 
                    
                                        
		            
                    Comparing big data frameworks, plus how to secure your cloud computing environment.
                    
			            - By Quint  Turner
- March 14, 2016
 
            
                
	                 
                    
                                        
		            
                    Role-based access control is the norm in many companies, but binding users to statically defined roles is an inflexible approach. Attribute-based control offers more opportunity and flexibility to get security right.
                    
			            - By Cass  Brewer
- March 10, 2016
 
            
                
	                 
                    
                                        
		            
                    Can a robot perform analytics on big data, plus using modern tools to manage unstructured big data and data analytics vs. consumer privacy.
                    
			            - By Quint  Turner
- March 10, 2016
 
            
                
	                 
                    
                                        
		            
                    Data is your enterprise's most valuable asset.  Here are three ways to ensure you get the most from it.
                    
			            - By Wes  Flores
- March 9, 2016
 
            
                
	                 
                    
                                        
		            
                    A security expert from Teradata explains how and why to focus security specifically on your data. 
                    
			            - By Linda L. Briggs
- March 4, 2016
 
            
                
	                 
                    
                                        
		            
                    A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.
                    
			            - By Linda L. Briggs
- March 3, 2016
 
            
                
	                 
                    
                                        
		            
                    A look at how Hadoop and Spark do things differently (and extremely well), plus why sophisticated attacks require sophyisticated defenses and are personal clouds a good policy?
                    
			            - By Quint  Turner
- February 18, 2016
 
            
                
	                 
                    
                                        
		            
                    Use open source and open architecture to get the most out of big data, plus why big data projects are increasingly successful but sill not reaching their full potential.  Also: preventing cyberattacks.
                    
			            - By Quint  Turner
- February 17, 2016