Updates from August, 2015 Toggle Comment Threads | Keyboard Shortcuts

  • admin 10:36 am on August 31, 2015 Permalink
    Tags: , , , NASCIO   

    NASCIO 2015 Annual Conference 

    The National Association of State Chief Information Officers (NASCIO) association represents state chief information officers and information technology executives and managers. The NASCIO Annual Conference provides state CIOs and state members with a forum for peer networking, information exchange and adoption of IT best practices and innovations.
    Teradata Events

  • admin 9:55 am on August 31, 2015 Permalink
    Tags: , , Burner,   

    Don’t Put Your Brand On The Back Burner 

    back burnerThere’s never been a more exciting time to be a marketer than right now.

    On the one hand, our jobs are growing increasingly complex, thanks to the seemingly endless streams of rich, relevant customer data, the proliferation of digital channels and platforms, and the constant evolution of marketing technologies. But on the other, it’s the combination of those things that make what we do so effective… and rewarding. Make no mistake about it: Today’s marketers have unprecedented capabilities to deliver individualized interactions and compelling customer experiences –and to me, that’s absolutely thrilling.

    Still, amidst all this transformation, I’m finding that many are losing sight of one of the most fundamental mandates of our industry.

    We all know that, as marketers, we are charged with engaging new customers, fostering loyalty among existing customers and ensuring that we stay on top of — and hopefully ahead of — the competition. But let’s not forget that we’re also charged with something that isn’t as easily quantifiable, even though it’s absolutely critical to the health of our enterprise: brand building.

    In today’s omnichannel world, a strong brand is as essential as ever; however, if you get too caught up in tactics, content deliverables and process, it may be easy to lose sight of the big picture. You might start to forget that every nuance of how you’re seen, experienced or felt as a business is actually what makes up your brand. Brand-driven marketing remains a world where the whole is greater than the sum of the parts.

    These days, the people who love what you do have more ways than ever to champion your brand publicly. But at the same time, detractors have just as many ways to make a dent in your reputation. That’s why, ultimately, the best way to maintain and evolve a healthy brand is to be intentional and consistent about establishing it – so much so that the “noise” can’t drown out the tune you want the world to hear.

    What’s your approach? Do your marketing campaigns and strategies put brand first — or are you hoping that your long checklist of tasks will get you there in the end?

    Not so long ago, you could publish some online marketing collateral peppered with the appropriate tags and keywords, and hope for the search engines to deliver the right eyeballs and dollars. You could identify optimal channels, establish tactics and track your results. Those were the days of “linear” marketing, and they’re drawing to a close… if they’re not already over.

    Now it’s time to make way for data driven marketing and the Internet of Things, when technology, people and things interact in ways that greatly enhance the customer experience. It starts with listening to your customers via all channels and touchpoints, and companies are already being rewarded for building smart interactions that empower the consumer to connect, while minimizing the effort required to transact, communicate or enjoy products, services and brands. But even if you’re using the latest and greatest technology… even if you’re effectively analyzing and leveraging your data… even if you create and manage individualized content across channels… without brand management at the core, “steering” it all, you’re going to fall short of what’s possible.

    Fortunately, the wealth of marketing applications available today are as useful for establishing brands as are they are for putting content out into the world — IF you start with your brand as your priority, instead of hoping it’ll take care of itself as you go.

    The post Don’t Put Your Brand On The Back Burner appeared first on Teradata Applications.

    Teradata Blogs Feed

  • admin 9:49 am on August 31, 2015 Permalink
    Tags: , JapanData, , ,   

    Japan-Data Analysis Using Teradata QueryGrid 

    Teradata White Papers

  • admin 10:33 am on August 30, 2015 Permalink
    Tags: , , , , , , , , ,   

    Webinar: Forbes Insights Survey: How to Increase Your Odds of Success with Big Data & Analytics 

    In this webinar, Bruce Rogers, Forbes’ Chief Insights Officer, will discuss the key findings from the survey. He will be joined by Matt Ariker from McKinsey and Chris Twogood from Teradata who orchestrated the survey questions. Together they will share how organizations can increase their odds of success with big data and analytics.
    Teradata Events

  • admin 9:54 am on August 30, 2015 Permalink
    Tags: , , Pluralism, Secularity   

    Pluralism and Secularity In a Big Data Ecosystem 

    Solutions around today’s analytic ecosystem are too technically driven without focusing on business values. The buzzwords seem to over-compensate the reality of implementation and cost of ownership. I challenge you to view your analytic architecture using pluralism and secularity. Without such a view of this world your resume will fill out nicely but your business values will suffer.

