Enterprise Information Management in IT-CMF

Size: px
Start display at page:

Download "Enterprise Information Management in IT-CMF"

Transcription

1 Enterprise Information Management in IT-CMF Input for IVI EIM workgroup 25 September 2013

2 Agenda Overview of things we like to improve Detailed proposals for improvements Overview of accumulated decisions 1

3 BCG suggested improvements on EIM in the IT-CMF 1 Clear and sharp definition of EIM, data and information The EIM Masterdeck is not consistent in use of these terms Interchangeable use of terms will lead to miscommunications and misunderstandings 2 Align the CBB's in EIM with the CCB's in other IT-CMF CC's Level of detail Logical grouping of capabilities and CCB's Distinct maturity characteristics from capabilities 3 Take out CCB Business Continuity Planning as separate CCB Strong overlap with other CCB. 4 Align on the scope for Information security with respect to the ISM CC 5 Sharpen the definitions in the category Business Intelligence and Analytics Rename and redefine CCB to different types of Information Services 2

4 Agenda Overview of things we like to improve Detailed proposals for improvements Overview of accumulated decisions 3

5 1 BCG is aligned on the IT-CMF definition of EIM, however BCG proposes changes to emphasize its value to the business BCG definition of Information management Enterprise Information Management is the capability to.. leverage information.... across the enterprise.... in (near) real-time.... based on trusted data. Enterprise Information Management supports operations improves decision making and enables strategy IVI definition of EIM Enterprise Information Management (EIM) is the capability that develops, establishes, and manages operational systems to effectively gather, manage, disseminate, exploit, and dispose of media 1 based data and information. Enterprise information management combines the strategic, operational, and security aspects of information management; with the capabilities to analyse and exploit information. Proposed new definition of EIM Enterprise Information Management (EIM) is the capability that develops, establishes, and manages systems and processes to effectively gather, manage, disseminate, exploit, and dispose of media 1 based data and information. Enterprise information management combines the strategic, operational, and security aspects of information management; with the capabilities to analyse and exploit information. Agree to the new definition 4

6 1 Key definitions are not consistently used through the deck IVI definitions of data and information Data Information Facts represented as text, numbers, graphics, images, sound, or video. Data is the raw material used to represent information, or from which information can be derived. (Everest 2010) 1. Generally, understanding concerning any objects such as facts, events, things, processes, or ideas, including concepts that, within a certain context and timeframe, have a particular meaning. 2. The interpretation of data based on its context, including the 1. The business meaning of data elements and related terms, 2. The format in which the data is presented, 3. The timeframe represented by the data, 4. The relevance of the data to a given usage. (DAMA-DMBOK Guide, 1 st Ed., Pg. 2) Definition under 2 seems to be sufficient. Propose to take bullet 1 out. Agree to the rigorous application of definitions across the EIM CC materials 5

7 2 Many of the EIM Critical Building Blocks are also addressed in other CC of the IT-CMF Category Capability Building Block Overlap with other CC Strategy and Organization Standards, Policies, and Controls Information Management Business Intelligence and Analytics Information Management Strategy Information Governance Competences and Communities Standards and Policies Controls Information Valuation Master Data Management Metadata Management Information Quality Information Lifecycle Management Business Continuity Planning Information Security Leadership Preparation Reporting SP: keep for Single CC assessment completeness ITG applied to EIM. keep for Single CC assessment completeness Seem to have overlap with Leadership Focus here on Communities; Competence merge in leadership CCB EAM -> keep exclude overlap with Information architecture EAM -> keep exclude overlap with Information architecture BAR -> keep for Single CC assessment completeness Check interface with SD Check interface with SD Better placed in TIM Check interface with ISM Overlap with competence CCB. Focus here on advisory and enterprise competence building Agree to exclude the overlaps across the EIM CC materials 6

8 3 Proposal for taking out Business Continuity Planning and integrate differently to emphasize business value delivered Category Capability Building Block Changes to scope Information Management Strategy Strategy and Organization Standards, Policies, and Controls Information Management Information Services ( renamed from Business Intelligence and Analytics) Information Governance Competences and Communities Standards and Policies Controls Information Valuation Master Data Management Metadata Management Information Quality Information Lifecycle Management Business Continuity Planning Focus on Communities Information Security Redefine see proposal 3 Advisory Provisioning Reporting and analytics Withdraw CCB and ensure embedding in TIM, Interfaces to EIM connect to Advisory CBB Focus on propagation of the capability through the enterprise for business value add. Include the competence building here Redefine as an Information service by renaming preparation to provisioning Add analytics Agree to proposed changes to the CCBs 7

