Editors' Picks
-
Does business have the patience for data science?
A data scientist call to arms, say hello to NFC jewelry, and the Magic Quadrant for mobile app dev platforms: The Data Mill reports.09 Sep 2013
-
Agile principles, for IT and across the enterprise
Agile principles push beyond the boundaries of IT and across enterprise.04 Sep 2013
-
Does a cloud storage gateway offer DR-specific functionality?
Paul Kirvan discusses whether cloud storage gateways offer disaster recovery-specific functionality in this Expert Response.03 Sep 2013
-
Semi-structured data is king of LinkedIn's recommendation engine
LinkedIn's semi-structured data shines, CVS responds to social media finger wagging, and Microsoft does the shuffle, The Data Mill reports.03 Sep 2013
-
Gartner Magic Quadrant: Data integration tools must offer versatility
The 2013 Gartner Magic Quadrant for Data Integration Tools focuses on the growing demand for products that combine integration and other capabilities.28 Aug 2013
-
Community cloud could fix data crunching dilemma for cancer research
Building a community cloud for cancer research, make-it-yourself data and a new report on emerging tech: The Data Mill reports.26 Aug 2013
-
A midsummer night's bad dream: The CIO position regresses
The seamless integration and provisioning of IT services is a lofty goal for even the most seasoned CIO. We don't have time for that.21 Aug 2013
-
Gartner describes the building blocks for a strong MDM program
MDM teams should consider these seven building blocks, outlined by Saul Judah, research director on the information management team at Gartner Inc.15 Aug 2013
-
Tech choices loom large on MDM strategy, despite process focus
Despite the heavy focus on people, policy and process in MDM programs, there are still many technological challenges that teams must deal with.15 Aug 2013
-
Are HR and finance systems really better together?
In addition to analytics benefits, having HR and finance systems tightly integrated is becoming more important in the wake of Obamacare.15 Aug 2013
-
Three bad mistakes that will sabotage your ITSM program
ITSM needs to serve the business, not obsess over IT metrics. Here are characteristics that will stop your ITSM program dead in its tracks.13 Aug 2013
-
Forging an ITSM strategy that's about business impact, not IT metrics
ITSM strategy is not just about closing help desk tickets or managing change requests. It's about solving business problems and generating revenue.13 Aug 2013
-
A midsummer night's bad dream: The CIO position regresses
The seamless integration and provisioning of IT services is a lofty goal for even the most seasoned CIO. We don't have time for that.07 Aug 2013
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.07 Aug 2013
-
Netflix uses the OODA loop to stay ahead of the competition
OODA loops, the death of the IT department and personal privacy. The Data Mill brings news from the Gartner Catalyst conference.05 Aug 2013
-
Best practices for buying an order management system
Get expert and user tips on what features to look for when vetting order management systems, as well as implementation and end-user training advice.01 Aug 2013
-
Prescriptive analytics is coming to a future near you
It is only a matter of time before algorithms rule the world. Humans, meet prescriptive analytics.31 Jul 2013
-
Gartner Catalyst Conference 2013: Insights, highlights, tips
This article provides a quick roundup of expert commentary from the 2013 Gartner Catalyst Conference, 'Harness the Power of IT Convergence.'31 Jul 2013
-
Order management system allows users to effectively target customers
Find out how the information gleaned from order management systems can help organizations tailor marketing campaigns to specific customer segments.30 Jul 2013
-
Data warehousing architecture gets a big data makeover
In the digital age, data warehousing architecture shies away from the monolithic enterprise data warehouse in favor of flexibility.24 Jul 2013
Security Management Strategies for the CIO