The Data Reservoir. 10 th September Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

Size: px
Start display at page:

Download "The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons"

Transcription

1 Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014

2 A growing demand Business Teams want Open access to more informa4on More powerful analysis and visualiza4on tools IT Teams are Concerned about cost. Concerned about governance and regulatory requirements. both the CMO and CIO are on the hook for turning all that data into above-market growth. Call it a shotgun marriage, but it s one that CMOs and CIOs both need to make work CMOs and CIOs Need to Get Along to Make Big Work (HBR ) 2

3 The reality of information management today 3

4 Business scenarios we see Subject maier experts want access to their organiza4on s data to explore the content, select, control, annotate and access informa4on using their terminology with an underpinning of protec4on and governance. Scien4sts seeking data for new analy4cs models. Marketeer seeking data for new campaigns. Fraud inves4gator seeking data to understand the details of suspicious ac4vity. Day- to- day acevity. Requiring ad hoc access to a wide variety of data sources. SupporEng analysis and decision making. Using the subject maper experts terminology. Providing the flexibility of spreadsheets that can scale to large volumes, a wide variety of informa4on types whilst protec4ng sensi4ve informa4on and op4mizing data storage and provisioning. 4

5 blues & skills issues A dispropor4onate por4on of the 4me spent in analy4cs project is about data prepara4on: acquiring/preparing/formarng/normalizing the data In addi4on to raw data, augmented data/analy4cal assets can significantly speed up the analy4cs process and par4ally bridge the talent gap 5

6 Initial Big efforts are focused on gaining insights from existing and new sources Big data sources +,-./-0123./ 89:.1/ 8;-2</ =:./3,/ =302-<6>:?2- BAC76=0-./63,6DE=67-1- H:3/I-12-< JK?23 =12<<6C;-5:/6L6M2?:3/ '# %!# $'" '$" "&# '(" '(" ')" ')" '*" $!" "%# ""# *(# *"# %&" %#" +&# Respondents with active big data efforts were asked which data sources are currently being collected and analyzed as part of active big data efforts within their organization. #$" ()# &'#!!" $%#!"# Global respondents Banking & Fin Mgmt respondents 6 6 Source: The real world use of Big, IBM & University of Oxford

7 The true value of Big is in context Ownership? Quality? Security? Privacy? Actuarial data Government statistics Epidemic data Patient records Weather history Location risk... Occupational risk Family history Raw data Travel history Feature extraction metadata Dietary risk... Personal financial situation Chemical exposure Domain linkages Social relationships Full contextual analytics 7

8 The interesting dilemma A man goes into a jewellers and buys an expensive watch Is it fraud in which case the bank must stop it Threat Is it money- laundering in which case the bank must report it Obliga4on Does he have an expensive trophy wife in which case perhaps he would be interested in a loan? Has he just won the loiery should the bank improve the services offered? Opportunity The same event is of interest by different departments. There is major overlap in the data required to answer the ques4on. It may not be possible to determine the answer with just the informa4on in the channel - Previous or subsequent ac4vity is required It is all a maier of coordina4on and 4ming 8

9 Big Lakes or Swamps? As we collect data Can we preserve clarity? Do we know what we are collecting? Can we find the data we need? Are we creating a data swamp? How do we build trust in big data? Do we know what data is being used for? 9

10 Organizations expect information governance will deliver Understanding of the informa4on they have, Confidence to share and reuse informa4on, Protec4on from unauthorised use of informa4on, Monitoring of ac4vity around the informa4on, Implementa4on of key business processes that manage informa4on, Tracking the provenance of informa4on and Management of the growth and distribu4on of their informa4on. 10

11 The Reservoir Reservoir = Efficient Management, Governance, ProtecEon and Access. As organiza4ons experiment with analy4cs they discover: Crea4ng new analy4cs requires access to historical data from many systems. This data includes valuable and sensi4ve data that is core to the organiza4on s opera4on. Hadoop is a flexible plazorm for storing many types of data but is not necessarily fast enough for the produc4on deployment of some analy4cs. needs to be reformaied and copied onto a specialist analy4cs plazorms such as Netezza. A data reservoir provides: Single extrac4on of data from opera4onal systems and distribu4on to mul4ple analy4cs plazorms. Cataloguing and governance of the data in the analy4cs plazorms Simple interfaces for the line of business to access the informa4on they need. 11

