Author

Curt Hall

avatar

Curt Hall is a Senior Consultant with Cutter Consortium's Data Insight & Social BI and Business & Enterprise Architecture practices. His expertise includes BI, data warehousing, data mining, and other analytical technologies and products. Read more ...

Jul 262016
 
Cognitive-Based Solutions for Assessing Risk in Banking and Finance

Cognitive computing is starting to impact the enterprise by changing the way data is analyzed and the manner in which employees and customers interact with computerized systems. This is happening across various industries, ranging from healthcare and retail to banking and financial services. Since I have been delving into the financial area of late, I wanted to provide a glimpse into how banks and other financial institutions are utilizing cognitive applications and commercial solutions within their organizations. Key Drivers Key trends driving cognitive into banking and finance include: Massive data sets. Finance and banking firms are facing an increasing need to analyze very large data sets consisting of structured and unstructured data for exploration and discovery, Read more

Apr 192016
 
Preparing for the Disruption of the IoT

The Internet of Things (IoT) promises to cause disruption in almost every industry. Companies need to examine how they can take advantage of connected products and services and plan for the significantly increased data workloads that will likely come with the deployment of sensor-enabled products. However, an expected surge in product innovation also means that companies should carefully consider how they will deal with the potential rise of new, more agile competitors whose business models will be based primarily on IoT products and services. Here are some points about the IoT I’ve been discussing with colleagues that organizations may want to consider. Bigger, Faster, Varied Data and New Data Management Practices The expected myriad of Read more

Apr 052016
 
Protecting Your Sensitive Data During a Security Breach

At the recent RSA Security Conference in San Francisco, data-centric security and protection received a lot of attention. Several trends account for this. The main one, of course, is the large number of high-profile data breaches and other cyber attacks continually making the news — a trend that shows no sign of subsiding. In addition to this constantly lurking threat, we can add growing compliance and regulatory requirements as well as the advent of new (difficult to protect) technologies, applications, and architectures. Throw in all the revelations about hacking by various government intelligence services, and it’s easy to see why organizations and security solutions providers have made data-centric security and protection a top priority. The Read more

May 192015
 
Obstacles to Social Media Analytics

I’ve been spending a lot of time with social media analytics and exploring how organizations are adopting and applying the technology. There are a number of obstacles confronting organizations seeking to implement social media analytics. These include technical and organizational considerations, as well as dealing with societal or consumer concerns when it comes to privacy. The latter appear to be particularly troublesome for end-user organizations. Technical/Organizational Considerations One of the biggest technical issues is a perceived lack of best practices for social media analysis. Social media analysis is still a fairly new application for end-user organizations, and many seek guidance and best practices when it comes to actually designing and implementing their social media analytics Read more

Where Are Wearable Devices?

 Posted by on Jan 13, 2015  1 Response »
Jan 132015
 
Where Are Wearable Devices?

The Internet of Things (IoT) has generated considerable hype over the past few years. Probably nowhere has this hype been greater than when it comes to wearable devices like smart watches (Apple Watch), smart glasses (Google Glass), activity/fitness trackers (Misfit), and smart badges (for location tracking, security, etc.). This includes the use of wearables as general consumer electronic devices, as well as for their possible application in business scenarios designed to help workers perform their jobs. Of course, all this focus on wearables raises the key question: what role do such devices play in organizations’ mobile strategies? A Cutter Consortium survey (conducted July–October 2014) that asked 49 organizations about their mobile technology practices and adoption Read more

Oct 162014
 

It took home improvement retailing giant Home Depot about a week before it finally confirmed it had suffered a data breach. Home Depot first reported the possibility of a breach on 2 September 2014, but did not actually confirm the hacking until 8 September. During that time, the company made somewhat vague statements that it was still carrying out an investigation to determine whether or not its systems had actually been compromised. Based on the company’s recent press release confirming the breach (see “The Home Depot Provides Update on Breach Investigation“), it appears that Home Depot’s internal IT security team was unaware that its payment data systems had been compromised. Instead, it looks as if Read more

Sep 232014
 

As the Internet of Things (IoT) becomes a reality, the volume of data that will be generated by the multitude of connected devices, machines, and processes — in the consumer, business, and industrial worlds — is expected to be massive. In short, the more devices and machines that get connected, the more data that is going to be generated. Achieving some kind of business value from this massive data reservoir will require the use of big data storage and analysis technologies that can scale to meet the constantly increasing demands placed on organizations. These include: NoSQL file systems NoSQL databases High-performance relational analytic and in-memory database appliances Hybrid relational databases with embedded MapReduce Streaming analytics Read more