By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

RESEARCH & RESOURCES

Data Digest: Data Modeling and Business Value, Plus Data Recovery and Log Data

Data modeling isn't just about getting the right results; it's important to know when your model has "expired." Plus using log data as a security weapon and a look at disaster recovery techniques.

Business Value over Fame: Creating Predictive Models
(Source: Tech Target)

Creating a predictive model that accurately produces results can get its maker acclaim, but the real value of a great predictive model is the business value it provides. This article discusses certain aspects that modelers must pay attention to when building their models -- and when to know their model has “expired.”

 

Making Log Data a Proactive Security Tool
(Source: Information Week/Network Computing)

The potential of system log data has finally been realized as a monitoring tool. However, its current use is not quick enough to alert enterprises about problems or to findthe root of the problem in a timely manner. This article explains how to improve the speed of your log data to improve your enterprise monitoring.

 

Coming Back from the Brink with Disaster Recovery Techniques
(Source: Computer Weekly)

Disaster recovery is an often-overlooked aspect of security, possibly because the people in charge of security do not want to consider the possibility that their systems could be compromised. This article shows what online takeaway service Just Eat does to make sure they can recover any data lost.

- - -

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com

TDWI Membership

Get immediate access to training discounts, video library, research, and more.

Find the right level of Membership for you.