    In my previous role, prior to joining Teradata, I was given the task of trying to move “all” of our organization’s BI data to Hadoop. I will share my approach – how best-in-class solutions come naturally when pluralism and secularity are used to support a business-first environment.

    Big data has exposed some great insights into what we can, should, and need to do with our data. However, this space is filled with radical opinions and the pressure to “draw a line in the sand” between time-proven methodologies and what we know as “big data.” Some may view these spaces moving in opposite directions; however, these spaces will collide. The question is not “if” but “when.” What are we doing now to prepare for this inevitability? Hadapt seems to be moving in the right direction in terms of leadership between the two spaces.

    Relational Databases
    I found many of the data sets in relational databases to be lacking in structure, highly transient, and loosely coupled. Data scientists needed to have quick access to data sets to perform their hypothesis testing.

    Continuously requesting IT to rerun their ETL processes was highly inefficient. A data scientist once asked me “Why can’t we just dump the data in a Linux mount for exploration?” Schema-on-write was too restrictive as the data scientists could not predefine the attributes for the data set for ingestion. As the data sets became more complex and unstructured, the ETL processes became exponentially more complicated and performance was hindered.

    I also found during this exercise that my traditional BI analysts were perplexed with formulating questions about the data. One of the reasons was that businesses did not know what questions to ask. This is a common challenge in the big data ecosystem. We are used to knowing our data and being able to come up with incredible questions about it. The BI analyst’s world has been disrupted as they now need to ask “What insights/answers do I have about my data?” – (according to IIya Katsov in one of his blogs).

    The product owner of Hadoop was convinced that the entire dataset should be hosted on Amazon Web Services (S3) which would allow our analytics (via Elastiv Map Reduce) to perform at incredible speeds. However, due to various ISO guidelines, the data sets had to be encrypted at rest and in transit which degraded performance by approximately 30 percent.

    Without an access path model, logical model, or unified model, business users and data scientists were left with little appetite for unified analytics. Data scientists were on their own guidelines for integrated/ federated/governed/liberated post-discovery analytical sets.

    Communication with the rest of the organization became an unattainable goal. The models which came out of discovery were not federated across the organization as there was a disconnect between the data scientists, data architects, Hadoop engineers, and data stewards — who spoke different languages. Data scientists were creating amazing predictive models and at the same time data stewards were looking for tools to help them provide insight in prediction for the SAME DATA.

    Using NoSQL for a specific question on a dataset required a new collection set. To maintain and govern the numerous collections became a burden. There had to be a better way to answer many questions without having a linear relationship to the number of collections instantiated. The answer may be within access path modeling.

    Another challenge I faced was when users wanted a graphical representation of the data and the embedded relationships or lack thereof. Are they asking for a data model? The users would immediately say no, since they read in a blog somewhere that data modeling is not required using NoSQL technology.

    At the end of this entire implementation I found myself needing to integrate these various platforms for the sake of providing a business-first solution. Maybe the line in the sand isn’t a business-first approach? Those that drive Pluralism (a condition or system in which two or more states, groups, principles, sources of authority, etc., coexist) and Secularity (not being devoted to a specific technology or data ‘religion’) within their analytic ecosystem — can truly deliver a business-first solution approach while avoiding the proverbial “silver bullet” architecture solutions.

    In my coming post, I will share some of the practices for access path modeling within Big Data and how it supports pluralism and secularity within a business-first analytic ecosystem.

    Sunile Manjee

    Sunile Manjee is a Product Manager in Teradata’s Architecture and Modeling Solutions team. Big Data solutions are his specialty, along with the architecture to support a unified data vision. He has over 12 years of IT experience as a Big Data architect, DW architect, application architect, IT team lead, and 3gl/4gl programmer.

    The post Pluralism and Secularity In a Big Data Ecosystem appeared first on Data Points.

    Teradata Blogs Feed

  • admin 9:48 am on August 30, 2015 Permalink
    Tags: , , JapanPreparation,   

    Japan-Preparation of Data in the Hadoop Data Lake 

    Teradata White Papers

  • admin 10:36 am on August 29, 2015 Permalink
    Tags: , ,   

    Data Transparency 2015 

    Data Transparency 2015 (#DT2015) is the third annual gathering of the most influential U.S. open data leaders– from the executive branch, the legislative branch, state and local, the nonprofit sector, and the tech and financial industries. Data Transparency 2015 is hosted by the Data Transparency Coalition, the world’s only open data trade association, representing market leaders in data publication, data analytics, and data reporting.
    Teradata Events

  • admin 9:51 am on August 29, 2015 Permalink
    Tags: , , , , RealWorld   

    Real-world Examples Of Individualized Loyalty Programs 

    Screen Shot 2015-08-26 at 12.44.31 PMNow that I’ve: 1) defined individualization as the next generation of loyalty and customer engagement and 2) identified the five keys to individualized loyalty, I’d like to explore how a few leading brands are innovating and excelling with individualized loyalty and customer engagement programs.


