Gartner Blog Network

Category: 'analytics' Blog Posts

from the Gartner Blog Network

Two Main Questions about Big Data

by Svetlana Sicular  |  April 16, 2015

More and more people describe the speed of big data technologies in dog years. In the lightning-fast cadence (“fail fast”), considerations for actual technical professionals who are deploying big data...

Read more »

First Crop of R&D Cool Vendors

by Michael Shanler  |  April 13, 2015

After what felt like New England winter that would never end…Spring is finally here.  Daylight hours are stretching, the rays of gold are streaking through the tall pines, and most...

Read more »

The Future Is Here ... And It Is ... Network? Endpoint?

by Anton Chuvakin  |  April 9, 2015

We lost the network – MUST focus on the endpoints! We lost the endpoint – MUST focus on the network! We lost the network – MUST focus on the endpoints!...

Read more »

Cool Vendors in Information Innovation, 2015

by Jim Hare  |  April 7, 2015

Very cool! Gartner just published this year’s profile of four emerging vendors who offer unique approaches to managing and analyzing information: Connotate, Integro, MapLarge, and SumAll. Cool Vendors in Information...

Read more »

Pearls of Wisdom from a Chief Data Officer

by Andrew White  |  April 3, 2015

At the close of our 2015 Enterprise Information and Master Data Management summit yesterday Deb Logan hosted a "master mind" interview with Dr. Eugene Kolker, CDO, Seattle Children’s Hospital.  It was an...

Read more »

Return of the Data Scientist

by Svetlana Sicular  |  March 27, 2015

I am convinced, data science was not born in 2008 — it’s just the term “data scientist” which has been coined that year.  I wrote a blog post Data Scientist...

Read more »

Now That We Have All That Data What Do We Do, Revisited

by Anton Chuvakin  |  March 10, 2015

How very interesting: many organizations’ journey towards the real security analytics and data-driven security starts with this line: We have SO much security data, how do we make sense of...

Read more »

Who Validates Alerts Validated by Your Alert Validator Software?

by Anton Chuvakin  |  March 6, 2015

Pardon the idiotic title, but some recent discussions around security analytics have made this question practically relevant. So: You have a SIEM and other security technologies focused on detection and...

Read more »

The Politics of Analytics - and how Standards might help

by Andrew White  |  March 5, 2015

We all know the maxim - There are lies, damn lies, and then there are statistics.  Well, two recent opinion pieces in the US print edition of the Wall Street...

Read more »

Killed by AI Much? A Rise of Non-deterministic Security!

by Anton Chuvakin  |  March 3, 2015

Remember [some] NIDS of the 1990s? Specifically, those that were unable to show the packets that matched the rule triggering the alert! Remember how they were deeply hated by the...

Read more »