NOV 1, 2010

Related Links

Adopting a Multi-Pronged Approach to Cyber Risk
September 15, 2014
Artificial Intelligence Meets the C-suite
September 15, 2014
Business Analytics Services Spending to Reach $89.6 billion in 2018
September 15, 2014

Web Seminars

Why Data Virtualization Can Save the Data Warehouse
September 17, 2014
Essential Guide to Using Data Virtualization for Big Data Analytics
September 24, 2014

Is Data Science?

Print
Reprints
Email

"If I want to track a bad guy, I would look at all the things that can be tracked. I would track his credit cards, I would track when he swipes a badge at a parking lot, I'd track his EZ-Pass and I'd want some analytics that transform the relevant parts of the data into dots of locations and times."

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Filed under:

Advertisement

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.