9 4 Information Security should be aligned with ISM ISM Governance Information Security Strategy Develops, communicates, and supports the organization s IT security objectives so they fit the organization s business model and risk appetite. EIM Information Management Information Security Secures governance, processes and tools which an organization deploys to ensure the security, availability, integrity and accessibility of information throughout its lifecycle. Changed text ISM- Security Data Management Data Identification and Classifications Access Rights Management Life-cycle Management Defines security classifications and provides guidance for associated protection levels and access control. Manages the lifecycle of user accounts and certificates, and the granting, denial and revocation of access rights. Matches access control procedures to data classifications. Provides the security expertise and guidance to ensure that data throughout its lifecycle is appropriately available, adequately preserved and/ or destroyed to meet business, regulatory and/ or security requirements. Agree to adjust EIM Information Security CBB 8

10 5 Sharpening the definition of the category business intelligence and analytics Category Business Intelligence and Analytics Capability building block Leadership Preparation Reporting Description Promotes business intelligence and analytics as the basis for decision making and develops an evidence based culture. Provides clean, common, integrated and accessible information for explorative and confirmative analytical purposes that may have unique distinctive properties that enable competitive advantage. Provides a mix of regular reporting, ad hoc reporting and analytical applications for selfservice reporting on business, technical and forensic information. Covers naming of technological developments Leadership as defined here is maturity level description. Reporting is here to narrowly defined, analytics themselves should be included This is a service provided; What is the capability here? IVI_IT-CMF_EIM_MasterDeck.pptx 9 BCG Perspective on EIM v4 pptx.pptx 9 Draft for discussion only

11 5 Proposed renaming of the 4th Category to Information Services and redefinition of the CCB Naming aligned with the new description Ensure capability to drive business value from EIM is shared among business leaders and right level of expertise in engaged in new designs. Category Information Services Capability building block Advisory Provisioning Reporting and Analytics Description Advocates and designs and new application of the information to support decision making Provides consistent, common, integrated and accessible information for reporting and analytical purposes that may have unique distinctive properties that enable competitive advantage. Provides a mix of regular reporting, ad hoc reporting and analytical applications for selfservice reporting on business, technical and forensic information. All CCB are capabilities to deliver a product to business users. Bundling this capability enables having deep expertise available to deliver business value Naming changed to include any analytics to go with reporting Focus on delivering continually the automated transformation including gathering, cleaning and cleansing data to information that is meaningful to the users Agree to the proposed changes IVI_IT-CMF_EIM_MasterDeck.pptx 10 BCG Perspective on EIM v4 pptx.pptx 10 Draft for discussion only

12 Agenda Overview of things we like to improve Detailed proposals for improvements Overview of accumulated decisions 11

13 Summary of changes to Categories and CCB in the Enterprise Information Management Critical Capability Stage 2 revision 5 Stage 2 revision 6 Category Capability Building Block Category Capability Building Block Strategy and Organization Information Management Strategy Information Governance Competences and Communities Strategy and Organization Information Management Strategy Information Governance Communities Standards, Policies, and Controls Standards and Policies Controls Standards, Policies, and Controls Standards and Policies Controls Information Valuation Information Valuation Master Data Management Master Data Management Information Management Metadata Management Information Quality Information Lifecycle Management Information Management Metadata Management Information Quality Information Lifecycle Management Business Continuity Planning Information Security Information Security Advisory Business Intelligence and Analytics Leadership Preparation Reporting Information Services Provisioning Reporting and analytics 12

14 Thank you bcg.com bcgperspectives.com

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

Page 1. Executive Briefing, January 2013 Sheila Upton. Information Management and Big Data a Framework for Success

Page 1. Executive Briefing, January 2013 Sheila Upton. Information Management and Big Data a Framework for Success Page 1 Executive Briefing, January 2013 Sheila Upton Information Management and Big Data a Framework for Success Abstract More than ever before, information can create significant competitive advantage

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Developing organisational capability in programme & project management. David Trevitt, IVI Senior Advisor 16 th October 2014

