Data Analytics & Digital Technologies

You are here

Strategic advice & alerts to leverage data analytics & new technologies

Leverage the latest advances in areas ranging from data analytics to IoT, social/mobile to wearables, Agile data warehousing to data architecture, with a continuous flow of written and multimedia research from Cutter’s global team of thought leaders.

Learn More »


Advisor

Adoption Trends for Enterprise-Grade Big Data Security Solutions

by Curt Hall

Today, big data platform providers and third-party security vendors offer enterprise-grade security solutions designed specifically for protecting and securing data maintained in Hadoop and other big data environments.


Curt Hall
Executive Update

Data-Centric Security and Protection, Part IV: Sensitive Data in IoT Environments

by Curt Hall

To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and tech­nologies, Cutter Consortium surveyed 50 organizations worldwide. This Executive Update examines problems and considerations surrounding the protection of sensitive data in Internet of Things (IoT) devices, platforms, and applications.


Steven Kursh
Advisor

The Current Blockchain Ecosystem

by Steven Kursh, by Arthur Schnure

Because of its capabilities in security, privacy, and data management, blockchain has captured the interest and resources of the financial industry as well as numerous other major sectors — from music to healthcare and even governments — around the globe.


Paul Harmon
Executive Update

Q&A on Real-World Application of Cognitive Computing/AI

by Paul Harmon

In a recent Cutter Webinar, “Cognitive Digital Transformation: The Next Wave,” Cutter Senior Consultant Paul Harmon considered the growing role of artificial intelligence (AI) and cognitive technologies in all aspects of business. He argued that cognitive technologies will simply extend the ongoing digital transformation of today’s enterprises, requiring them to reconsider their business models and understand fully why they will need to incorporate intelligent elements to remain competitive. Paul’s webinar concluded with a lively Q&A session. In this Executive Update, we highlight some of his thoughtful responses


Figure 1 — Does your organization currently have (or plan to implement) data-centric protection and security practices?
Advisor

Adoption Trends for Data-Centric Protection and Security

by Curt Hall

Data-centric protection and security focuses on the organization's sensitive data as opposed to its overall computer networks and applications, as is the case with the more traditional IT security models that typically operate by implementing a well-defended security perimeter designed to keep bad actors out. This is accomplished by locating, identifying, and cataloging sensitive data as well as by applying encryption, data masking, and policy-based data access controls (and end-user monitoring) to protect data residing across multiple enterprise environments. But to what extent are organizations adopting, or planning to adopt, data-centric protection and security practices?


Article

Achieving Information Superiority: A Framework to Measure Business Operating Model Performance

by Tarun Malviya

In today’s global socioeconomic landscape, with its multitude of varied and disruptive technological innovations, business organizations are forced to quickly respond and evolve. Continuous business transformation is the new normal. Business executives are expected to make informed and leading decisions against a dynamic business transformation baseline. In such an environment, quantifying the business operation’s effectiveness is a challenge and becomes particularly important when many critical operational decisions demand hard evidence. This is where the doctrine of information superiority comes into play. 


Article

Follow the Digital Trace: Turning Digital Artifacts into Digital Capital

by Stefan Henningsson, by C Ohrgaard

This wave of digitization is fundamentally rewriting the rules of competition across industries: the charac­teristics that made firms successful in the past are not the same characteristics that distinguish winners from losers in the digital era. One of these fundamental changes is the steadily increasing importance of innovation and continuous improvement. Research shows that the more digital an industry becomes, the more rapid the speed of change in the industry. There is no such thing as a sustained competitive advantage in the digital era. However, digitization does not only create challenges for actors in affected industries. Digitization in itself also provides the keys to tackling the changing competitive dynamics. Because most firms still do not leverage the opportunities, the quickest ones to learn how to exploit them will be the ones that come out on top. 

 


Article

Information Superiority and Customer Centricity

by Richard Veryard

The business value of consumer analytics and big data is not just about what you can discover or infer about the consumer, but how you can use this insight promptly and effectively across multiple touchpoints (including e-commerce systems and CRM) to create a powerful and truly personalized consumer experience. In this article, I will explore how the concept of information superiority interacts with the concept of customer centricity. I will look at three modes of information superiority: conventional, adaptive, and collaborative.