You want to implement data democratization, so you deployed all the new tooling and data infrastructure. You have a data catalog to manage metadata and ensure data lineage and a data marketplace to enable data discovery and self-service analytics. You’ve invested in the latest technologies to enable full self-service operation. The data management architecture you […]
Understanding the Importance of Data Resilience
In recent years, the frequency and sophistication of cyberattacks have surged, presenting a formidable challenge to organizations worldwide. The proliferation of interconnected devices, growing dependency on cloud services, and the shift to remote work have introduced new vulnerabilities, creating more opportunities for cybercriminals to exploit. My company’s 2024 Data Protection Trends report revealed that 75% of organizations experience […]
How Data Is Used in Fraud Detection Techniques in Fintech Business
In the rapidly changing world of financial technology (fintech), fraud is a developing area seething with vigor. Digital banking and online financial services are booming every day, bringing with them new techniques for thieves to ply their trade – not ones that can be easily dismissed. Fintech firms must now relentlessly deploy data and artificial intelligence […]
The Role of Data Security in Protecting Sensitive Information Across Verticals
Data is the fuel that keeps the engine of any organization running efficiently. Its growing importance is becoming a frequent topic of conversation in boardrooms and strategy meetings. Companies increasingly know the need to protect their sensitive information and continue investing heavily in cybersecurity measures. However, this approach has a critical oversight: The assumption that […]
Ask a Data Ethicist: What Should Be the Limits of Biometric Data Collection in the Workplace?
There’s a movement underway to capture an increasing amount of data about employees – from facial recognition or fingerprint systems used for tracking time and attendance, to systems that monitor your every keystroke. All of these invasive data collection technologies raise this question: What should be the limits of biometric data collection in the workplace? […]
Answering the Build vs. Buy Question for Generative AI
Building custom generative AI (GenAI) technology solutions is the best way to gain a competitive edge by leveraging GenAI tools and services tailored to your business. On the other hand, building GenAI models from scratch is a costly and complicated endeavor – which is why many businesses instead settle for a genAI strategy wherein they […]
Generative AI Is Accelerating Data Pipeline Management
Data pipelines are like insurance. You only know they exist when something goes wrong. ETL processes are constantly toiling away behind the scenes, doing heavy lifting to connect the sources of data from the real world with the warehouses and lakes that make the data useful. Products like DBT and AirTran demonstrate the repeatability and […]
Data Backup Essentials: Zero Trust Strategies for System Administrators
Time is always of the essence in the case of system administration and IT operations teams. They address the countless issues coming in from other departments: “My network is acting funky, and I’m about to go on a meeting with an important client,” “I accidentally deleted every important email I have ever received from the […]
Mind the Gap: Start Modernizing Analytics by Reorienting Your Enterprise Analytics Team
… and your data warehouse / data lake / data lakehouse. A few months ago, I talked about how nearly all of our analytics architectures are stuck in the 1990s. Maybe an executive at your company read that article, and now you have a mandate to “modernize analytics.” Let’s say that they even understand that just […]
The Data Governance Wake-Up Call From the OpenAI Breach
Shockwaves reverberated throughout the political and tech ecosystems this summer when OpenAI – the creator of ChatGPT – admitted it had been breached. The breach, which involved an outsider gaining access to internal messaging systems, left many worried that a national adversary could do the same and potentially weaponize generative AI technologies. National security aside, the […]