Tagged: Practices Toggle Comment Threads | Keyboard Shortcuts

  • admin 9:52 am on March 12, 2017 Permalink
    Tags: , , Practices, , Ventana   

    Ventana IoT Best Practices Report 2017 


    Teradata Analyst Reports

     
  • admin 9:52 am on January 11, 2017 Permalink
    Tags: , , , , Planner, Practices,   

    5 Best Practices to Help You Be the Travel Planner for Your Customers Journey 


    Teradata Articles

     
  • admin 9:51 am on June 14, 2016 Permalink
    Tags: , , , , Dutch, Euro, , Misses, Practices, Saved, Soccer, ,   

    Why the Dutch Soccer Team Misses Euro 2016 and 4 Agile Marketing Best Practices That Could Have Saved Them 

    Latest imported feed items on Analytics Matters

     
  • admin 9:46 am on March 25, 2016 Permalink
    Tags: , BusinessObjects, , , Practices,   

    Teradata and SAP BusinessObjects Best Practices and Optimizations Overview 


    Teradata Web Casts

     
  • admin 9:50 am on March 16, 2016 Permalink
    Tags: , , , Practices   

    Best Practices for the Data Lake 


    Teradata Web Casts

     
  • admin 10:34 am on February 3, 2016 Permalink
    Tags: , , , , , Practices, , , , Who&#39s   

    Webinar: Best Practices for Data Lake – Who's Using It and How Can You Get the Most Value From It? 

    Data lakes are a hot topic, but beyond the hype it’s important to discover answers to who’s actually using them and if they are creating value. To understand the adoption and maturity of Data Lakes, Attunity, Hortonworks, and Teradata sponsored research to uncover key trends. The research surveyed 385 IT practitioners and stakeholders at organizations across industries and focused on key areas of concern and interest in Data Lake adoption.
    Teradata Events

     
  • admin 9:51 am on August 28, 2015 Permalink
    Tags: , Cyberthreats, , Practices   

    8 Best Practices to Mitigate Cyberthreats 

    8 Best Practices to Mitigate Cyberthreatsby Susan Lawson-Dawson

    High-profile data breaches are occurring more often these days. Why? It’s primarily because there is plenty of money to be made. As a result, cyberthieves are proving progressively more sophisticated and increasingly determined in their efforts to evade and break through security solutions.

    Keeping your data safe requires staying a step ahead of the bad guys. By following these eight best practices, you can get out in front of the problem and reduce your vulnerability to malicious attacks from both inside and outside the business. Moreover, you’ll be ready to implement quick countermeasures if a breach should occur.

    1. Align Functional and Strategic Intelligence Resources

    Even when security-focused processes are in place, without adequate cyberintelligence and analysis, it’s only possible to react to breaches—a response that’s the equivalent of closing the barn door after the horse has bolted. An optimized cyberintelligence program incorporates both functional and strategic analysis that improves the ability to develop timely, proactive intelligence solutions, communicate potential threats and security risks to the C-suite, and fine-tune data gathering tools to meet analysts’ needs more efficiently.

    2. Develop a Collaborative Culture for Sharing Information

    Early this year in New York City, representatives of government agencies, the private sector and academia came together at the fifth International Conference on Cyber Security to promote a collaborative environment to create a more secure world. It was just one of many similar conferences taking place across the globe.

    Experts at these events emphasize that risk is shared, so information surrounding data security must be shared as well. Improving awareness across the enterprise is also critical. To heighten awareness, make sure internal departments understand threat exposure, the risks and consequences of cyberattacks, and that individual employees are trained about their roles in maintaining data security.

    3. Allocate Resources Based on Threat Potential

    Relying on a one-size-fits-all approach to cybersecurity creates more challenges than advantages. It limits the scope of the implementation and restricts agility as cyberthreats evolve and become more sophisticated. Implementing a tiered threat model enables rapid assessment and prioritization of potential threats and targets, and then appropriate allocation of resources. This approach supports cost-effective risk mitigation and agile responses.

     4. Design Programs to Suit the Organizational Mission

    While a shortage of information poses peril, too much data can also be dangerous. Struggling to filter vast quantities of data increases the risk that a serious threat could be missed. Instead, it’s important to clearly define the organizational mission and develop focused data-gathering plans based on those specific needs.