Developing organisational capability in programme & project management. David Trevitt, IVI Senior Advisor 16 th October 2014 Developing organisational capability in programme & project management David Trevitt, IVI Senior Advisor 16 th October 2014 Innovation Value Institute 2014 Developing organisational capability in programme

More information

Big Data and Big Data Governance

Big Data and Big Data Governance The First Step in Information Big Data and Big Data Governance Kelle O Neal kelle@firstsanfranciscopartners.com 15-25- 9661 @1stsanfrancisco www.firstsanfranciscopartners.com Table of Contents Big Data

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint

Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint Veli-Matti Vanamo - Principal Consultant at Ignia - 12 Year SharePoint Veteran (there should

More information

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information

More information

Cisco Data Preparation

Cisco Data Preparation Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and

More information

An enterprise grade information security & forensic technical team

An enterprise grade information security & forensic technical team An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital

More information

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA. Using Enterprise Content Management Principles to Manage Research Assets Kelly Mannix, Manager Deloitte Consulting Perth, WA November 2010 Agenda Introduction Defining ECM Understanding the Challenges

More information

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.

IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved. IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty

More information

VMware Virtualization and Cloud Management Solutions. A Modern Approach to IT Management

VMware Virtualization and Cloud Management Solutions. A Modern Approach to IT Management VMware Virtualization and Cloud Management Solutions A Modern Approach to IT Management Transform IT Management to Enable IT as a Service Corporate decision makers are transforming their businesses by

More information

Ellipse The Enterprise Asset Management (EAM) solution for asset intensive industries

Ellipse The Enterprise Asset Management (EAM) solution for asset intensive industries Ellipse The Enterprise Asset Management (EAM) solution for asset intensive industries Ellipse is a fully-integrated Enterprise Asset Management (EAM) application suite providing complete visibility and

More information

] Joan R. Ward, Excellus BlueCross BlueShield Amy Clark, Excellus BlueCross BlueShield Ina Mutschelknaus, SAP

] Joan R. Ward, Excellus BlueCross BlueShield Amy Clark, Excellus BlueCross BlueShield Ina Mutschelknaus, SAP Orange County Convention Center Orlando, Florida May 15-18, 2011 Information Governance in Insurance: How to Establish your Organization, and How to Grow in Smart Ways ] Joan R. Ward, Excellus BlueCross

More information

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through

More information

Data Maturity Survey in Financial Services

Data Maturity Survey in Financial Services Percent of Responses Data Maturity Survey in Financial Services June 29, 2015 Executive Summary PanoVista.co LLC is conducting a high level, indicative survey regarding the maturity and future state of

More information

Digital Archives Migration Methodology. A structured approach to the migration of digital records

Digital Archives Migration Methodology. A structured approach to the migration of digital records Digital Archives Migration Methodology A structured approach to the migration of digital records Published July 2014 1 Table of contents Executive summary... 3 What is the Digital Archives Migration Methodology?...

More information

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science

More information

Department of Information and Technology Management

Department of Information and Technology Management INFOTEC Overview Department of Information and Technology Management Introduction The Information and Technology Management Department (INFOTEC) is responsible for providing modern, secure, fit for purpose

More information

www.ducenit.com Analance Data Integration Technical Whitepaper

www.ducenit.com Analance Data Integration Technical Whitepaper Analance Data Integration Technical Whitepaper Executive Summary Business Intelligence is a thriving discipline in the marvelous era of computing in which we live. It s the process of analyzing and exploring

More information

ORACLE FUSION PERFORMANCE MANAGEMENT

ORACLE FUSION PERFORMANCE MANAGEMENT ORACLE FUSION PERFORMANCE MANAGEMENT STRATEGIC PERFORMANCE MANAGEMENT KEY FEATURES Intuitive task list and navigation easily directs users to the next step to take Informational region within performance

More information

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

SAP BusinessObjects. Solutions for Large Enterprises & SME s

SAP BusinessObjects. Solutions for Large Enterprises & SME s SAP BusinessObjects Solutions for Large Enterprises & SME s Since 1993, we have been using our BI experience to ensure you buy the right licences at the lowest price, thus helping to deliver the best and

More information

Master big data to optimize the oil and gas lifecycle

Master big data to optimize the oil and gas lifecycle Viewpoint paper Master big data to optimize the oil and gas lifecycle Information management and analytics (IM&A) helps move decisions from reactive to predictive Table of contents 4 Getting a handle on

