Sign up | Login with →

Best Practices

exclusive

Data Management and Security Best Practices

April 20, 2017 by David Kirby

Cyber-attacks are becoming more of a threat than they were 5 years ago. Unprotected online connections represent opportunities for data breaches.[read more]

The Enterprise Graph – From Connections To Customer Insights

March 3, 2017 by Peter Perera

Know more, sell more. That’s the bottom-line when looking to introduce graph databases into the enterprise.[read more]

How to build a dashboard that your executives will love

January 18, 2017 by Joe Stangarone

Businesses have access to more data than ever before. But, is this data actually helping business leaders make more informed decisions? In many cases, the answer is “No.” Why? Far too few businesses actually capitalize on their data. In this article, you’ll learn how effective dashboards will help you capitalize on your data, as well as tips for building dashboards that executives will love.[read more]

Why Lean Data Management Is Vital for Agile Companies

December 19, 2016 by Larry Alton

Data management is becoming more and more significant to a company’s success. Insights through data can allow you to improve the efficiency of your operations, understand your customers better, and ultimately make your enterprise more profitable. Unfortunately, those insights don’t always come easily; your data must go through a number...[read more]

exclusive

Responding to a Data Breach Starts at the Top

November 8, 2016 by Ryan Ayers

Data breaches can tarnish a company’s reputation, making it very difficult to win back customer loyalty and support. A leader’s response to a data breach can mean the difference between damage control and total chaos.[read more]

Why I’m Teaching Twitch to Predict the Future

October 31, 2016 by Daniel Hernandez-Stewart

Predicting the future is not a theoretical superpower. It is a skill we already rely on to make decisions, and like any other skill it can be rapidly improved with deliberate practice. Unsurprisingly, deliberate practice looks like making predictions within a domain and comparing the results to reality. This year I’ve built a culture of doing just that at Twitch. It’s the most exciting work I’ve ever done.[read more]

exclusive

Cloud Managed Services Provider (MSP) Is it really about services or winning customer trust?

August 24, 2016 by Alakh Verma

            We have entered the era of outcome economy, or it would be appropriate to say that we are slowly entering the era of consumer trust economy. We can conclude that customers across the industry are shying away from paying for products or services. Consumers are willing to sign on the outcome,...[read more]

Citizen Development 101: Understanding the Basics

July 15, 2016 by Joe Stangarone

Application development has long been a problem facing both the IT department and the business units. The IT department gets overwhelmed with new application requests. They can’t possibly complete every project when the business wants it done. Meanwhile, the business users get tired of waiting, and start bypassing the IT department altogether. Today, we explore the concept of “citizen development”, and explain how it helps address this problem.[read more]

exclusive

4 Best Practices for Backing Up and Recovering Data

July 15, 2016 by Ryan Ayers

Protecting and accessing company data is an issue every modern business, large or small, needs to prioritize. According to 24/7 Wall Street, there have been 16% more data breaches in 2016 than during the same period in 2015, and this upward trend is not new. With data breaches on the rise each year, preserving irreplaceable data should...[read more]

exclusive

Keeping Sales & Marketing Data in Order: What startups must learn from the enterprise.

June 29, 2016 by Maria Grineva

Keeping Sales & Marketing Data in Order: What startups must learn from the enterprise.Nowadays it’s hard to find a startup CEO or CTO who’s not thinking about how their company can maximize the value of its data. Yet, most of the startups I speak with are shocked to learn how much money they’re leaving on the table as a result of...[read more]

5 steps to protect your business data in a mobile world

June 23, 2016 by Joe Stangarone

While mobility offers many advantages to the modern business, it brings new security challenges. How can your business protect your sensitive data in a mobile world? How can you maintain security, when you can’t control every device in your organization? In this article, we explore 5 steps you must take to protect your business data in a mobile world.[read more]

Big Data ROI? Not Likely in Year 1

June 2, 2016 by Paul Barsch

For year one of your big data project, it’s important to adjust expectations and look for other forms of “return” while you wait for substantial financial results to trickle in.[read more]

Apache Spark and Hadoop: The best big data solution for enterprises

June 1, 2016 by Jagadish Thaker

The term big data has become the center of attention for enterprises. In the past, business decisions have been made on the basis of transactional data stored in relational databases. This is known as traditional data, which is in structured form and easy to analyze for getting business insights.Apart from this critical business data,...[read more]

How IoT is Revolutionizing Asset Monitoring for Utility Companies

May 24, 2016 by Annie Bustos

In a previous post we briefly discussed 3 ways that utilitiy and green energy companies are getting smarter with IoT but now I want to delve a little deeper into one important area which is asset management. Assets that are linked to IoT devices allow utility operators to see real-time conditions, predict usage spikes, and...[read more]

exclusive

5 Essential Steps To Take After A Data Security Breach

May 19, 2016 by Particia Dimick

Hackers are an insensitive breed, with no respect for violating other people’s finances and personal business dreams.Like pickpockets stealing wallets, they steal usernames and passwords to get access to credit lines, bank accounts, and payment processors. Like con men, they look for data that will allow them to steal someone’s...[read more]