Wednesday, March 22, 2017

The analytics team shouldn't always pursue quick wins

TechTarget
Latest Technology News and Expert Advice
A roundup of news and tips on the topics you're interested in | March 22, 2017
TechTarget
ISSUE HIGHLIGHTS
The analytics team shouldn't always pursue quick wins
Public-sector analytics teams struggle to implement innovation
IoT data analytics streams into uncharted waters
Definition: cyber attribution
Definition: holistic security
EXPERT ADVICE
The analytics team shouldn't always pursue quick wins
Analytics teams typically look for quick wins to prove their value. But experts say this approach should not become the guiding strategy for data product development.  
Public-sector analytics teams struggle to implement innovation
Bureaucratic rules and risk-averse culture make it difficult for public-sector agencies to take advantage of data-driven decision-making, despite clear benefits.  
IoT data analytics streams into uncharted waters
In the world of the internet of things, it's one thing to gather mountains of data from an ever-increasing multitude of sensors, appliances, vehicles, smart personal devices and industrial equipment. It's quite another thing to liberate congested data warehouses; select, process and analyze worthy data; and formulate business, development and manufacturing plans that can catapult a company ahead of the competition. IoT's tentacles reach into many industries, and its applications are getting more creative as companies thirsting to gain a competitive edge take advantage of the untapped potential of IoT data analytics. Estimates range from 20 billion to as high as 50 billion IoT-connected devices in the next few years.

In the first feature of this handbook on IoT analytics, consultant David Loshin reveals how manufacturing operations are rapidly being reconfigured to connect the machines within a particular factory as well as create a broader network that can pull together data from equipment throughout an organization's multiple facilities. Data analysts can apply predictive analytics to streaming data from factory-floor machines to prevent unscheduled shutdowns, reduce costs and improve manufacturing productivity. In the second feature, consultant David A. Teich probes edge analytics as a way to counteract the exponential growth in devices being connected and the resulting network congestion. Systems at the network edge can be used to process, filter and analyze data, then pass on aggregated data sets to a centralized analytics platform. And in the third feature, news writer Ed Burns examines how Visa is using IoT data analytics to expand and simplify its transaction processing capabilities while capitalizing on analytical models to provide business intelligence to merchants.

  
Definition: cyber attribution
In the wake of a cyber attack or hacking, a business may be anxious to assign blame and see the perpetrator brought to justice, thus ensuring that it's not seen as an easy target. Investors may also demand cyber attribution. However, attribution is difficult and poses its own risks.  
Definition: holistic security
Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system.  
About This E-Newsletter
This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
TechTarget
To unsubscribe from all Security Media Group emails,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.

About TechTarget:
TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.

No comments: