It can be argued that Big Data has grown to occupy a position of huge proportions in enterprise computing. Whereas some of the other emerging technologies that are driving this latest generation of enterprise software revolution – namely mobile, social, and cloud – have followed adoption patterns that are somewhat more typical for an enterprise, Big Data has become a Holy Grail, one that many companies don’t even really understand. The challenge is that Big Data is really not new – data has been an integral part of the business from the very beginning. Enterprises have spent the better part of their existence trying to capture, manage, store, and access this data. The recent new “wrinkle” in all this data talk that has spawned the “Big Data” movement is the rise of technologies that enable very large amounts of data to be manipulated and mined quickly and through user-friendly interfaces, giving rise to the ability for companies to use the data in real-time to impact the course of business.
In the wake of President Obama’s recent State of the Union Address, much of the buzz in enterprise technology circles has been around cybersecurity, and the impact of the President’s Executive Order on the IT industry. The President released an Executive Order on Cybersecurity on February 12th immediately following his address. Among the contents of the Order include the following statement, “It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.” Continue reading “Does Obama’s Cybersecurity Executive Order Have Broader Big Data Implications?”
Toxic data, as one recent definition states, is any data that has leaked out of an organization that might become harmful. Essentially, it’s important information that the company has lost control of. There are a wide range of types of data that can become toxic—from the personal data like a social security number, credit cards, or health care information, to corporate considerations, such as business plans, sales figures, or even product designs. Think of sensitive customer or corporate records and you have an idea of the type of data that could become “toxic” if it got into the wrong hands. For more perspective, read my recent IT Briefcase column on toxic data.
The presence of “big data” is changing the way data is being stored for organizations. Not only do organizations have structured and semi-structured data, but there are volumes of unstructured data coming from sources within and increasingly outside the firewall. The percentage of mission-critical data is growing within the company as well, and therefore creating a situation where IT has to be able to guarantee as much as half of the data that resides in a company’s systems can be recoverable and accessible within minutes or hours.
Read the full column on big data storage and backup at IT Briefcase.net.
Like it or not, Big Data is coming. In order to be ready, it’s important to also consider the security implications of a Big Data strategy. Read my recent IT Briefcase column on Big Data and Security for all the details.
There is no doubt that Big Data and Cloud Computing are taking the enterprise computing landscape by storm hand-in-hand. Big Data — the ability to effectively capture, manage, and utilize large swaths of different-structure data – has companies with their head in the clouds, as the first enterprise-grade version of a Big Data software platform became available in January. Read the full story on Big Data in my recent IT Briefcase column.