By using website you agree to our use of cookies as described in our cookie policy. Learn More


Best of TDWI's Data Digest

nteresting articles we found on the Web focus on missteps with big data and self-service integration tools, data lakes, data virtualization, and the Pareto Principle and security practices.

The Six Missteps of Starting and Executing Big Data
(Source: Information Management)

Implementing big data strategies in an enterprise that is not already built for it can be difficult. Although some implementations have succeeded, others have failed, and this article presents six major reasons for failing to get big data up and running (and how to avoid those same traps).

Avoiding the Snags of Self-Service Integration Tools
(Source: Information Management)

Self-service data integration tools appear to give a lot of freedom to an enterprise, but there are thorns to this rose. How to handle these thorns without getting pricked is what this article is all about.

Making a Data Lake Requires Traditional Approach to Data
(Source: Tech Target)

Data lakes can be extremely useful, but many enterprises are struggling to bring out the full potential of them or data in general. This interview with a data warehousing expert examines the major issues enterprises have with data.

Solving Virtualization's Major Problems
(Source: Computer Weekly)

Virtualization is the future of the data center. However, to get to that future, it takes more than just storing all your data virtually and calling it a day. This article reviews the largest problems with virtualization and how to tackle each of them.

Making Open Source Work for Your Enterprise
(Source: CIO)

Open source tools have tremendous upside if used properly, though knowing what proper use of open source tools is might be hard to recognize. This article discusses the main areas your enterprise will have to work at to effectively utilize open source.

Prioritizing the Pareto Principle in Your Security Practices
(Source: Information Week)

The Pareto Principle is the idea that 80% of all effects come from 20% of all causes. This theory can be applied to cybersecurity practices because a small number of threats can cause the largest amount of damage. Yet, as this article explains, most security practices involve a large-scale defense that spends too much time on the mostly harmless malware instead of threatening attacks.

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at

TDWI Membership

Get immediate access to training discounts, video library, research, and more.

Find the right level of Membership for you.