12 How does the data reservoir operate? Discover Explore Access 1 3 Adver4se Catalog 4 Reservoir Repositories Provision 12

13 reservoir system context diagram Decision Model Management Enterprise IT Deploy Real- 4me Decision Models Deploy Real- 4me Decision Models Service Calls Access Deposit Deploy Decision Models Line of Business Applications Systems of Engagement Events to Evaluate Search Requests System of Record Applications New Sources Enterprise Service Bus Third Party Feeds No4fica4ons Service Calls Reservoir Cura4on Interac4on Service Calls Deposit Simple, Ad Hoc Discovery and Analysis Out Third Party APIs Internal Sources In Access Report Requests Reporting Other Systems Other Of Insight Systems Of Insight Management Reservoir Operations 13

14 reservoir system context diagram Decision Model Management Enterprise IT Deploy Real- 4me Decision Models Deploy Real- 4me Decision Models Service Calls Access Deposit Deploy Decision Models Line of Business Applications Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Events to Evaluate No4fica4ons Service Calls Out In Descriptive Deposited Shared Operational Historical Harvested Content Hub Catalog Operational History Information Warehouse Deep Information Views Audit Code Hub Reservoir Repositories Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 14 Reservoir Management Reservoir Operations

15 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Service Calls Access Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 15 Reservoir Management Reservoir Operations

16 Differing user perspectives Provision Sand Boxes. Sand Box Search for, locate and download data and related ar4facts. Define governance policies, rules and classifica4ons. Monitor compliance. Governance Catalogue View lineage (business and technical) and perform impact analysis. Add addi4onal insight into data sources through automated analysis. 16 Develop data management models and implementa4ons. Cura4on of Metadata about Stores, Models, Defini4ons Stores Stores Stores

17 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Enterprise IT Interaction Real-time Analyics Streaming Analytics Real-time Interfaces Publishing Feeds Ingestion Service Calls Access Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 17 Information Integration & Governance Information Broker Code Hub Staging Areas Operational Governance Hub Reservoir Monitor Workflow Guards Management Reservoir Operations

18 reservoir system context diagram Decision Model Management Information Curator Governance, Risk and Compliance Team Enterprise IT Systems of Engagement System of Record Applications New Sources Enterprise Service Bus Third Party Feeds Third Party APIs Internal Sources Deploy Real- 4me Decision Models Events to Evaluate No4fica4ons Service Calls Out In Deploy Real- 4me Decision Models Enterprise IT Interaction Real-time Analyics Streaming Analytics Real-time Interfaces Publishing Feeds Ingestion Service Calls Access Sand boxes Descriptive Deposited Shared Operational Historical Harvested Deposit Content Hub Catalog Operational History Deploy Decision Models Information Warehouse Deep Raw Interaction Information Views Audit Understand Sources Code Hub Catalog Interfaces Reservoir Repositories Adver4se Source View-based Interaction Information Access and Feedback Sand boxes Reporting Marts Understand Compliance Understand Sources Search Requests Cura4on Interac4on Service Calls Deposit Access Report Requests Report Compliance Line of Business Applications Simple, Ad Hoc Discovery and Analysis Reporting Other Systems Other Of Insight Systems Of Insight 18 Information Integration & Governance Information Broker Code Hub Staging Areas Operational Governance Hub Reservoir Monitor Workflow Guards Management Reservoir Operations

19 Classification Schemes Classifica4on is at the heart of informa4on governance. It characterizes the type, value and cost of informa4on, or the mechanism that manage it. The design of the classifica4on schemes is key to controlling the cost and effec4veness of the informa4on governance program. Business Classifica-ons Business classifica4ons characterize informa4on from a business perspec4ve. This captures its value, how it is used, and the impact to the business if it is misused. Resource Classifica-ons Resource classifica4ons characterize the capability of the IT infrastructure that supports the management of informa4on. A resource's capability is partly due to its innate func4ons and partly controlled by the way it has been configured. Ac-vity Classifica-ons Ac4vity classifica4ons help to characterize procedures, ac4ons and automated processes. Seman-c Classifica-on Seman4c classifica4on iden4fies the meaning of an informa4on element. The classifica4on scheme is a glossary of concepts from relevant subject areas. These glossaries are industry specific and they are shipped with our industry models. The seman4c classifica4ons are defined at two levels: Subject area classifica4on Business term classifica4on 19

20 Governance Rules Defined for each classification for each situation Sensi4ve informa4on masked here Personal informa4on masked here 20

