TDWI Articles

How to Increase Your BI Program's Value (Part 2 of 2)

Data is your enterprise's most valuable asset. Here are three ways to ensure you get the most from it.

How to Increase Your BI Program's Value (Part 1 of 2)

Why your data must be trusted, useful, integrated, and governed.

Q&A: Look to Data-Centric Security to Truly Protect Data

A security expert from Teradata explains how and why to focus security specifically on your data.

Q&A: Data-Centric Security Wraps Data in Layers of Protection

A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.

Data Digest: Hadoop and Spark, Personal Clouds, Cyberattack Defenses

A look at how Hadoop and Spark do things differently (and extremely well), plus why sophisticated attacks require sophyisticated defenses and are personal clouds a good policy?

Data Digest: Big Data Requirements, Big Data Project Success, and Fighting Cyberattacks wtih Threat Intelligence

Use open source and open architecture to get the most out of big data, plus why big data projects are increasingly successful but sill not reaching their full potential. Also: preventing cyberattacks.

Five Key Elements Your Data Governance Business Glossary May Be Missing

The average data definition doesn't have all the answers to users' questions. To get more information, add one of these five key elements to your organization's data governance business glossary.

Data Digest: Access and Hacking, Finding the Right Agile Method, and Using Competitive Intelligence

Why major security breaches happened and how to stop them in your own enterprise, plus finding the right agile method and using competitive intelligence to stay afloat.

TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.