Strategic advice & alerts to leverage data analytics & new technologies
Leverage the latest advances in areas ranging from data analytics to IoT, social/mobile to wearables, Agile data warehousing to data architecture, with a continuous flow of written and multimedia research from Cutter’s global team of thought leaders.
Today, big data platform providers and third-party security vendors offer enterprise-grade security solutions designed specifically for protecting and securing data maintained in Hadoop and other big data environments.
To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and technologies, Cutter Consortium surveyed 50 organizations worldwide. This Executive Update examines problems and considerations surrounding the protection of sensitive data in Internet of Things (IoT) devices, platforms, and applications.
Because of its capabilities in security, privacy, and data management, blockchain has captured the interest and resources of the financial industry as well as numerous other major sectors — from music to healthcare and even governments — around the globe.
In a recent Cutter Webinar, “Cognitive Digital Transformation: The Next Wave,” Cutter Senior Consultant Paul Harmon considered the growing role of artificial intelligence (AI) and cognitive technologies in all aspects of business. He argued that cognitive technologies will simply extend the ongoing digital transformation of today’s enterprises, requiring them to reconsider their business models and understand fully why they will need to incorporate intelligent elements to remain competitive. Paul’s webinar concluded with a lively Q&A session. In this Executive Update, we highlight some of his thoughtful responses
Data-centric protection and security focuses on the organization's sensitive data as opposed to its overall computer networks and applications, as is the case with the more traditional IT security models that typically operate by implementing a well-defended security perimeter designed to keep bad actors out. This is accomplished by locating, identifying, and cataloging sensitive data as well as by applying encryption, data masking, and policy-based data access controls (and end-user monitoring) to protect data residing across multiple enterprise environments. But to what extent are organizations adopting, or planning to adopt, data-centric protection and security practices?
In today’s global socioeconomic landscape, with its multitude of varied and disruptive technological innovations, business organizations are forced to quickly respond and evolve. Continuous business transformation is the new normal. Business executives are expected to make informed and leading decisions against a dynamic business transformation baseline. In such an environment, quantifying the business operation’s effectiveness is a challenge and becomes particularly important when many critical operational decisions demand hard evidence. This is where the doctrine of information superiority comes into play.
This wave of digitization is fundamentally rewriting the rules of competition across industries: the characteristics that made firms successful in the past are not the same characteristics that distinguish winners from losers in the digital era. One of these fundamental changes is the steadily increasing importance of innovation and continuous improvement. Research shows that the more digital an industry becomes, the more rapid the speed of change in the industry. There is no such thing as a sustained competitive advantage in the digital era. However, digitization does not only create challenges for actors in affected industries. Digitization in itself also provides the keys to tackling the changing competitive dynamics. Because most firms still do not leverage the opportunities, the quickest ones to learn how to exploit them will be the ones that come out on top.
The business value of consumer analytics and big data is not just about what you can discover or infer about the consumer, but how you can use this insight promptly and effectively across multiple touchpoints (including e-commerce systems and CRM) to create a powerful and truly personalized consumer experience. In this article, I will explore how the concept of information superiority interacts with the concept of customer centricity. I will look at three modes of information superiority: conventional, adaptive, and collaborative.