More information

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

Chartis RiskTech Quadrant for Model Risk Management Systems 2014 Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant

More information

Knowledgent White Paper Series. Developing an MDM Strategy WHITE PAPER. Key Components for Success

Knowledgent White Paper Series. Developing an MDM Strategy WHITE PAPER. Key Components for Success Developing an MDM Strategy Key Components for Success WHITE PAPER Table of Contents Introduction... 2 Process Considerations... 3 Architecture Considerations... 5 Conclusion... 9 About Knowledgent... 10

More information

Financial Management Systems

Financial Management Systems Financial Management Systems Do business better. CFOs in forward-thinking companies today face greater challenges than ever before and greater opportunities. You must manage your company s core financial

More information

IT consulting Advice into action

IT consulting Advice into action www.pwc.lu/it-consulting IT consulting Advice into action Using technology to bring value to your business BEST ICT STRATEGY COMPANY LUXEMBOURG ICT AWARDS 2010 Our services PwC helps private and public

More information

CAPABILITY MATURITY MODEL & ASSESSMENT

CAPABILITY MATURITY MODEL & ASSESSMENT ENTERPRISE DATA GOVERNANCE CAPABILITY MATURITY MODEL & ASSESSMENT www.datalynx.com.au Data Governance Data governance is a key mechanism for establishing control of corporate data assets and enhancing

More information

Predictive Maintenance

Predictive Maintenance Predictive Maintenance A smarter way to manage assets Tim Ricketts Smarter Infrastructure Team September 2014 Traditional Way of Doing Asset Management IBM Software Group Challenges Assets are managed

More information

To the Cloud! Software Security Evolution at Adobe

To the Cloud! Software Security Evolution at Adobe To the Cloud! Software Security Evolution at Adobe Brad Arkin Sr. Director, Product & Services Security Adobe Systems Session ID: ASEC-R32 Session Classification: Intermediate Fall of 2011 (Then) Then:

More information

Marathon Information Management Program

Marathon Information Management Program Case Study: Implementing Enterprise Content Management at Marathon Oil Reid G. Smith ECM Director & IT Upstream Services Manager Marathon Oil Corporation March 12, 2012 Who we are Global independent exploration

More information

Building Executable Enterprise Architecture: Framework and Practice. Presentation to a/ea. May 10, 2006

Building Executable Enterprise Architecture: Framework and Practice. Presentation to a/ea. May 10, 2006 Building Executable Enterprise Architecture: Framework and Practice Presentation to a/ea May 10, 2006 Challenges in EA Existing EA frameworks emphasize on how to develop EA, not on how to use EA Need a

More information

Vickie Stephens, CRM December 3, 2014

Vickie Stephens, CRM December 3, 2014 Vickie Stephens, CRM December 3, 2014 Records management and technology What is Information Governance? 2 ... Every two days now we create as much information as we did from the dawn of civilization up

More information

Accelerating the path to SAP BW powered by SAP HANA

Accelerating the path to SAP BW powered by SAP HANA Ag BW on SAP HANA Unleash the power of imagination Dramatically improve your decision-making ability, reduce risk and lower your costs, Accelerating the path to SAP BW powered by SAP HANA Hardware Software

More information

Data Governance Policy. Version 2.0 19 October 2015

Data Governance Policy. Version 2.0 19 October 2015 Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions

Digital Asset Management. Delivering greater value from your assets by using better asset information to improve investment decisions Digital Asset the way we see it Digital Asset Delivering greater value from your assets by using better asset information to improve investment decisions In its recent survey on the UK economy, the OECD

More information

Data Management Maturity Model. Overview

Data Management Maturity Model. Overview Data Management Maturity Model Overview UPMC Center of Excellence Pittsburgh Jul 29, 2013 Data Management Maturity Model - Background A broad framework encompassing foundational data management capabilities,

More information

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization 1/22 As a part of Qlik Consulting, works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics journey. Qlik Advisory 2/22

More information

secure intelligence collection and assessment system Your business technologists. Powering progress

secure intelligence collection and assessment system Your business technologists. Powering progress secure intelligence collection and assessment system Your business technologists. Powering progress The decisive advantage for intelligence services The rising mass of data items from multiple sources

