TDWI Articles

Best of Upside's Data Digest

Articles examine analytics tools, hackers and big data, requirements for data lake success, minimizing password risk, and an overview of fog computing.

How BI Tools Boost Analysis (Source: Information Management)
It seems straightforward enough, but this article explains four major ways BI tools boost an enterprise's analysis capabilities.

Hackers' Big Data Abilities Rising (Source: Datanami)
Analytics techniques are not only used by the good guys. This article reveals that hackers have upgraded big data systems for stealing and mining data more easily, and enterprises must keep pace in order to stay secure.

Requirements for Data Lake Success (Source: Datanami)
This article focuses on solving integration and governance challenges for data lakes.

Minimizing Password Risk (Source: Information Age)
Phishing and "honeypot" scams have suckered many people out of their passwords. This article explains how mobile authentication can help keep consumers safe.

An Overview of Fog Computing (Source: Forbes)
The cloud is already old news. The next trend -- fog or edge computing -- is primed to take over; this article explains why.

Avoid Alienating Customers with Data Collection (Source: IT Pro Portal)
Using big data for marketing can encourage enterprises to target customers too well or to collect too much data. Either way, using data poorly can irritate your customers, but this article contains three steps to collect and use marketing data effectively.

About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.