How to sell data and analytics to stakeholders
There’s an inherent need for data-driven business decision making, but linking this demand to specific business benefits and outcomes can be difficult
There’s an inherent need for data-driven business decision making, but linking this demand to specific business benefits and outcomes can be difficult
Some marketers’ ambitions have backfired, as consumers both directly and indirectly reject brands’ overtures, cautions Gartner
A knee-jerk, quick response to a mandatory cost-cutting challenge can certainly reduce cost in the short term. However, without proper evaluation, these costs often return in the medium to long term.
Gartner outlines steps to address risks organisations can - and can’t - control
CIOs have to make many hard choices as their organisations navigate geopolitics, economic shifts, and the ascendance of digital giants
1.The concept is still quite new. The term data lake, credited to Pentaho CTO James Dixon, has been bandied about for several years. But the idea of data lakes as corporate resources is still in its infancy, according to IDC analyst Ashish Nadkarni. A data lake is defined as a massive--and relatively cheap--storage repository, such as Hadoop, that can hold all types of data until it is needed for business analytics or data mining. A data lake holds data in its rawest form, unprocessed and ungoverned.
1. Bi-modal IT is real, and it's likely to be embraced by your company
Microsoft's Windows 10 will not have a fragmentation problem, analysts argued, even though its rapid development tempo and a host of update cadences will spin off so many versions that not everyone will be running the same code, or even have the same features, at any one time.
"This, my friends, sounds like a market ripe for fallout."
"CEOs are right to be concerned."
Vulnerabilities and their exploitation are still the root cause of most breaches. IT security leaders should refocus their attention on how vulnerabilities are being managed and should track this metric to provide visibility as to how to reduce the biggest risks of being breached.