See on gigaom.com
See on hoimoonmarketing.com
Social Inbox brings together the power of your social and email channels.
Using Social Inbox to Enhance Your Events Participation
Here’s an example of how you can use Social Inbox to amplify your company’s impact at live events.
Given the unstructured nature of much of this information–which may include posts on social media sites, audio and video files, logs, and clickstream data–it’s no surprise that organizations are trying to find the best methods to store and analyze it as efficiently and affordably as possible. When it comes to using Hadoop to replace or augment an enterprise’s current data warehouse, the consensus is split pretty much down the middle. Just over half (51%) of respondents want to use a Hadoop-based environment to augment their data warehouse, while 46% want Hadoop to replace their existing infrastructure.
It’s readily apparent, however, that enterprises are taking big data analytics seriously.
See on www.informationweek.com
Hortonworks‘ announcement of the Stinger Initiative last week claiming to make Hive 100 times faster utilising and introducing new core Hadoop technologies. It could result in a near-BigQuery-style performance for a wide range of Hadoop users. That would enable ad hoc and interactive data querying for large datasets, something that requires sophisticated, large, traditional data warehouse setups. Hadoop clusters would instantly solve a highly significant use-case in many companies and potentially become dual use.
See on www.bigdatarepublic.com
Preventing Cyberattacks with Database Activity Monitoring… Infosphere Guardium continuously monitors access to data in enterprise databases, data warehouses, file shares, document-sharing solutions, and big data environments such as Hadoop. It helps prevent unauthorized or suspicious activities by privileged insiders and potential hackers and automates governance controls in heterogeneous enterprises. InfoSphere Guardium can help you eliminate costly and high-risk manual and silo approaches to data security and compliance by unifying and automating regulatory compliance tasks, thereby reducing operational costs while dramatically reducing security risks.
See on www-01.ibm.com