Best of TDWI’s Data Digest
Interesting articles we found on the Web focus on preventing big data disappointments, slow adoption of big data by the U.S. government, stranded data scientists, and securing mobile devices.
Breaking Through Big Data Disappointment
(Source: I Crunch Data News)
As more enterprises adopt big data practices, more CIOs are getting disappointed with their enterprise’s inability to get a good ROI on big data. These disappointments have turned into disillusionment, and it is difficult to put forth a big data initiative and have it accepted now. This article explains what led to this dissatisfaction and how to avoid those pitfalls.
The Slow Adoption of Big Data by the Feds
(Source: Unisys)
Big data is turning from being the future in enterprises to being the present. However, areas where you would expect rapid adoption of such practices, such as government agencies, are rather slow on the uptake. This new survey from Unisys reveals only 16 percent of all federal agencies fully implementing big data practices and that just 40 percent of all agencies even have big data practices.
Don’t Strand Data Scientists on an Island
(Source: Tech Target)
Data scientists are an invaluable asset in the enterprise, but they cannot do everything by themselves, especially, as this article discusses, something as important as predictive analytics models -- which should be done as collaborative projects rather than alone.
The New Era of BI and Analytics
(Source: Database Trends and Applications)
For the rest of the modern world, the adoption of BI and analytics has reached a tipping point. Now everyone is becoming a data analyst in some capacity. This article covers the shift after the tipping point was reached as well as the future of an era in which these capabilities are completely ubiquitous.
Locking Down and Securing Mobile Devices
(Source: Tech Republic)
Cybersecurity spending is at an all-time high but security itself feels like it is at an all-time low. The main cause of this is the ease of hacking mobile devices. The author of this article interviews a cybersecurity employee about ways to better secure mobile devices through two-factor authentication and endpoint security.
Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.