Nelson Williams
Latest from Nelson Williams
Data democratization creates value through speed and access
Collecting and storing commercial data is one thing, but who uses that data? Getting data to end users in a quick, efficient manner is one way to monetize information. New technologies are making it possible for companies to open up their data to their analysts, marketers and executives while retaining control and governance over the data. “We ...
What tech really needs from investors: modern operations, old-school cool
The startup scene has become synonymous with the technology industry, as software applications can be spun up and commoditized at an ever-increasing pace these days. Even as venture capitalists flock to the booming tech sector, the established business of investments must keep pace. “The way we think of it is combining the craft of old-school ...
Big data stewardship, mobility build a foundation for machine learning
When it comes to business, machine learning is a powerful and disruptive technology, thanks to its ability to learn from and teach itself with vast amounts of “internet of things” data sourced from employee and manufacturing devices like laptops, equipment sensors and shipment trackers. But this type of cognitive computing couldn’t happen without emerging tools from open-source efforts, like Hadoop’s ...
Data is only valuable when used by people to make better decisions
Doing business in the modern world means collecting data. However, data that’s locked up in storage isn’t worth much to corporations. Neither, really, is processed data. For data to be useful, it must be part of a decision, leveraging artificial intelligence and machine learning technologies to aid those people who need data the most. When they use ...
Bridging new-school data analytics with legacy applications
Data analytics is now an established part of the business world. However, companies must choose their analytics platforms with care. The concern is choosing a solution that plays well with other, existing applications and databases. Pivotal Software Inc. turned to the open-source community and its own non-proprietary initiatives like Cloud Foundry and Greenplum to build a ...
To bring big data up to speed, business apps must catch up
Big data still holds the promise of redefining business analytics, but software applications’ rapid-fire version releases make it difficult for businesses to keep up. While companies want to stay on the cutting edge of information technology, they also like to keep the infrastructure and applications they’ve already purchased. This tug of war has slowed the adoption ...
Are machine learning and metadata the new central nervous system for business?
The tech world is in a constant state of flux as new technologies enter the mix. And for businesses, this means new ways to collect, store and use data. However, controlling data and running applications on it is not easy, which is why companies are experimenting with machine learning and metadata. “To be candid, it’s ...
Mining data gold: Companies search for real-time insights
If data is a mine, insights are the gold. And to improve the bottom line, businesses are mining data for key insights. But what happens after they find that gold? To be useful, data insights must empower a company to do better business, and now tech companies are discovering new ways to generate actionable business insights in ...
Building up and out from the data lake: Data management platforms to the rescue
The business world knows there is power in data; however, harnessing that power requires a new technology infrastructure. Most companies are not prepared to build these systems by themselves, as too many choices and options make the process confusing. So data management companies like Datameer Inc. are building big data platforms to do the job. ...
Holistic cybersecurity: Jiffy Lube focuses on insider threats to protect data
The bad guys aren’t just lurking somewhere across the internet — companies also face security threats from inside their own walls. Employees have access to all kinds of things, and by accident or on purpose, they can cause serious cybersecurity problems. An effective security program must take this into account. “I started a program that ...