Data Blogs | Information From Enterprise Leaders

Primary Key and Foreign Key Errors to Avoid

Michael Blaha

by Michael Blaha Few IT applications are truly grass roots. Rather most new applications are intended to replace or complement existing applications. As a result, we often find ourselves working with legacy databases. This article is based on 50 legacy databases that we’ve studied over the years. In our experience about 20% of database designs…

Key Trends Driving Local to Global Data Consolidation Challenges

anand-krishnanWP

by Anand Krishnan Today’s businesses are shifting their organizational structures and making significant changes to how IT operates in a global setting. In particular, it is important to consider how to efficiently transition data from a local view to be a global business function for better business efficiency and IT data management. While it’s easy to…

The Missing Step Before Advanced Analytics: Knowing Your Data IQ

Jeff-Brown-WP

by Jeff Brown Without quality data your analytics outcomes have lower IQ. There’s no question about it: Data-driven decision making is the common element of successful businesses. Companies that collect and exploit customer information are rocketing ahead of the competition, leaving less tech savvy companies in the dust. It’s no wonder why advanced analytics have…

Content Intelligence and Information Governance

ann-kelly

by Ann Kelly We’ve all seen the news headlines where organizations are fined for deleting information too soon or for not preserving content as in the case of a litigation hold. If these organizations knew about and used the principals of Content Intelligence with respect to their information governance it may have saved them time,…

How Machine Learning Makes Databases (Truly) Ready for Big Data

thomas-hazel-WP

by Thomas Hazel The promise of big data is incredibly enticing and, for most businesses, just as out of reach. The reason is simple: today’s databases are built upon 1970s math that was designed for 20th-century data requirements and hardware capabilities. This math has led to tree-structures and associated algorithms that are incapable of delivering…

What’s Next for IT: Taking a Glimpse into the Future

Jonathan Buckley

by Jonathan Buckley When dealing with technology, it’s common for people to always be asking, what’s next? After all, with the speed at which technology advances, looking forward to what’s coming down the pipeline isn’t just a fascinating hobby, it’s just good business sense. Even companies that may not rely heavily on technology still depend on…

Cash – The Ultimate Privacy Protection

cathy nolan new

by Cathy Nolan How many of us bother to go into the station to pay cash for gas, take actual money to the grocery store or settle our bill with that green stuff at a restaurant—let alone use it to leave the server a tip. We use credit or debit cards for donations to charities,…

August 2015 DATAVERSITY Letter from the Editor

Letter from the Editor

Webinars have become a very important part of the DATAVERSITY education platform, so I thought I would talk about the program this month. Many are regular webinar registrants, so for you,  this would just be a reaffirmation regarding the program details (and serious THANK YOU!), but maybe there’s something in here you don’t know too. In…