More information

Using Business Intelligence to Achieve Sustainable Performance

Using Business Intelligence to Achieve Sustainable Performance Cutting Edge Analytics for Sustainable Performance Using Business Intelligence to Achieve Sustainable Performance Adam Getz Principal, About is a software and professional services firm specializing in

More information

Information Systems and Technologies in Organizations

Information Systems and Technologies in Organizations Information Systems and Technologies in Organizations Information System One that collects, processes, stores, analyzes, and disseminates information for a specific purpose Is school register an information

More information

BIG DATA COURSE 1 DATA QUALITY STRATEGIES - CUSTOMIZED TRAINING OUTLINE. Prepared by:

BIG DATA COURSE 1 DATA QUALITY STRATEGIES - CUSTOMIZED TRAINING OUTLINE. Prepared by: BIG DATA COURSE 1 DATA QUALITY STRATEGIES - CUSTOMIZED TRAINING OUTLINE Cerulium Corporation has provided quality education and consulting expertise for over six years. We offer customized solutions to

More information

Adopting the DMBOK. Mike Beauchamp Member of the TELUS team Enterprise Data World 16 March 2010

Adopting the DMBOK. Mike Beauchamp Member of the TELUS team Enterprise Data World 16 March 2010 Adopting the DMBOK Mike Beauchamp Member of the TELUS team Enterprise Data World 16 March 2010 Agenda The Birth of a DMO at TELUS TELUS DMO Functions DMO Guidance DMBOK functions and TELUS Priorities Adoption

More information

ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.

ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords. ARC VIEW OCTOBER 17, 2013 Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence By Craig Resnick Keywords Information Technology, Services,

More information

By Makesh Kannaiyan makesh.k@sonata-software.com 8/27/2011 1

By Makesh Kannaiyan makesh.k@sonata-software.com 8/27/2011 1 Integration between SAP BusinessObjects and Netweaver By Makesh Kannaiyan makesh.k@sonata-software.com 8/27/2011 1 Agenda Evolution of BO Business Intelligence suite Integration Integration after 4.0 release

More information

PREDICTIVE MARKETING, DIGITAL ATTRIBUTION, OPTIMIZATION, AND DATA-DRIVEN PERSONALIZATION

PREDICTIVE MARKETING, DIGITAL ATTRIBUTION, OPTIMIZATION, AND DATA-DRIVEN PERSONALIZATION PREDICTIVE MARKETING, DIGITAL ATTRIBUTION, OPTIMIZATION, AND DATA-DRIVEN PERSONALIZATION A m a r t y a B h a t t a c h a r j y & S u n e e l G r o v e r P r i n c i p a l S o l u t i o n A r c h i t e

More information

Paper DM10 SAS & Clinical Data Repository Karthikeyan Chidambaram

Paper DM10 SAS & Clinical Data Repository Karthikeyan Chidambaram Paper DM10 SAS & Clinical Data Repository Karthikeyan Chidambaram Cognizant Technology Solutions, Newbury Park, CA Clinical Data Repository (CDR) Drug development lifecycle consumes a lot of time, money

More information

THOMAS RAVN PRACTICE DIRECTOR TRA@PLATON.NET. An Effective Approach to Master Data Management. March 4 th 2010, Reykjavik WWW.PLATON.

THOMAS RAVN PRACTICE DIRECTOR TRA@PLATON.NET. An Effective Approach to Master Data Management. March 4 th 2010, Reykjavik WWW.PLATON. An Effective Approach to Master Management THOMAS RAVN PRACTICE DIRECTOR TRA@PLATON.NET March 4 th 2010, Reykjavik WWW.PLATON.NET Agenda Introduction to MDM The aspects of an effective MDM program How

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t

More information

SharePoint Term Store & Taxonomy Design Harold Brenneman Lighthouse Microsoft Technology Group

SharePoint Term Store & Taxonomy Design Harold Brenneman Lighthouse Microsoft Technology Group SharePoint Term Store & Taxonomy Design Harold Brenneman Lighthouse Microsoft Technology Group Lighthouse Computer Services, All rights reserved Harold Brenneman Consulting Manager MBA, focusing on the

More information

The Importance of Data Governance

The Importance of Data Governance The Importance of Data Governance Hans Heerooms Information Builders Copyright 2011, Information Builders. Slide 1 Objective of this presentation Explain the concepts and benefits of Enterprise Information