    5. Identify Gaps in Security Intelligence

    There’s a familiar expression in the business world: You can’t manage what you can’t measure. Or, in the case of data security, what you can’t see. To understand risk, conduct a data audit to establish what data is available internally and identify coverage gaps that can be filled with third-party intelligence sources. This process enhances visibility into risk, allowing more effective cyberthreat assessment, elimination of wasted efforts by internal resources and cost savings through more selective use of outside services.

    6. Automate Data Filtering

    For routine or low-risk threats, develop algorithms to automatically filter the data. This lets analysts focus on a refined data set to more rapidly identify potential new threats and bring them to the attention of leadership in a timely manner.

    7. Maintain Global Awareness

    Understand vendors’ security measures, particularly if those vendors support data-related services such as cloud computing. In addition, visibility into the IP ranges of third parties facilitates a proactive response if a breach takes place outside their walls. Besides financial and reputational risks, a breach, even within a third party, can expose organizations to regulatory risk. For example, a data breach for a vendor that handles billing for a health system could expose the company to HIPAA violations and fines, even if the company was not directly responsible for the security lapse.

    8. Know Your Enemies

    The FBI and Interpol have “Most Wanted” lists for a reason—to raise awareness and make identifying criminals easier. Likewise, organizations should know their enemies. Cyberthreats are constantly evolving, which is why it’s critical to develop profiles for top cyberthreats based on the types of data that are likely targets and the cybercriminals, including nation-states, that would benefit from accessing that data. By creating robust profiles of adversaries, defensive strategies to mitigate risk can be developed.

    Traditional Defenses No Longer Work

    Because breaches are ultimately a nightmare for everyone, cyberattacks are a top concern for almost every organization today. In an age when traditional layered defense systems can no longer defend against complex attacks, it’s time to bolster defenses with comprehensive solutions supported by big data and analytics.

    Susan Lawson-Dawson is a business writer who covers trends, technology solutions and strategies.

    Read this article and more on TeradataMagazine.com.

     

    The post 8 Best Practices to Mitigate Cyberthreats appeared first on Magazine Blog.

    Teradata Blogs Feed

     
  • admin 9:54 am on June 16, 2015 Permalink
    Tags: , , , , HelloBEST, , , , Practices,   

    HelloBEST Best Practices For Email Marketing: What You Need To Know About Data Transparency 

    MAAWGThis post was authored by a leader of Teradata’s Global Deliverability team, Mary Youngblood, director, Reputation Desk.

    In my last post, I discussed the three levels of email marketing consent and the best ways for you to obtain email addresses. Today, I’d like to explore another hot topic for email marketers: data transparency.

    As outlined in the recently updated Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Sender Best Common Practices, data transparency involves multiple, disparate elements, including Authentication, Correct Up-To-Date Whois Information, Technical IP Information, Shared vs Dedicated IP Environments, Vetting Practices, Feedback Loops (FBLs), Forwarding Services and Connection/Non Delivery Report (NDR) Handling (aka Email Bounces).

    If you don’t have time to read all 17 pages of the M3AAWG document, here are my key takeaways:

    Authentication

    Authentication is one of the primary ways senders/marketers can identify and verify themselves and their data. The main email authentication protocols that every ESP should make available to sender/marketers who qualify for use are:

    • DKIM – Combines key signing technology with DNS records to authenticate a message as being signed by the owner of the domain.
    • SPF – Uses DNS to authorize IPs to send on behalf of a domain or bounce domain.
    • SenderID –Employs DNS to authorize IPs to send on behalf of a domain or bounce domain, based on the same records as the SPF protocol. Used mainly by Hotmail and is being phased out.
    • DMARC – Uses DKIM and SPF records for the same domain to establish a tighter authentication protocol. Senders/marketers in shared environments may have trouble with this protocol if they are required to share the same bounce domain.

    Correct Up-To-Date Whois Information

    Correct Up-To-Date Whois Information is available through online services and analytics tools that provide information as to the owner and/or user of a domain or IP address. These services can answer questions like:

    • Does the From Domain contain accurate Whois information about the sender/marketer?
    • Does the Whois information provide alternative ways to contact the Sender/Marketer with questions, complaints and unsubscribe requests?
    • Is there Whois information for the IP that includes the ESP/sender’s information so that complaints and/or unsubscribe requests can be made against the marketer?

    Technical IP Information

    Technical IP Information includes Forward DNS, Reverse DNS and HELO (or EHLO). You need to know that:

    • The ESP or sender must have the correct settings for these items established in their DNS records and MTA settings.
    • These records and settings help to properly identify the sending IP and the Host Name of the Sending IP. Spammers usually do not do this, so the good guys do this as a way to set them apart from looking like spammers.

    Shared vs Dedicated IP Environments

    Please be aware that:

    • Some sender/marketers do not have enough consistent volume to justify being on their own dedicated IPs, so they will share an environment with other sender/marketers.
    • There are pros and cons to participating in a shared environment. If one user of the environment does something to harm the reputation, all users may suffer the consequences.
    • Optimally, shared environments contain like users, meaning that users have similar metrics and content and are thoroughly vetted before being allowed into the environment.
    • Shared environment users should differentiate themselves from other users in the environment by authenticating with DKIM.

    Vetting Practices

    Vetting is a way for ESPs to determine whether a sender/marketer is the right type of client for what they do. The wrong sender/marketer can not only cause issues for other clients but can also damage the reputation of the ESP as a whole. Vetting the sender/marketer’s sending history, reputation, content and list before signing a contract can prevent finding out too late that the sender/marketer was not a good fit. Also, it’s imperative to have a process in place after the sender/marketer has begun sending.  For instance,  bounce rate thresholds, complaint thresholds, etc. can act as red flags that the email list in use may contain old or non-consent data that may compromise theirs and your overall reputation.  Having policies in place that watch for reputation issues is a must.

    Feedback Loops (FBLs)

    Most major ISPs offer Feedback Loops (FBLs). FBLs not only help in the removal of end users that do not want to receive future emails from a sender/marketer, but they also help ESPs monitor clients sending trends, list hygiene issues and content relevancy.

    Forwarding Services

    ESPs should have the capability to forward reply-to addresses and from addresses back to the sender/marketer. There should also be a way to collect all abuse@domain and postmaster@domain mail for either the ESP to use, or to forward to the sender/marketer to monitor for complaints and unsubscribes.

    Connection/Non Delivery Report (NDR) Handling, aka Email Bounces

    Do you know what response codes (ex: 2.x.x, 4.x.x, 5.x.x) mean and how to respond?

    For each email sent, the receiving mail server either issues a code of 2.x.x, 4.x.x, 5.x.x, with the x’s representing a number that pertains to an action or a reason.  Along with each code, there is usually a description of the action or problem that was associated with the message or the connection attempt.  Here is what the response codes mean:

    • 2.x.x – Message was Accepted by receiving mail server (Delivered).
    • 4.x.x – Temporary Failures (Deferrals) – Try again Later, may be a temporary network issue or a rate limiting issue.
    • 5.x.x – Permanent Failures  (Bounces) – Don’t try anymore, it’s not going to deliver today. Includes User Unknowns (Hard), Blocks, Full Mailboxes (Soft), Authentication Errors, Out of Office Messages, Dead Domains.

    Having the mail servers (MTAs) set to properly interpret the codes and take the correct action is a must.  Part of that interpretation and action include giving the bounce a categorization, such as Hard, Soft, Network, DNS, Informational, Block, Temporary, etc.  These categorizations help the MTAs determine the next course of action and help sender/marketers understand issues with the data or segmentations. A few more insights about bounces:

    • You need to determine whether your bounces are synchronous or asynchronous. Does the bounce happen during the mail server conversation (synchronous) or afterwards at a separate time (late bounce or asynchronous)? When bounces happen during the mail server conversation (Synchronous), the sending mail server can make decisions on the best way to proceed and will have an easier time determining the reason for the bounce and how to process.
    • When bounces happen after the mail server conversation, the mail is first considered Delivered and must then be updated to Undelivered, if the Late Bounce (Asynchronous) is determined to be a non-delivery failure versus a simple out of office reply.  Asynchronous bounces are often wordy and more difficult to categorize which can cause some confusion as to the nature of the bounce.
    • ESP operators will need to constantly monitor bounces and categorizations of them as sometimes ISPs and other receivers will change these Non Delivery Reports (bounces) from time to time. M3AAWG emphasizes that removing hard bouncing addresses and those that permanently bounce repeatedly is an important part of list hygiene and the failure to do so can cause delivery issues at recipient domains.

