While it’s easy to get caught up in all the excitement and opportunity of big data, it’s also easy to forget that it’s still affected by the same problems as any other data. Data breaches don’t distinguish between big or “small” data – if there’s value in the data, everything is fair game for
You rely on the data warehouse for business-critical reporting and analysis. The warehouse has become the workforce engine powering business decisions and driving results. It is a central repository created by integrating data from one or more disparate sources such as applications, databases and
Mike Martin may be the only IBM Champion with an album currently available on iTunes. Based in the Philadelphia area, Mike and his band, Lo-Fi Genius, recorded an album, This is Rocket Science, including the song, “George Wendt Lives in My Building.” After all, George Wendt really did live in Mike
Conversations around big data are shifting from "what is big data?" to "what can I do with big data?" Five key use cases have emerged that hold high potential value for many organizations. Eric Sall, vice president of product marketing at IBM, describes those high-value uses for big data. For
To aid in the detection of stealthy threats that can hide in the increasing mounds of data, IBM announced IBM Security Intelligence with Big Data, combining leading security intelligence with big data analytics capabilities for both external Cyber Security threats and internal risk detection and
Big data environments create significant opportunities along with security challenges. There are risks and threats to the repositories containing data, much of which is financial, personal, intellectual property or sensitive data and subject to compliance regulations. Learn tips on how to secure
In the first ever Gartner Magic Quadrant for Data Masking, IBM InfoSphere Optim Data Privacy Solution was named a leader, receiving the best ranking in the ability to execute and completeness of vision categories compared to competitors.
Earlier this week, IBM unveiled its yearly "5 in 5" list - five predictions that forward-thinkers expect will come to be within five years. This year's list envisions computers that will literally "touch" us, as well as see, hear, taste and smell. As Popular Science put it, "Siri suddenly seems
The rise of social media, the cloud, mobility and big data are making threats harder to identify and exposing important information. For businesses and governments, improved data security and privacy should be on the “new year’s resolution” list.
Why big data doesn’t have to mean big security challenges
What is big data?
Big data spans four dimensions: volume, velocity, variety and veracity.
Volume: Every day 2.5 quintillion bytes of data are generated from new and traditional sources including climate sensors, social media sites,