    Born out of a desire to reduce friction and deliver a “touch of magic” to the customer experience, MagicBands are quickly becoming an integral part of Disney vacations.

    These RFID-enabled bands are individualized to each guest and eliminate the need for paper tickets, FastPass+… and even a wallet. What’s more, the MagicBand allows Disney to track you through its parks. Imagine the look on your child’s face when Anna and Elsa greet her by name – and know that she saw Mickey and Minnie at breakfast.

    Describing their individualized experience, Disney COO Tom Staggs quotes Arthur C. Clarke: “Any sufficiently advanced technology is indistinguishable from magic.”

    By reducing friction around which lines to wait in, where to find Disney characters, what to eat, etc., visitors free themselves to experience more of the park. When they do, they create more memories and ultimately, spend more.

    This kind of magic shows how well brands can create opportunities for customers to clamor to share their information. As Cliff Kuang of WIRED wrote in his article about MagicBands, “No matter how often we say we’re creeped out by technology, we tend to acclimate quickly if it delivers what we want before we want it.”


    Today’s loyalty members are leaving the plastic behind, instead carrying their memberships with them via smartphone. In fact, the 2015 Bond Brand Loyalty Report even goes so far as to call mobile the “strategic high ground in loyalty.” Combining communication, unique ID, analytics tools and a payment vehicle, mobile devices add utility to marketing by providing consumers a link between the offline and online worlds.

    This trend prompted Starbucks to transition My Starbucks Rewards members from plastic cards to the Starbucks mobile app. It’s a move that makes infinite sense. After all, most of us have stood in line at Starbucks, and as we waited, what did we have in our hands? Plus, smartphones are certainly a more reliable way of tracking payments than a gift card that’s easily forgotten (or lost).

    Starbucks reports that mobile app transactions now account for 16% of total revenue, with 7 million transactions tracked per week, across the 13 million active app users and more than 9 million active My Starbucks Rewards members.

    By engaging loyal customers through mobile, Starbucks has embraced the digital experience while still focusing on the in-store “third place” experience. This clear, cohesive emphasis on the customer experience across all channels shows what loyalty can achieve when it’s embedded throughout the connected experience.

    If we think about the tens, or hundreds, of times per day consumers interact with different brands, the opportunity for any of them to resonate in a meaningful way may be slight. But what about the apps consumers interact with obsessively (remember Angry Birds, Words With Friends, Candy Crush?) or the websites they visit regularly? Are those interactions wasted? Are you embracing data driven marketing and all the channels that enable you to connect with your customers?


    The Apple Watch provides yet another opportunity to individualize relevance in a truly intimate way. Indicative of a burgeoning new age of connected wearables, the Apple Watch is a highly personalized part of the Internet of Things (IoT), an entire movement focused on making lives better and easier by using insights from data to drive purposeful action.

    The IoT is all about seamlessly blending technology, things and people to create meaningful interactions – and those meaningful (data-driven) interactions can lead to loyalty. That’s what American Airlines is doing with its AAdvantage program. When a brand is able to connect directly with known individuals, with real time marketing and a right-time relevant value exchange that’s imperative to how they go about their day, a competing brand never has a chance to disrupt the relationship.

    Yes, loyalty and engagement are changing – as all of marketing is. But though the mechanics are evolving, the recipe for success remains the same: Building a relationship with your best customers provides proven results, and engaging your customers to propel them forward outpaces acquisition every day of the week. Understanding your customers more deeply as individuals empowers you to create a differentiated customer experience that keeps your best customers coming back.

    By embracing real customer obsession, unifying loyalty and engagement and infusing it throughout your customer experience, you clearly communicate the value you offer and deliver a real reason to connect and engage with you, and be loyal now, and in the future.

    At Teradata, we believe in the power of marketing AND the power of the individual – and in rising above mere mass personalization to connect with the customer through a truly individualized experience. Loyalty has always been about engaging the individual – and this next evolution in individualized loyalty and engagement will enable marketers to harness that power to retain and grow their most profitable customers.

    As COLLOQUY Research Director Jeff Berry pointed out the power of the individual in this year’s census:

    “Rather than being classified into a segment, each customer should be seen as a ‘segment of one.’”

    The days of grouping customers as “close enough” profiled segments is over.

    The future is all about “magically” engaging the loyalty of a segment of one.

    The post Real-world Examples Of Individualized Loyalty Programs appeared first on Teradata Applications.