    Want even more detail about best practices regarding email marketing data transparency? You can read the entire M3AAWG document here.

    The post HelloBEST Best Practices For Email Marketing: What You Need To Know About Data Transparency appeared first on Teradata Applications.

    Teradata Blogs Feed

     
  • admin 9:51 am on June 6, 2015 Permalink
    Tags: , Consent, , , , Practices,   

    BEST Best Practices For Email Marketing: The Three Levels Of Consent 

    MAAWGThis post was authored by a leader of Teradata’s Global Deliverability team, Mary Youngblood, director, Reputation Desk. 

    We’re all familiar with the term “Best Practice.” But we all also know that the phrase can mean different things to different people, and in many cases is now synonymous with “mediocrity.” That’s why I want to make it clear that the Best Best Practice is one that serves all who are involved in what is happening. In email marketing, the Best Best Practice should serve the end user (the person receiving the email), the ISP or domain who has to receive the mail on the end user’s behalf, the ESP or entity sending the mail on behalf of the sender/marketer and finally, the sender/marketer. Each of these parties has its own expectation of how email marketing should be performed. But does one have more priority than another?

    According to the recently updated Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Sender Best Common Practices:

    “The end user and their expectations should be the highest priority. It does not matter what a sender is legally allowed to do or is granted the right to do under a privacy policy; what matters is that the recipient, their preferences and their expectations be respected.”

    One sided? Maybe not. M3AAWG reminds us that following all best practices does not guarantee hassle free delivery and/or happy recipients, but it does greatly improve the likelihood of success, while minimizing the headaches for marketers and ESPs.

    (Note: For those of you who aren’t familiar with it, M3AAWG is a Messaging Anti Abuse organization that periodically gathers the leaders in the ISP, ESP, Messaging and IT Security industries to address ongoing and emerging messaging abuse issues. M3AAWG proposes, initiates and supports changes that help improve the messaging industry for the global market including senders, receivers and the end users of messaging technology.)

    So, without reading all 17 pages of the M3AAWG document, what do you need to know in order to be compliant with these Best Common Practices? It boils down to Consent and Data Transparency. By “Consent,” I mean how end users are added to mailing lists. By “Data Transparency,” I’m referring to how easy it is to determine who sent the email and how to resolve issues directly with them.

    CONSENT

    Consent can trip up the most well-intentioned sender/marketer. After all, email addresses can now be procured in many different ways, and most seem completely innocent, thoughtful or “just good business.” But be careful. Without the right type of consent, senders/marketers can find themselves and their message in trouble with respect to reputation, legality and deliverability –and each one of these can negatively affect the bottom line. Instead of going through all the methods you need to avoid, let me highlight three of the best ways for you to obtain email addresses:

    • Level 1 – Single Opt-In (Good). With Single Opt-In, users knowingly and clearly take- action to indicate that they agree to receive emails from the sender/marketer being represented at the time of consent. Other conditions may apply. For instance,  the user may only be agreeing to receive emails in reference to one subject or product that was involved at the time of consent. The sender/marketer should make it clear at time of sign-up what to expect (types of emails that will be sent, from whom, frequency and how to unsubscribe).
    • Level 2 – Single Opt-In with Notification (Better).The guidelines for Single Opt-In with Notification are the same as for Single Opt-In consent, except a confirmation email is sent to the address within 24 hours (or preferably, immediately) to remind the subscriber of what he/she signed on to receive, from whom, frequency and how to unsubscribe. M3AAWG also recommends that you encourage users to then add the address into their white lists or address lists to ensure they receive the messages uninterrupted.
    • Level 3 – Confirmed Opt-In (aka “double opt-in” or “closed-loop subscription”) (Best). In this case, the user participates in the Single Opt-In with Notification type of consent, however, to complete the consent for Confirmed Opt-In, the notification contains instructions for the user to take affirmative action that adds them to the mailing list. These are usually links that the user can click on to confirm that the notification was sent to the correct address and to acknowledge that the user agrees to the addition of their address to the mailing list. To mitigate the risk that they become caught in spam filtering, these notifications should be kept simple and not contain advertising.

    I’d also like to point out that there is a fourth type of consent, called Implied or Implicit consent. This type of consent is assumed when “permission is inferred by a person’s interaction with an organization.” However, Implied consent comes with strict warnings about the risk and interpretation of consent, and I’d recommend that the long term goal should be to work with users to transition towards the three types of consent described above.

