Skip to main content

TDWI Articles

Data Digest: Spark v. Hadoop, Cloud Security, and Big Data Frameworks Rundown

Comparing big data frameworks, plus how to secure your cloud computing environment.

Divide and Control: Roles vs. Rules in Access Management

Role-based access control is the norm in many companies, but binding users to statically defined roles is an inflexible approach. Attribute-based control offers more opportunity and flexibility to get security right.

Data Digest: Machine Learning, BI in the 21st Century, and Analytics Battles Privacy

Can a robot perform analytics on big data, plus using modern tools to manage unstructured big data and data analytics vs. consumer privacy.

How to Increase Your BI Program's Value (Part 2 of 2)

Data is your enterprise's most valuable asset. Here are three ways to ensure you get the most from it.

How to Increase Your BI Program's Value (Part 1 of 2)

Why your data must be trusted, useful, integrated, and governed.

Q&A: Look to Data-Centric Security to Truly Protect Data

A security expert from Teradata explains how and why to focus security specifically on your data.

Q&A: Data-Centric Security Wraps Data in Layers of Protection

A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.

Data Digest: Hadoop and Spark, Personal Clouds, Cyberattack Defenses

A look at how Hadoop and Spark do things differently (and extremely well), plus why sophisticated attacks require sophyisticated defenses and are personal clouds a good policy?

TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.