The Data Reservoir. 10 th September Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons
|
|
- Randell Martin
- 8 years ago
- Views:
Transcription
1 Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014
2 A growing demand Business Teams want Open access to more informa4on More powerful analysis and visualiza4on tools IT Teams are Concerned about cost. Concerned about governance and regulatory requirements. both the CMO and CIO are on the hook for turning all that data into above-market growth. Call it a shotgun marriage, but it s one that CMOs and CIOs both need to make work CMOs and CIOs Need to Get Along to Make Big Work (HBR ) 2
3 The reality of information management today 3
4 Business scenarios we see Subject maier experts want access to their organiza4on s data to explore the content, select, control, annotate and access informa4on using their terminology with an underpinning of protec4on and governance. Scien4sts seeking data for new analy4cs models. Marketeer seeking data for new campaigns. Fraud inves4gator seeking data to understand the details of suspicious ac4vity. Day- to- day acevity. Requiring ad hoc access to a wide variety of data sources. SupporEng analysis and decision making. Using the subject maper experts terminology. Providing the flexibility of spreadsheets that can scale to large volumes, a wide variety of informa4on types whilst protec4ng sensi4ve informa4on and op4mizing data storage and provisioning. 4
5 blues & skills issues A dispropor4onate por4on of the 4me spent in analy4cs project is about data prepara4on: acquiring/preparing/formarng/normalizing the data In addi4on to raw data, augmented data/analy4cal assets can significantly speed up the analy4cs process and par4ally bridge the talent gap 5
6 Initial Big efforts are focused on gaining insights from existing and new sources Big data sources +,-./-0123./ 89:.1/ 8;-2</ =:./3,/ =302-<6>:?2- BAC76=0-./63,6DE=67-1- H:3/I-12-< JK?23 =12<<6C;-5:/6L6M2?:3/ '# %!# $'" '$" "&# '(" '(" ')" ')" '*" $!" "%# ""# *(# *"# %&" %#" +&# Respondents with active big data efforts were asked which data sources are currently being collected and analyzed as part of active big data efforts within their organization. #$" ()# &'#!!" $%#!"# Global respondents Banking & Fin Mgmt respondents 6 6 Source: The real world use of Big, IBM & University of Oxford
7 The true value of Big is in context Ownership? Quality? Security? Privacy? Actuarial data Government statistics Epidemic data Patient records Weather history Location risk... Occupational risk Family history Raw data Travel history Feature extraction metadata Dietary risk... Personal financial situation Chemical exposure Domain linkages Social relationships Full contextual analytics 7
8 The interesting dilemma A man goes into a jewellers and buys an expensive watch Is it fraud in which case the bank must stop it Threat Is it money- laundering in which case the bank must report it Obliga4on Does he have an expensive trophy wife in which case perhaps he would be interested in a loan? Has he just won the loiery should the bank improve the services offered? Opportunity The same event is of interest by different departments. There is major overlap in the data required to answer the ques4on. It may not be possible to determine the answer with just the informa4on in the channel - Previous or subsequent ac4vity is required It is all a maier of coordina4on and 4ming 8
9 Big Lakes or Swamps? As we collect data Can we preserve clarity? Do we know what we are collecting? Can we find the data we need? Are we creating a data swamp? How do we build trust in big data? Do we know what data is being used for? 9
10 Organizations expect information governance will deliver Understanding of the informa4on they have, Confidence to share and reuse informa4on, Protec4on from unauthorised use of informa4on, Monitoring of ac4vity around the informa4on, Implementa4on of key business processes that manage informa4on, Tracking the provenance of informa4on and Management of the growth and distribu4on of their informa4on. 10
11 The Reservoir Reservoir = Efficient Management, Governance, ProtecEon and Access. As organiza4ons experiment with analy4cs they discover: Crea4ng new analy4cs requires access to historical data from many systems. This data includes valuable and sensi4ve data that is core to the organiza4on s opera4on. Hadoop is a flexible plazorm for storing many types of data but is not necessarily fast enough for the produc4on deployment of some analy4cs. needs to be reformaied and copied onto a specialist analy4cs plazorms such as Netezza. A data reservoir provides: Single extrac4on of data from opera4onal systems and distribu4on to mul4ple analy4cs plazorms. Cataloguing and governance of the data in the analy4cs plazorms Simple interfaces for the line of business to access the informa4on they need. 11
12 How does the data reservoir operate? Discover Explore Access 1 3 Adver4se Catalog 4 Reservoir Repositories Provision 12
13 reservoir system context diagram Decision Model Management Enterprise IT Deploy Real- 4me Decision Models Deploy Real- 4me Decision Models Service Calls Access Deposit Deploy Decision Models Line of Business Applications Systems of Engagement Events to Evaluate Search Requests System of Record Applications New Sources Enterprise Service Bus Third Party Feeds No4fica4ons Service Calls Reservoir Cura4on Interac4on Service Calls Deposit Simple, Ad Hoc Discovery and Analysis Out Third Party APIs Internal Sources In Access Report Requests Reporting Other Systems Other Of Insight Systems Of Insight Management Reservoir Operations 13