    Regardless of which type of consent you use to build your mailing lists, it is important to record and retain the information about the method(s) of sign up (ex: date, time, IP address and even screen captures of the language on the page that the user agreed to and all relevant privacy policies that were in place at the time of subscription). This information can be a lifesaver after a block listing, if there are questions about a user’s sign up or if you need to investigate delivery problems associated with certain sign-up methods.

    A few additional clarifications:

    • M3AAWG maintains that purchased email addresses, including Appends or eAppends, do not have consent of the user and are therefore not to be used for email marketing.M3AAWG also reminds everyone that having the correct Unsubscribe mechanisms in place and Adequate Data Security are necessary parts of maintaining consent and protecting a consenting user’s data from outside parties that would abuse the information and the end user (up to and including the use for identity theft purposes).

    So that covers Best Best Practice for Consent. But what about Data Transparency? Isn’t having a ‘From Address’ in the email enough? That’s a great question, but you’ll have to stay tuned for my answer. I’ll cover authentication and much more in my next post, “BEST Best Practices For Email Marketing: What You Need To Know About Data Transparency.”

    Want even more detail about best practices regarding email marketing consent? You can read the entire M3AAWG document here.

    The post BEST Best Practices For Email Marketing: The Three Levels Of Consent appeared first on Teradata Applications.

    Teradata Blogs Feed

     
  • admin 9:55 am on March 30, 2015 Permalink
    Tags: , , Execution, Practices,   

    Best Practices for Big Data Strategy Execution 

    by David A. Kelly

    To identify the essential components for any big data strategy, Teradata Magazine spoke with three noted experts who have conducted substantial research and handled the physical implementations of big data initiatives. Each one addresses a best practice you can adopt to develop your successful strategy:

    > View Big Data as a Valued Corporate Asset

    Like existing corporate data sources, the information in the ever-expanding world of big data needs to be viewed as an important asset. Organizations have to dedicate resources and capital to manage and take advantage of the new opportunities that big data provides, including using it in conjunction with all of their other data—it’s the combination of data that makes it the most powerful. One of the main benefits of the data is the ability to accelerate innovation and create new business or service models.

    “Before the advent of big data, there was often a feeling of ownership when it came to data that was generated or used within organizations. Departments would define set data as ‘theirs.’ But now, with big data, it’s no longer about just how a single group should manage or use data, it’s about how that data can benefit the organization as a whole. It’s really a different way of looking at data and the value it can bring to an organization. With big data, your corporate view has to be more expansive.”

    —Vince Dell’Anno, managing director, Information Management – Data Supply Chain, Accenture Analytics

    > Foster a Culture of Embracing Data

    To obtain the full benefits of a big data strategy, cultural changes are often needed on both the business and IT side. Organizations need to foster attitudes that value creativity, experimentation and taking data-informed risks. Business and IT leaders need to be willing to challenge, adapt and refine both their strategy and execution plans based on data and practice fact-based decision making.

    “With big data, the business side of an organization needs to be open to having its assumptions second-guessed. There’s no point in exploring big data if the results will have no effect on how the business is run. It can be uncomfortable, but a business needs to be open to the impact that the analysis of big data can have. At the same time, IT organizations need to take a different view—they need to be more open and encouraging about the use of different types of data, and be more business and user-driven.”

    —David Stodder, director of business intelligence, TDWI Research

    Collect Diverse Data, Then Follow Up With Action

    Organizations need to integrate data as a foundation for cross-functional analysis while also developing ways to measure and track data that can govern the business. Big data allows organizations to empower both front and back office functions through better access to more information. Employees can take action at the point of insight, increasing responsiveness and agility.

    “By collecting a wide variety of customer interaction data, including social media interactions, organizations can leverage data to understand the customer and customer experience better to improve customer retention and customer experience.”

    —Dan Vesset, vice president, Business Analytics and Big Data Program for IDC

    Read more about big data strategy in the Q1 2015 issue of Teradata Magazine.

    David A. Kelly is a Boston-based freelance writer who specializes in business, technology and travel writing.

    The post Best Practices for Big Data Strategy Execution appeared first on Magazine Blog.

    Teradata Blogs Feed

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel