Consumers regularly receive information that is irrelevant to their current interests or situation – and they’re none too pleased. According to a recent survey commissioned by my company, 70% of consumers surveyed said they receive mistargeted information at least once a month, and 24% say they receive mistargeted information, such as inaccurate promotional emails or irrelevant […]
How Developers Can Strengthen Data Security with Open Source and PKI
In the never-ending battle between business success and cybersecurity threats, enterprises have discovered a secret weapon. Developers, once the scourge of security teams, are becoming vital proponents of secure software. By tapping into open-source tools and public-key infrastructure (PKI), many developers are bringing data security into the earliest stages of development and taking greater responsibility […]
Why Digital Transformation and Data Integration Are Natural Enemies – and How That Can Change
Digital transformation represents the ultimate best practice of the modern era – it signifies ongoing change driven by technological advances and expanded capabilities, helps companies and employees exceed their perceived potential, and constantly raises the bar on competition and performance. And, of course, optimal data management is at the heart of that evolution. So why does it seem […]
How to Implement a Data Quality Framework
According to IDC, 30-50% of businesses experience gaps between their data expectations and reality. They have the data they need, but due to the presence of intolerable defects, they cannot use it as needed. These defects – also called Data Quality issues – must be fetched and fixed so that data can be used for successful business […]
Data Lakes Are Dead: Evolving Your Company’s Data Architecture
You know you’re not getting the most out of your data. How can your company redesign its data architecture without making the same mistakes all over again? The data we produce and manage is growing in scale and demands careful consideration of the proper data framework for the job. There’s no one-size-fits-all data architecture, and […]
Top Cloud Security Challenges and How to Overcome Them
Cloud security is composed of a set of policies, controls, processes, and technologies that work together to protect cloud-based infrastructure, systems, and data. These security measures are configured to protect data, support regulatory compliance, protect customer privacy, and set authentication rules for individual users. Cloud security is a critical consideration as organizations migrate workloads to the […]
A Root-Cause Framework for Trans-Atlantic Data Privacy
When the United States and the European Commission together announced a new Trans-Atlantic Data Privacy Framework earlier this year, the news didn’t raise too many eyebrows. After all, there’s nothing particularly objectionable about the new framework – the goal is to “foster trans-Atlantic data flows” and address concerns about the underlying EU-U.S. Privacy Shield framework, and who […]
A Primer to Optimizing Your Apache Cassandra Compaction Strategy
When setting up an Apache Cassandra table schema and anticipating how you’ll use the table, it’s a best practice to simultaneously formulate a thoughtful compaction strategy. While a Cassandra table’s compaction strategy can be adjusted after its creation, doing so invites costly cluster performance penalties because Cassandra will need to rewrite all of that table’s data. Taking […]
Why the Consumable Form of Data Needs Your Attention
How organizations manage their data directly impacts their success or failure. The correlation between data analytics and intelligence to competitive advantage and growth has led to heavy investments in those technologies throughout the last decade. So, if you consider that content is the consumable form of data, then it follows that the era of big […]
How Data Can Prevent Software Piracy and Drive Licensing Revenue
Those who use your software found it, love it, and want to use it. Unfortunately, some people use your software without paying for it. Software piracy – the use of software that’s been configured or tampered with to remove or bypass license enforcement – happens. So does overuse (use of software exceeding the limits of the […]