14 reservoir system context diagram Decision Model Management Enterprise IT Deploy Real- 4me Decision Models Deploy Real- 4me Decision Models Service Calls Access Deposit Deploy Decision Models Line of Business Applications Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Events to Evaluate No4fica4ons Service Calls Out In Descriptive Deposited Shared Operational Historical Harvested Content Hub Catalog Operational History Information Warehouse Deep Information Views Audit Code Hub Reservoir Repositories Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 14 Reservoir Management Reservoir Operations
15 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Service Calls Access Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 15 Reservoir Management Reservoir Operations
16 Differing user perspectives Provision Sand Boxes. Sand Box Search for, locate and download data and related ar4facts. Define governance policies, rules and classifica4ons. Monitor compliance. Governance Catalogue View lineage (business and technical) and perform impact analysis. Add addi4onal insight into data sources through automated analysis. 16 Develop data management models and implementa4ons. Cura4on of Metadata about Stores, Models, Defini4ons Stores Stores Stores
17 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Enterprise IT Interaction Real-time Analyics Streaming Analytics Real-time Interfaces Publishing Feeds Ingestion Service Calls Access Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 17 Information Integration & Governance Information Broker Code Hub Staging Areas Operational Governance Hub Reservoir Monitor Workflow Guards Management Reservoir Operations
18 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Enterprise IT Interaction Real-time Analyics Streaming Analytics Real-time Interfaces Publishing Feeds Ingestion Service Calls Access Sand boxes Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Raw Interaction Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source View-based Interaction Information Access and Feedback Sand boxes Reporting Marts Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 18 Information Integration & Governance Information Broker Code Hub Staging Areas Operational Governance Hub Reservoir Monitor Workflow Guards Management Reservoir Operations
19 Classification Schemes Classifica4on is at the heart of informa4on governance. It characterizes the type, value and cost of informa4on, or the mechanism that manage it. The design of the classifica4on schemes is key to controlling the cost and effec4veness of the informa4on governance program. Business Classifica-ons Business classifica4ons characterize informa4on from a business perspec4ve. This captures its value, how it is used, and the impact to the business if it is misused. Resource Classifica-ons Resource classifica4ons characterize the capability of the IT infrastructure that supports the management of informa4on. A resource's capability is partly due to its innate func4ons and partly controlled by the way it has been configured. Ac-vity Classifica-ons Ac4vity classifica4ons help to characterize procedures, ac4ons and automated processes. Seman-c Classifica-on Seman4c classifica4on iden4fies the meaning of an informa4on element. The classifica4on scheme is a glossary of concepts from relevant subject areas. These glossaries are industry specific and they are shipped with our industry models. The seman4c classifica4ons are defined at two levels: Subject area classifica4on Business term classifica4on 19
20 Governance Rules Defined for each classification for each situation Sensi4ve informa4on masked here Personal informa4on masked here 20
21 New policy support inside the Information Governance Catalogue Principle Principle Policy Principle Policy Policy Implica4ons Implica4ons Ac4oned by Governance Rule Governs Classifica4on Classifica4on Classified by Metadata Descrip4on Implica4ons Implemented by Describes Governance Rule Governance Rule Implementa4ons Modelled Metadata Implementa4ons Asset Deployed to, Executed by, Monitored by Asset 21
22 Integrated Metadata Lineage (Traceability) Where does this data come from? Why is this data incorrect? Why is this data incomplete? Can I trust this value? Impact Analysis Where is this element used? What happens if I change this? Op4miza4on Where is the redundancy? How can I make this run more efficiently? Understanding What does this mean? How is this used? Control Why is this parameter set to this value? Who made this change? I can change this to meet new business requirements 22
23 Information Governance People, Process and Technology Successful Governance is implemented with a combina4on of: Skilled people, correct roles and organiza4on Processes that create a pragma4c, targeted and agile work environment. Standards, templates and assets that improve consistency between implementa4ons. Technology that automates classifica4on, enforcement valida4on, and correc4on of data. Governance Activity Type Information Exchange Role that technology can play Communication Policies & Metrics Delivering education, best practices, assessments, templates. Compliance Design Changes Implementing control points and enforcement points. Support for design and code reviews. Test Management. Exception Exception Requests Exception process management, incident reporting. Feedback Measurements Dashboards and reports on compliance. Vitality New Requirements Change process management 23
24 Example: Supporting the Use of Authoritative Sources Defini4ons of policies, rules and processes around the use of authorita4ve sources Enforcement in build, automated test cases and configura4on management Defini4ons of authorita4ve sources and where they are used. Make it Clear Make it Unavoidable Control Points in Sprint and Design Review Processes Make it Visible Make it Easy to do the right thing Easy access to compliant test data. Pre- built data structures implemen4ng standards. refinery services for common re- engineering tasks. 24
25 Three interlocking lifecycles of information governance Audit Define Policy Classify Monitor Roll out Metadata Design Execute Opera4ons Policy Policy Development Deploy Detect Remediate Develop 25
26 Summary Increasing use of analy4cs requires business to have greater access to more informa4on governance needs to adapt so that the business takes reasonability for governance The governance program should educate, trust implicitly that people will do the right thing - and check - and follow up People are at the heart of governance - processes help them collabora4on and build trust - technology supports their work 26
27 zz z z z z z Questions? 27
28 New Information Architectures and Capabilities Reference Material 28
29 Governing and managing Big for Analytics and Decision Makers An introduc4on to the Reservoir solu4on 29
30 Ethics for Big and Analytics Context for what purpose was the data originally surrendered? For what purpose is the data now being used? How far removed from the original context is its new use? Consent & Choice What are the choices given to an affected party? Do they know they are making a choice? Do they really understand what they are agreeing to? Do they really have an opportunity to decline? What alternatives are offered? Reasonable is the depth and breadth of the data used and the relationships derived reasonable for the application it is used for? Substantiated Are the sources of data used appropriate, authoritative, complete and timely for the application? Owned Who owns the resulting insight? What are their responsibilities towards it in terms of its protection and the obligation to act? Fair How equitable are the results of the application to all parties? Is everyone properly compensated? Considered What are the consequences of the data collection and analysis? Access What access to data is given to the data subject? Accountable How are mistakes and unintended consequences detected and repaired? Can the interested parties check the results that affect them? com/whitepaper/ethics-bigdata-and-analytics 30
31 PaIerns of Management Vocabulary for design discussions. Icons used in white- boarding and design documents. Design guidance for specific solu4ons. A catalogue of design choices. Founda4on for serng architecture standards and reference architectures. Material for educa4on and training in informa4on architecture ?WT.mc_id=Author_Chessell_PoIM 31
32 Staying Ahead in the Cyber Security Game hip://www- 01.ibm.com/common/ssi/cgi- bin/ssialias?subtype=wh&infotyp e=sa&appname=swge_ti_se_us EN&htmlfid=TIL14103USEN&aIac hment=til14103usen.pdf#loade d 32
33 33
The Data Reservoir as an enabler of differentiating Analytics initiatives
Mandy Chessell CBE FREng CEng FBCS Distinguished Engineer, Master Inventor Chief Architect, Solutions The Reservoir as an enabler of differentiating Analytics initiatives 3 rd March 2015 Agenda Changing
More information1 Actuate Corpora-on 2013. Big Data Business Analy/cs
1 Big Data Business Analy/cs Introducing BIRT Analy3cs Provides analysts and business users with advanced visual data discovery and predictive analytics to make better, more timely decisions in the age
More informationTim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015
Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use
More informationData Warehousing. Yeow Wei Choong Anne Laurent
Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More informationUNIFIED, END- TO- END EDISCOVERY
ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin
More informationIntroduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
More informationBringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015
Bringing Strategy to Life Using an Intelligent Platform to Become Ready Informatica Government Summit April 23, 2015 Informatica Solutions Overview Power the -Ready Enterprise Government Imperatives Improve
More informationIT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
More informationBig Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationWebinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security
Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationApplication of Supply Chain Concepts to the Analysis Process
Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationBusiness Data Authority: A data organization for strategic advantage
Business Data Authority: A data organization for strategic advantage Collibra Data Governance Software Company Reference Customers Business Data Growth and Challenge TREND Exploding volume, velocity and
More informationA R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g
RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration
More informationEverything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
More informationBringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com
Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationStream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More
Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton
More informationTransforming Industries with Data & Analytics
Chris Howard FBCS CITP Technical Lead, Big Data & Analytics IBM Executive IT Specialist Transforming Industries with Data & Analytics 2 We are making a new future for our clients, our industry and our
More informationEnterprise Content Management (ECM)
Enterprise Content Management (ECM) What it is, Creating a Domain Architecture for ECM, Why you would want to do this, and where to get help if you do ;) The other guy could not make it I m Glenn A bit
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationBuilding Confidence in Big Data Innovations in Information Integration & Governance for Big Data
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data IBM Software Group Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL
More informationIBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
More informationHow To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9
Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may
More informationSan Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP
Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO
More informationACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES
THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending
More informationIBM Analytics Make sense of your data
Using metadata to understand data in a hybrid environment Table of contents 3 The four pillars 4 7 Trusting your information: A business requirement 7 9 Helping business and IT talk the same language 10
More informationGanzheitliches Datenmanagement
Ganzheitliches Datenmanagement für Hadoop Michael Kohs, Senior Sales Consultant @mikchaos The Problem with Big Data Projects in 2016 Relational, Mainframe Documents and Emails Data Modeler Data Scientist
More informationIBM Software Understanding big data so you can act with confidence
IBM Software Understanding big data so you can act with confidence More data, more problems? Not if you have an agile, automated information integration and governance program in place 1 2 3 4 5 Introduction
More informationIBM Enterprise Content Management: Streamlining operations for environmental compliance
Solution Brief IBM Enterprise Content Management: Streamlining operations for environmental compliance Highlights Helps improve operational efficiency and lower costs Provides capabilities that enable
More informationAnzo Smart Data Integra/on
Anzo Smart Data Integra/on Cambridge Seman-cs Contact: Marty Loughlin Vice President, Financial Services Cambridge Seman
More informationHow to avoid building a data swamp
How to avoid building a data swamp Case studies in Hadoop data management and governance Mark Donsky, Product Management, Cloudera Naren Korenu, Engineering, Cloudera 1 Abstract DELETE How can you make
More informationBig Data for Government Symposium http://www.ttcus.com
Big Data for Government Symposium http://www.ttcus.com @TECHTrain Linkedin/Groups: Technology Training Big Data and Smart Cities i Dr. Jane L. Snowdon Chief Innovation Officer, IBM Federal IBM Research:
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms. Susan Block, Program Manager The Vanguard Group
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Program Manager The Vanguard Group Discussion Points Discovering Business Data The Data Administration
More informationModernizing EDI: How to Cut Your Migra6on Costs by Over 50%
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &
More informationLeading the Pack - IBM Enterprise Content Management Solutions
IBM Enterprise Content Management Enterprise Content Management in 2015 Rich Howarth Vice President, ECM Products and Strategy Guide Executive Club March 30 2015 2014 IBM Corpora/on ECM is about driving
More informationCorporate Challenges in Model Risk Management : Moving Beyond Model Inventory. Iain Wright Ian Francis, IBM 4 June 2015
Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory Iain Wright Ian Francis, IBM 4 June 2015 Corporate Challenges in the Development and Implementation of Effective Model Risk
More informationHow To Get More Data From Your Computer
Industry Perspective: Big Data and Big Data Analytics David Barnes Program Director Emerging Internet Technologies IBM Software Group What is Big Data? The Adjacent Possible Inexpensive disk + Increased
More informationGetting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT
Getting Real with Policies for Software Defined Infrastructure Manish Dave Principal Engineer, Intel IT Manish Dave, Principal Engineer, Intel IT Network Security Architect @ Intel IT 15+ years of experience
More informationSo#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
More informationQubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
More informationIBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
More informationBusiness Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
More informationWashington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
More informationCyber Security With Big Data
Cyber Security With Big Data Fast. Complete. Cost-Effec1ve. Harry J Foxwell, PhD Principal Consultant Oracle Public Sector Oct 2015 Safe Harbor Statement The following is intended to outline our general
More informationB2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity
B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business
More informationDoing Big Data Projects: What s the Best Team Process Methology?
Doing Big Data Projects: What s the Best Team Process Methology? October 2015 1 Executive Summary What s the Best Team Process Methology? September 2015 2 Executive Summary What s the Best Team Process
More informationAnalytics Strategy Information Architecture Data Management Analytics Value and Governance Realization
1/22 As a part of Qlik Consulting, works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics journey. Qlik Advisory 2/22
More informationEnd to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ
End to End Solution to Accelerate Data Warehouse Optimization Franco Flore Alliance Sales Director - APJ Big Data Is Driving Key Business Initiatives Increase profitability, innovation, customer satisfaction,
More informationBusiness Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
More informationDigital Business Platform for SAP
BUSINESS WHITE PAPER Digital Business Platform for SAP SAP ERP is the foundation on which the enterprise runs. Software AG adds the missing agility component with a digital business platform. CONTENT 1
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationPerformance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.
UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni mariachiara.demar8ni@unipv.it Master in Interna+onal Business and Economics Defini8on Performance
More informationThe Evolu*on of Service Management
The Evolu*on of Extending Disciplines Across the Enterprise Michael Jones Regional CTO - Architecture Michael.Jones@servicenow.com 2015 Now All Rights Reserved 1 How work gets done today! Emails Spreadsheets
More informationPu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
More informationIBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationOmni Channel in Retail The TIBCO Retail Platform
Omni Channel in Retail The TIBCO Retail Platform Japinder Singh Head of Global Solution Consulting Fast Data Summit Frankfurt 29 th October 2015 Copyright 2000-2014 TIBCO Software Inc. TIBCO Fast Data
More informationOptimized for the Industrial Internet: GE s Industrial Data Lake Platform
Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda Opportunity Solution Challenges Result GE Lake 2 GESoftware.com @GESoftware #IndustrialInternet Big opportunities with Industrial
More informationPresenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant
Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Challenges Facing the NHS A BI Perspec(ve Challenges Facing
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationRSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
More informationWhite Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
More informationIT Asset Management Best Practices Using RFID. Stephen Schwartz
IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested
More informationArchive I. Metadata. 26. May 2015
Archive I Metadata 26. May 2015 2 Norstore Data Management Plan To successfully execute your research project you want to ensure the following three criteria are met over its entire lifecycle: You are
More informationKlarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance
Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
More informationIntegrated Social and Enterprise Data = Enhanced Analytics
ORACLE WHITE PAPER, DECEMBER 2013 THE VALUE OF SOCIAL DATA Integrated Social and Enterprise Data = Enhanced Analytics #SocData CONTENTS Executive Summary 3 The Value of Enterprise-Specific Social Data
More informationComputer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
More informationAddressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO. Big Data Everywhere Conference, NYC November 2015
Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO Big Data Everywhere Conference, NYC November 2015 Agenda 1. Challenges with Risk Data Aggregation and Risk Reporting (RDARR) 2. How a
More informationAre You Big Data Ready?
ACS 2015 Annual Canberra Conference Are You Big Data Ready? Vladimir Videnovic Business Solutions Director Oracle Big Data and Analytics Introduction Introduction What is Big Data? If you can't explain
More informationOptimized for the Industrial Internet: GE s Industrial Data Lake Platform
Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda The Opportunity The Solution The Challenges The Results Solutions for Industrial Internet, deep domain expertise 2 GESoftware.com
More informationThe Right BI Tool for the Job in a non- SAP Applica9on Environment
September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps
More informationTen Mistakes to Avoid
EXCLUSIVELY FOR TDWI PREMIUM MEMBERS TDWI RESEARCH SECOND QUARTER 2014 Ten Mistakes to Avoid In Big Data Analytics Projects By Fern Halper tdwi.org Ten Mistakes to Avoid In Big Data Analytics Projects
More informationIdentity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationBest Practices in Enterprise Data Governance
Best Practices in Enterprise Data Governance Scott Gidley and Nancy Rausch, SAS WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Data Governance Use Case and Challenges.... 1 Collaboration
More informationHow To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
More informationOracle Solu?ons for Higher Educa?on
Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement
More informationIntroduction to Glossary Business
Introduction to Glossary Business B T O Metadata Primer Business Metadata Business rules, Definitions, Terminology, Glossaries, Algorithms and Lineage using business language Audience: Business users Technical
More informationHunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationInformation and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
More informationLuncheon Webinar Series July 29, 2010
Luncheon Webinar Series July 29, 2010 Business Glossary & Business Glossary Anywhere Sponsored By: 1 Business Glossary & Business Glossary Anywhere Questions and suggestions regarding presentation topics?
More informationIBM Software Enabling business agility through real-time process visibility
IBM Software Enabling business agility through real-time process visibility IBM Business Monitor 2 Enabling business agility through real-time process visibility Highlights Understand the big picture of
More informationHoneycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme
Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme managed by the Special EU Programmes Body. Web Analy*cs In
More informationDetecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationIBM Big Data in Government
IBM Big in Government Turning big data into smarter decisions Deepak Mohapatra Sr. Consultant Government IBM Software Group dmohapatra@us.ibm.com The Big Paradigm Shift 2 Big Creates A Challenge And an
More informationSUMMIT. November 2010
SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and
More information