Comparing big data frameworks, plus how to secure your cloud computing environment.
- By Quint Turner
- March 14, 2016
Role-based access control is the norm in many companies, but binding users to statically defined roles is an inflexible approach. Attribute-based control offers more opportunity and flexibility to get security right.
- By Cass Brewer
- March 10, 2016
Can a robot perform analytics on big data, plus using modern tools to manage unstructured big data and data analytics vs. consumer privacy.
- By Quint Turner
- March 10, 2016
Data is your enterprise's most valuable asset. Here are three ways to ensure you get the most from it.
- By Wes Flores
- March 9, 2016
A security expert from Teradata explains how and why to focus security specifically on your data.
- By Linda L. Briggs
- March 4, 2016
A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.
- By Linda L. Briggs
- March 3, 2016
A look at how Hadoop and Spark do things differently (and extremely well), plus why sophisticated attacks require sophyisticated defenses and are personal clouds a good policy?
- By Quint Turner
- February 18, 2016
Use open source and open architecture to get the most out of big data, plus why big data projects are increasingly successful but sill not reaching their full potential. Also: preventing cyberattacks.
- By Quint Turner
- February 17, 2016