Upside


Data Digest: Data Lakes versus Streams, Legal and Security Problems for Big Data

Read about the relative benefits of data lakes and data streams, how to avoid discriminatory results in big data analytics, and how to improve security for your big data environment.

Data Digest: Secure IoT Devices, Create Big Data Strategy, Lead an IoT Project

Learn how to protect your enterprise from growing IoT security issues, how to create a big data strategy, and 10 things to consider when leading an IoT project.

Marketing IT In-House: Ease the Information Overload

Repetitive messages can be hard to notice and remember. Learn how to send them or you'll be wondering if your BI users have memory loss.

Perspective: What Makes "Analytics" Analytics?

As we contemplate a future in which machines produce analytics insights, remember that no combination of technologies and methods can replace the human capacity for curiosity and wonder.

Is Data Quality Stuck in the Dark Ages?

IT decision-makers weren't confident in the quality of their data 20 years ago, and they still aren't hopeful in 2016. Far from it, according to a new survey.

Analysis: Microsoft [Hearts] Spark for Powering Big Data, Analytics

At this week's Spark Summit in San Francisco, Redmond announced the official availability of Spark for Azure HDInsight. It’s not just a commercial, supported Spark cloud service, however. The company is preparing a slew of Spark-related goodies as well.

Data Stories: Mapping Immigration, Elections, and Floating Garbage

Use these maps to investigate how immigration changed over time, how ocean currents collect floating material, and consider how you might visualize a potentially misleading data set.

Data Digest: Data Storytelling, Open Source Security, Shadow IT

Learn 4 best practices for data storytelling, how to manage legal and security dangers with open source software, and how properly monitored “shadow IT” can actually benefit your enterprise.

Data Digest: Protect Your Enterprise and Understand the Cloud

Learn how to protect your enterprise from shadow IT solutions, how to secure your network by securing your endpoints, and how to evaluate the full value of cloud computing.