Strategic advice & alerts to leverage data analytics & new technologies
Leverage the latest advances in areas ranging from data analytics to IoT, social/mobile to wearables, Agile data warehousing to data architecture, with a continuous flow of written and multimedia research from Cutter’s global team of thought leaders.
In this on-demand webinar, you'll discover how you can combine big data analytics with a Lean approach to disciplined problem solving, enabled by a Lean management system, to optimize decision making, investment, and performance.
In Part II of this series, we examine survey findings pertaining to the biggest perceived threats to sensitive data protection efforts as well as issues and concerns for protecting data in cloud platforms and applications.
In the history of NoSQL data, there have been many approaches to solving the problem of performing analytics on it. Not all of these approaches are able to solve all problems in NoSQL analytics — they vary greatly in their expressiveness and flexibility.
Optimize your Big Data investments, decision making, and performance.
According to our research, current adoption of data breach protection insurance is fairly limited. This is somewhat surprising, as I had expected usage to be considerably higher due to the many high-profile data breaches appearing in the news.
As has been our tradition for the last several years, we've compiled the five most intriguing articles published by the Data Analytics & Digital Technologies practice this year for today's Advisor. How did we come up with this list? We chose the articles that garnered the most feedback from Cutter Members and clients and those that created controversy among Cutter Senior Consultants and Fellows.
In this Executive Update, the first of three related articles, we examine financial services as an example of a highly regulated industry and outline the regulatory landscape that creates points of tension for cloud adoption. We also incorporate perspectives from a differentiated range of stakeholders, including lawyers, technologists, compliance executives, and outsourcing managers.
Data breaches are front and center in the news again. And with the hacking of the US Democratic National Committee's (DNC) servers, allegedly by Russian security services in an effort to influence the outcome of the American presidential election, and Yahoo's latest announcement of a yet another hack involving data associated with more than one billion (!) accounts, it is obvious that no system should ever be considered entirely safe from breaches, regardless of the data security and protection solutions in place.