Advertisement

In Exchange for Sharing Data, Customers Expect a Personalized Experience – Not Irrelevance

Consumers regularly receive information that is irrelevant to their current interests or situation – and they’re none too pleased. According to a recent survey commissioned by my company, 70% of consumers surveyed said they receive mistargeted information at least once a month, and 24% say they receive mistargeted information, such as inaccurate promotional emails or irrelevant […]

How Developers Can Strengthen Data Security with Open Source and PKI

In the never-ending battle between business success and cybersecurity threats, enterprises have discovered a secret weapon. Developers, once the scourge of security teams, are becoming vital proponents of secure software. By tapping into open-source tools and public-key infrastructure (PKI), many developers are bringing data security into the earliest stages of development and taking greater responsibility […]

Why Digital Transformation and Data Integration Are Natural Enemies – and How That Can Change

Digital transformation represents the ultimate best practice of the modern era – it signifies ongoing change driven by technological advances and expanded capabilities, helps companies and employees exceed their perceived potential, and constantly raises the bar on competition and performance. And, of course, optimal data management is at the heart of that evolution. So why does it seem […]

Top Cloud Security Challenges and How to Overcome Them

Cloud security is composed of a set of policies, controls, processes, and technologies that work together to protect cloud-based infrastructure, systems, and data. These security measures are configured to protect data, support regulatory compliance, protect customer privacy, and set authentication rules for individual users. Cloud security is a critical consideration as organizations migrate workloads to the […]

A Root-Cause Framework for Trans-Atlantic Data Privacy

When the United States and the European Commission together announced a new Trans-Atlantic Data Privacy Framework earlier this year, the news didn’t raise too many eyebrows. After all, there’s nothing particularly objectionable about the new framework – the goal is to “foster trans-Atlantic data flows” and address concerns about the underlying EU-U.S. Privacy Shield framework, and who […]

A Primer to Optimizing Your Apache Cassandra Compaction Strategy

When setting up an Apache Cassandra table schema and anticipating how you’ll use the table, it’s a best practice to simultaneously formulate a thoughtful compaction strategy. While a Cassandra table’s compaction strategy can be adjusted after its creation, doing so invites costly cluster performance penalties because Cassandra will need to rewrite all of that table’s data. Taking […]