By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

TDWI Articles

Data Digest: Big Data Requirements, Big Data Project Success, and Fighting Cyberattacks wtih Threat Intelligence

Use open source and open architecture to get the most out of big data, plus why big data projects are increasingly successful but sill not reaching their full potential. Also: preventing cyberattacks.

Big Data Requires Open Source and Open Architecture Together
(Source: Data Center Knowledge)

Big data is far too large for there to be a choice between using open source or open architecture. Rather, the only option is to use open source and open architecture to get the most out of big data, as this article persuasively argues.


Big Data Projects Increasingly Successful but Not Reaching Full Potential
(Source: CIO)

As with the expansion of big data, so too is the expansion of enterprises adopting big data practices. A recent study found that most adopting enterprises (72 percent) have had their projects exceed expectations, yet not all that data is being harnessed. This article shows that enterprises still have yet to unlock big data’s full potential, but it is close to happening.


Be Prepared for Cyberattacks with Better Threat Intelligence
(Source: Computer Weekly)

It turns out that most cyberattacks do not occur in a vacuum: rather, they generally come in response to global events. Your enterprise, the study in this article explains, needs to react to the event faster than the attackers in order to protect it fully.

About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.