious code is the real culprit. Learn why a strategic, investigative shift in focus on both the cyberattack and the nefarious organizations behind them is necessary in today’s cyberwarfare engagement.
Trusting the ecosystem that sustains and maintains the Internet of Things

Trusting the ecosystem that sustains and maintains the Internet of Things

May 20, 2015 | by James Kobielus, Big Data Evangelist, IBM
Trusting the sometimes impersonal Internet of Things (IoT) will require pervasive, ongoing and implicit trust by society as a whole in IoT’s invisible ecosystem.
Apache Spark and the power of openness

Apache Spark and the power of openness

May 15, 2015 | by James Kobielus, Big Data Evangelist, IBM
The drive toward industry openness continues at full speed, and Apache Spark is expected to become one of the centerpieces of the big data industry fabric. As a closely aligned technology with Apache Hadoop, it stands to benefit from broad adoption of core open data platform technologies.
How to get started with data governance

How to get started with data governance

April 13, 2015 | by Paula Wiles Sigmon, Program Director for InfoSphere Portfolio Marketing
Among all the data-related opportunities and concerns of this year, one that is demanding increased attention is information governance. Governance is a concern because the growing business appetite for insights puts pressure on systems to deliver data rapidly, whether it is well-governed or not....
Bad data need not apply

Bad data need not apply

April 10, 2015 | by Paula Wiles Sigmon, Program Director for InfoSphere Portfolio Marketing
In an environment where lack of trust is common, the data warehouse challenge is not just finding the best warehouse technology, but also determining how to create a warehouse that instills confidence among the business users who receive the output of analysis.
Fight "Blacklist" criminals using real-time actionable intelligence

Fight "Blacklist" criminals using real-time actionable intelligence

March 26, 2015 | by Liesl Geier, Market Segment Manager, IBM
Describing intelligence software has gotten a whole lot easier as Hollywood continues to produce gripping spy shows like The Blacklist, Homeland and CSI. But while the layman description may have gotten easier, the real threatscape continues to evolve as criminal and terrorist networks continue to...

Pages