More information

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance Accenture Human Capital Management Solutions Transforming people and process to achieve high performance The sophistication of our products and services requires the expertise of a special and talented

More information

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration. A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering

More information

Benefits Management: Revision of the BAR Critical Capability and its potential influence on IT-CMF. Michael Porter Head of Advisory Services, IVI

Benefits Management: Revision of the BAR Critical Capability and its potential influence on IT-CMF. Michael Porter Head of Advisory Services, IVI Management: Revision of the BAR Critical Capability and its potential influence on IT-CMF Michael Porter Head of Advisory Services, IVI Innovation Value Institute 2013 Agenda 1. The case for change 2.

More information

Insurance Modernization Stakeholder Analysis

Insurance Modernization Stakeholder Analysis Insurance Modernization Stakeholder Analysis Information Technology June 2014 Enabling the future Finance functions and actuaries face regulatory pressure to enhance reporting, markedly improve response

More information

IBM Policy Assessment and Compliance

IBM Policy Assessment and Compliance IBM Policy Assessment and Compliance Powerful data governance based on deep data intelligence Highlights Manage data in-place according to information governance policy. Data topology map provides a clear

More information

University of Wisconsin Platteville IT Governance Model Final Report Executive Summary

University of Wisconsin Platteville IT Governance Model Final Report Executive Summary University of Wisconsin Platteville IT Governance Model Final Report Executive Summary February 2013 Project Objectives & Approach Objectives: Build on the efforts of the Technology Oversight Planning

More information

www.sryas.com Analance Data Integration Technical Whitepaper

www.sryas.com Analance Data Integration Technical Whitepaper Analance Data Integration Technical Whitepaper Executive Summary Business Intelligence is a thriving discipline in the marvelous era of computing in which we live. It s the process of analyzing and exploring

More information

Streamlining the Process of Business Intelligence with JReport

Streamlining the Process of Business Intelligence with JReport Streamlining the Process of Business Intelligence with JReport An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Product Summary from 2014 EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations

More information

Successful Outsourcing of Data Warehouse Support

Successful Outsourcing of Data Warehouse Support Experience the commitment viewpoint Successful Outsourcing of Data Warehouse Support Focus IT management on the big picture, improve business value and reduce the cost of data Data warehouses can help

More information

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations

Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14

More information

UniSA LBCP Transition for 2015

UniSA LBCP Transition for 2015 UniSA Transition for 2015 The purpose of this document is to firstly explain the changes which will be occurring to the program in 2015, and secondly guide you through the process of transitioning into

More information

IBM Software Integrated Service Management: Visibility. Control. Automation.

IBM Software Integrated Service Management: Visibility. Control. Automation. IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

Aspen InfoPlus.21. Family

Aspen InfoPlus.21. Family Aspen InfoPlus.21 Family The process industry s most comprehensive performance management and analysis solution for optimizing manufacturing and improving profitability The Aspen InfoPlus.21 Family aggregates

More information

Implementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies

Implementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies Implementing an Electronic Document and Records Management System Checklist for Australian Government Agencies Acknowledgments The checklist for implementing an electronic document and records management

More information

Identity and Access Management Memorial s Strategic Roadmap

Identity and Access Management Memorial s Strategic Roadmap Identity and Access Management Memorial s Strategic Roadmap Executive Summary January 29, 2015 Identity and Access Management Identity and Access Management (IAM) is an integrated system of policies, business

More information

Deliver the information business users need

Deliver the information business users need White paper Deliver the information business users need Building the Intelligence Competency Center Table of Contents 1 Overview 1 Components of the BICC 3 Typical scenarios 5 Approach to building the

More information

IT Governance Charter

IT Governance Charter Version : 1.01 Date : 16 September 2009 IT Governance Network South Africa USA UK Switzerland www.itgovernance.co.za info@itgovernance.co.za 0825588732 IT Governance Network, Copyright 2009 Page 1 1 Terms

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.

