TDWI Articles

IoT Vulnerable to DDoS

A new report from Neustar claims that companies employing IoT devices are not as focused on their security as they should be.

Data Digest: Implement Real-Time Analytics, Good Data Governance, and Data Security Policies

Learn the major barriers to implementing real-time analytics, why data governance policies are key to implementing big data, and how to use better data security policies to restore employees’ trust

Evaluating Master Data Management Technology

Choosing a vendor for master data management? Use these seven criteria to match available tools to your enterprise's needs.

Do You Understand the Knowns and Unknowns in Your Data?

Effective data preparation depends on recognizing how to handle what we know and what we don't know about a set of data. Our goal as analytics professionals is to make less unknown and more known.

Data Digest: Marketing, Analytics, and Security in IoT

The spread of the Internet of Things will affect every part of your enterprise. Learn the benefits for marketing, what new techniques you’ll need for IoT analytics, and new ways to think about IoT security.

Data Digest: Advice on IoT Security and Moving to the Cloud

Read IoT security advice offered by an open source foundation and by technology executives, plus how to determine whether you should be in the cloud.

Data Digest: Data Visualizations, Data Governance, and Cybersecurity

Learn the benefits of data visualization, what to focus on in your data governance plans, and 7 cybersecurity myths.

Transition Point: Integrating Hadoop into the Enterprise

Although many are moving toward broader adoption of big data for enterprise use, barriers and concerns remain. Is Hadoop part of your enterprise’s plan for modernization?

TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.