    Teradata Blogs Feed

  • admin 9:47 am on August 29, 2015 Permalink
    Tags: , Differentiation, JapanIntegration,   

    Japan-Integration of Data Leads to Differentiation 

    Teradata White Papers

  • admin 9:51 am on August 28, 2015 Permalink
    Tags: , Cyberthreats, ,   

    8 Best Practices to Mitigate Cyberthreats 

    8 Best Practices to Mitigate Cyberthreatsby Susan Lawson-Dawson

    High-profile data breaches are occurring more often these days. Why? It’s primarily because there is plenty of money to be made. As a result, cyberthieves are proving progressively more sophisticated and increasingly determined in their efforts to evade and break through security solutions.

    Keeping your data safe requires staying a step ahead of the bad guys. By following these eight best practices, you can get out in front of the problem and reduce your vulnerability to malicious attacks from both inside and outside the business. Moreover, you’ll be ready to implement quick countermeasures if a breach should occur.

    1. Align Functional and Strategic Intelligence Resources

    Even when security-focused processes are in place, without adequate cyberintelligence and analysis, it’s only possible to react to breaches—a response that’s the equivalent of closing the barn door after the horse has bolted. An optimized cyberintelligence program incorporates both functional and strategic analysis that improves the ability to develop timely, proactive intelligence solutions, communicate potential threats and security risks to the C-suite, and fine-tune data gathering tools to meet analysts’ needs more efficiently.

    2. Develop a Collaborative Culture for Sharing Information

    Early this year in New York City, representatives of government agencies, the private sector and academia came together at the fifth International Conference on Cyber Security to promote a collaborative environment to create a more secure world. It was just one of many similar conferences taking place across the globe.

    Experts at these events emphasize that risk is shared, so information surrounding data security must be shared as well. Improving awareness across the enterprise is also critical. To heighten awareness, make sure internal departments understand threat exposure, the risks and consequences of cyberattacks, and that individual employees are trained about their roles in maintaining data security.

    3. Allocate Resources Based on Threat Potential

    Relying on a one-size-fits-all approach to cybersecurity creates more challenges than advantages. It limits the scope of the implementation and restricts agility as cyberthreats evolve and become more sophisticated. Implementing a tiered threat model enables rapid assessment and prioritization of potential threats and targets, and then appropriate allocation of resources. This approach supports cost-effective risk mitigation and agile responses.

     4. Design Programs to Suit the Organizational Mission

    While a shortage of information poses peril, too much data can also be dangerous. Struggling to filter vast quantities of data increases the risk that a serious threat could be missed. Instead, it’s important to clearly define the organizational mission and develop focused data-gathering plans based on those specific needs.

    5. Identify Gaps in Security Intelligence

    There’s a familiar expression in the business world: You can’t manage what you can’t measure. Or, in the case of data security, what you can’t see. To understand risk, conduct a data audit to establish what data is available internally and identify coverage gaps that can be filled with third-party intelligence sources. This process enhances visibility into risk, allowing more effective cyberthreat assessment, elimination of wasted efforts by internal resources and cost savings through more selective use of outside services.

    6. Automate Data Filtering

    For routine or low-risk threats, develop algorithms to automatically filter the data. This lets analysts focus on a refined data set to more rapidly identify potential new threats and bring them to the attention of leadership in a timely manner.

    7. Maintain Global Awareness

    Understand vendors’ security measures, particularly if those vendors support data-related services such as cloud computing. In addition, visibility into the IP ranges of third parties facilitates a proactive response if a breach takes place outside their walls. Besides financial and reputational risks, a breach, even within a third party, can expose organizations to regulatory risk. For example, a data breach for a vendor that handles billing for a health system could expose the company to HIPAA violations and fines, even if the company was not directly responsible for the security lapse.

    8. Know Your Enemies

    The FBI and Interpol have “Most Wanted” lists for a reason—to raise awareness and make identifying criminals easier. Likewise, organizations should know their enemies. Cyberthreats are constantly evolving, which is why it’s critical to develop profiles for top cyberthreats based on the types of data that are likely targets and the cybercriminals, including nation-states, that would benefit from accessing that data. By creating robust profiles of adversaries, defensive strategies to mitigate risk can be developed.

    Traditional Defenses No Longer Work

    Because breaches are ultimately a nightmare for everyone, cyberattacks are a top concern for almost every organization today. In an age when traditional layered defense systems can no longer defend against complex attacks, it’s time to bolster defenses with comprehensive solutions supported by big data and analytics.

    Susan Lawson-Dawson is a business writer who covers trends, technology solutions and strategies.

    Read this article and more on TeradataMagazine.com.


    The post 8 Best Practices to Mitigate Cyberthreats appeared first on Magazine Blog.

    Teradata Blogs Feed

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc