TDWI Articles

Understanding the Engineer’s Data Access Challenge

Data management has been focused on storage with access an afterthought. We must take the reverse approach, thinking in terms of data access first.

Data Digest: Spark v. Hadoop, Cloud Security, and Big Data Frameworks Rundown

Comparing big data frameworks, plus how to secure your cloud computing environment.

Divide and Control: Roles vs. Rules in Access Management

Role-based access control is the norm in many companies, but binding users to statically defined roles is an inflexible approach. Attribute-based control offers more opportunity and flexibility to get security right.

Data Digest: Machine Learning, BI in the 21st Century, and Analytics Battles Privacy

Can a robot perform analytics on big data, plus using modern tools to manage unstructured big data and data analytics vs. consumer privacy.

How to Increase Your BI Program's Value (Part 2 of 2)

Data is your enterprise's most valuable asset. Here are three ways to ensure you get the most from it.

How to Increase Your BI Program's Value (Part 1 of 2)

Why your data must be trusted, useful, integrated, and governed.

Q&A: Look to Data-Centric Security to Truly Protect Data

A security expert from Teradata explains how and why to focus security specifically on your data.

Q&A: Data-Centric Security Wraps Data in Layers of Protection

A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.

TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.