21 New policy support inside the Information Governance Catalogue Principle Principle Policy Principle Policy Policy Implica4ons Implica4ons Ac4oned by Governance Rule Governs Classifica4on Classifica4on Classified by Metadata Descrip4on Implica4ons Implemented by Describes Governance Rule Governance Rule Implementa4ons Modelled Metadata Implementa4ons Asset Deployed to, Executed by, Monitored by Asset 21

22 Integrated Metadata Lineage (Traceability) Where does this data come from? Why is this data incorrect? Why is this data incomplete? Can I trust this value? Impact Analysis Where is this element used? What happens if I change this? Op4miza4on Where is the redundancy? How can I make this run more efficiently? Understanding What does this mean? How is this used? Control Why is this parameter set to this value? Who made this change? I can change this to meet new business requirements 22

23 Information Governance People, Process and Technology Successful Governance is implemented with a combina4on of: Skilled people, correct roles and organiza4on Processes that create a pragma4c, targeted and agile work environment. Standards, templates and assets that improve consistency between implementa4ons. Technology that automates classifica4on, enforcement valida4on, and correc4on of data. Governance Activity Type Information Exchange Role that technology can play Communication Policies & Metrics Delivering education, best practices, assessments, templates. Compliance Design Changes Implementing control points and enforcement points. Support for design and code reviews. Test Management. Exception Exception Requests Exception process management, incident reporting. Feedback Measurements Dashboards and reports on compliance. Vitality New Requirements Change process management 23

24 Example: Supporting the Use of Authoritative Sources Defini4ons of policies, rules and processes around the use of authorita4ve sources Enforcement in build, automated test cases and configura4on management Defini4ons of authorita4ve sources and where they are used. Make it Clear Make it Unavoidable Control Points in Sprint and Design Review Processes Make it Visible Make it Easy to do the right thing Easy access to compliant test data. Pre- built data structures implemen4ng standards. refinery services for common re- engineering tasks. 24

25 Three interlocking lifecycles of information governance Audit Define Policy Classify Monitor Roll out Metadata Design Execute Opera4ons Policy Policy Development Deploy Detect Remediate Develop 25

26 Summary Increasing use of analy4cs requires business to have greater access to more informa4on governance needs to adapt so that the business takes reasonability for governance The governance program should educate, trust implicitly that people will do the right thing - and check - and follow up People are at the heart of governance - processes help them collabora4on and build trust - technology supports their work 26

27 zz z z z z z Questions? 27

28 New Information Architectures and Capabilities Reference Material 28

29 Governing and managing Big for Analytics and Decision Makers An introduc4on to the Reservoir solu4on 29

30 Ethics for Big and Analytics Context for what purpose was the data originally surrendered? For what purpose is the data now being used? How far removed from the original context is its new use? Consent & Choice What are the choices given to an affected party? Do they know they are making a choice? Do they really understand what they are agreeing to? Do they really have an opportunity to decline? What alternatives are offered? Reasonable is the depth and breadth of the data used and the relationships derived reasonable for the application it is used for? Substantiated Are the sources of data used appropriate, authoritative, complete and timely for the application? Owned Who owns the resulting insight? What are their responsibilities towards it in terms of its protection and the obligation to act? Fair How equitable are the results of the application to all parties? Is everyone properly compensated? Considered What are the consequences of the data collection and analysis? Access What access to data is given to the data subject? Accountable How are mistakes and unintended consequences detected and repaired? Can the interested parties check the results that affect them? com/whitepaper/ethics-bigdata-and-analytics 30

31 PaIerns of Management Vocabulary for design discussions. Icons used in white- boarding and design documents. Design guidance for specific solu4ons. A catalogue of design choices. Founda4on for serng architecture standards and reference architectures. Material for educa4on and training in informa4on architecture ?WT.mc_id=Author_Chessell_PoIM 31

32 Staying Ahead in the Cyber Security Game hip://www- 01.ibm.com/common/ssi/cgi- bin/ssialias?subtype=wh&infotyp e=sa&appname=swge_ti_se_us EN&htmlfid=TIL14103USEN&aIac hment=til14103usen.pdf#loade d 32

33 33

The Data Reservoir as an enabler of differentiating Analytics initiatives

The Data Reservoir as an enabler of differentiating Analytics initiatives Mandy Chessell CBE FREng CEng FBCS Distinguished Engineer, Master Inventor Chief Architect, Solutions The Reservoir as an enabler of differentiating Analytics initiatives 3 rd March 2015 Agenda Changing