More information

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business

More information

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services

More information

10426: Large Scale Project Accounting Data Migration in E-Business Suite

10426: Large Scale Project Accounting Data Migration in E-Business Suite 10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand

More information

Turn Information into a Strategic Asset with SAP Solutions for Information Management. Jens Sauer, SAP Switzerland 11 th September 2013

Turn Information into a Strategic Asset with SAP Solutions for Information Management. Jens Sauer, SAP Switzerland 11 th September 2013 Turn Information into a Strategic Asset with SAP Solutions for Information Management Jens Sauer, SAP Switzerland 11 th September 2013 Agenda The new Reality & Drivers for Information Management SAP Solution

More information

Ignite Your Creative Ideas with Fast and Engaging Data Discovery

Ignite Your Creative Ideas with Fast and Engaging Data Discovery SAP Brief SAP BusinessObjects BI s SAP Crystal s SAP Lumira Objectives Ignite Your Creative Ideas with Fast and Engaging Data Discovery Tap into your data big and small Tap into your data big and small

More information

Certified Information Professional 2016 Update Outline

Certified Information Professional 2016 Update Outline Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability

More information

Design of Data Management Guideline for Open Data Implementation

Design of Data Management Guideline for Open Data Implementation Design of Data Guideline for Implementation (case study in Indonesia) Arry Akhmad Arman Institut Teknologi Bandung Jl. Ganesha 10 Bandung Indonesia 40132 Phone: +62-22-2502260 arry.arman@yahoo.com Gilang

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Future Trends in Big Data

Future Trends in Big Data Future Trends in Big Data NIST Big Data Public Working Group IEEE Big Data Workshop October 27, 2014 David Boyd, Chief Technology Officer L-3 Data Tactics david.boyd@l-3com.com David Boyd CTO, L-3 Data

More information

White Paper. 1 Miles- White Paper. White Paper

White Paper. 1 Miles- White Paper. White Paper 1 Miles- White Paper White Paper Improve business performance and identify new opportunities by leveraging actionable real-time business insights with Business Analytics and Reporting Software 2 Miles-

More information

EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT

EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT EMC ADVERTISING ANALYTICS SERVICE FOR MEDIA & ENTERTAINMENT Leveraging analytics for actionable insight ESSENTIALS Put your Big Data to work for you Pick the best-fit, priority business opportunity and

More information

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions

More information

Customizing Identity Management to fit complex ecosystems

Customizing Identity Management to fit complex ecosystems Customizing Identity Management to fit complex ecosystems Advisory Services PwC Security - Identity Management 12 July 2011 Client s challenge One of the world s largest aerospace and defense corporations

More information

CS 101 November 15, 2010

CS 101 November 15, 2010 CS 101 November 15, 2010 Introductions David Kahan, 04 David.Kahan@ey.com Manager, IT Advisory Seha Islam, 08 & 09 Seha.Islam@ey.com Staff, IT Advisory 1 Facts about Ernst & Young $24.5 billion in revenue

More information

The Customer Experience:

The Customer Experience: The Customer Experience: The Holy Grail of Competitive Advantage. 1 A great customer experience has emerged as the holy grail of competitive advantage. Providing a great customer experience has emerged

More information

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data

More information

For External Use. Agile BI A story. Insight Session 16 September 2014. September 2014

For External Use. Agile BI A story. Insight Session 16 September 2014. September 2014 Agile BI A story Insight Session 16 September 2014 September 2014 Agenda Euroclear Who we are The Context Why we decided to go for Agile BI Agile BI in Project Management NBB reporting case study Agile

More information

DATA GOVERNANCE AT UPMC. A Summary of UPMC s Data Governance Program Foundation, Roles, and Services

DATA GOVERNANCE AT UPMC. A Summary of UPMC s Data Governance Program Foundation, Roles, and Services DATA GOVERNANCE AT UPMC A Summary of UPMC s Data Governance Program Foundation, Roles, and Services THE CHALLENGE Data Governance is not new work to UPMC. Employees throughout our organization manage data

More information

From Chaos to Clarity: Embedding Security into the SDLC

From Chaos to Clarity: Embedding Security into the SDLC From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which

More information

Understanding changes to the Trust Services Principles for SOC 2 reporting

Understanding changes to the Trust Services Principles for SOC 2 reporting Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting

More information

BMC Software Cloud Service Lifecycle

BMC Software Cloud Service Lifecycle BMC Software Cloud Service Lifecycle Riyadh, 15th May 2012 Dominic Wellington, Cloud & DCA Marketing Manager EMEA m dominic_wellington@bmc.com O +39 340 8165717 t @dwellington 1 To Achieve Success, Manage

More information