By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

TDWI Upside - Where Data Means Business

Best of Upside's Data Digest

Articles examine the pros and cons of IoT, legacy BI, IoT and analytics, jumping to new platforms and technologies, and IoT security.

Pros and Cons of IoT
(Source: Direct Marketing News)

The Internet of Things offers many opportunities for customer engagement, but before diving in, you should know what you are getting into. This article reviews major areas of concern from a marketing perspective, including how marketers might use the data and why security is such an issue.

Reassess Slow Legacy BI
(Source: CMS Wire)

Many enterprises have trouble letting go of legacy BI when they have been using the same analytics vendor for years. However, this article claims that it might be time to move on, and gives you a list of key factors to assess whether your BI solution should be updated.

Planning Analytics for IoT
(Source: Forbes)

The Internet of Things may not have connected everything in the world yet, but IoT devices will impact your industry. Your enterprise can get ahead of the curve by identifying the capabilities you will need to effectively work with IoT data. This article examines eight tactics or technologies to have in your plan today so you can have solid IoT analytics tomorrow.

Don't Jump to a Solution
(Source: CIO)

Enterprises too often jump aboard new platforms and technologies without taking the time to establish their true goals and problems, according to this article. The author advises against that culture and asks readers to slow down and prioritize before choosing a solution.

Real Insight Is in Granular Data
(Source: Information Age)

Legacy data mining tools were great for the job even five years ago, but the sheer scope of big data now makes them less than optimal. This article argues that large amounts of data must be examined at a very fine scale to get the best insights, so a new data-mining culture and new tools are required.

New Approaches Needed for IoT Security
(Source: TechCrunch)

This article explains why IoT security will require an approach that takes into account when data is vulnerable and how enterprises might more accurately monitor breaches.

About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.