More information

1 Actuate Corpora-on 2013. Big Data Business Analy/cs

1 Actuate Corpora-on 2013. Big Data Business Analy/cs 1 Big Data Business Analy/cs Introducing BIRT Analy3cs Provides analysts and business users with advanced visual data discovery and predictive analytics to make better, more timely decisions in the age

More information

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015 Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use

More information

Data Warehousing. Yeow Wei Choong Anne Laurent

Data Warehousing. Yeow Wei Choong Anne Laurent Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

UNIFIED, END- TO- END EDISCOVERY

UNIFIED, END- TO- END EDISCOVERY ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin

More information

Introduc)on to the IoT- A methodology

Introduc)on to the IoT- A methodology 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy

More information

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015

Bringing Strategy to Life Using an Intelligent Data Platform to Become Data Ready. Informatica Government Summit April 23, 2015 Bringing Strategy to Life Using an Intelligent Platform to Become Ready Informatica Government Summit April 23, 2015 Informatica Solutions Overview Power the -Ready Enterprise Government Imperatives Improve

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

Application of Supply Chain Concepts to the Analysis Process

Application of Supply Chain Concepts to the Analysis Process Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Business Data Authority: A data organization for strategic advantage

Business Data Authority: A data organization for strategic advantage Business Data Authority: A data organization for strategic advantage Collibra Data Governance Software Company Reference Customers Business Data Growth and Challenge TREND Exploding volume, velocity and

More information

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton

More information

Transforming Industries with Data & Analytics

Transforming Industries with Data & Analytics Chris Howard FBCS CITP Technical Lead, Big Data & Analytics IBM Executive IT Specialist Transforming Industries with Data & Analytics 2 We are making a new future for our clients, our industry and our

More information

Enterprise Content Management (ECM)

Enterprise Content Management (ECM) Enterprise Content Management (ECM) What it is, Creating a Domain Architecture for ECM, Why you would want to do this, and where to get help if you do ;) The other guy could not make it I m Glenn A bit

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

PROJECT PORTFOLIO SUITE

PROJECT PORTFOLIO SUITE ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.

More information

Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data

Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data IBM Software Group Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL

More information

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS! The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader

More information

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO

More information

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending

More information

IBM Analytics Make sense of your data

IBM Analytics Make sense of your data Using metadata to understand data in a hybrid environment Table of contents 3 The four pillars 4 7 Trusting your information: A business requirement 7 9 Helping business and IT talk the same language 10

More information

Ganzheitliches Datenmanagement

Ganzheitliches Datenmanagement Ganzheitliches Datenmanagement für Hadoop Michael Kohs, Senior Sales Consultant @mikchaos The Problem with Big Data Projects in 2016 Relational, Mainframe Documents and Emails Data Modeler Data Scientist

More information

IBM Software Understanding big data so you can act with confidence

IBM Software Understanding big data so you can act with confidence IBM Software Understanding big data so you can act with confidence More data, more problems? Not if you have an agile, automated information integration and governance program in place 1 2 3 4 5 Introduction

More information

IBM Enterprise Content Management: Streamlining operations for environmental compliance

IBM Enterprise Content Management: Streamlining operations for environmental compliance Solution Brief IBM Enterprise Content Management: Streamlining operations for environmental compliance Highlights Helps improve operational efficiency and lower costs Provides capabilities that enable

More information

Anzo Smart Data Integra/on

Anzo Smart Data Integra/on Anzo Smart Data Integra/on Cambridge Seman-cs Contact: Marty Loughlin Vice President, Financial Services Cambridge Seman

More information

How to avoid building a data swamp

How to avoid building a data swamp How to avoid building a data swamp Case studies in Hadoop data management and governance Mark Donsky, Product Management, Cloudera Naren Korenu, Engineering, Cloudera 1 Abstract DELETE How can you make

More information

Big Data for Government Symposium http://www.ttcus.com

Big Data for Government Symposium http://www.ttcus.com Big Data for Government Symposium http://www.ttcus.com @TECHTrain Linkedin/Groups: Technology Training Big Data and Smart Cities i Dr. Jane L. Snowdon Chief Innovation Officer, IBM Federal IBM Research:

More information

What s a BA to do with Data? Discover and define standard data elements in business terms. Susan Block, Program Manager The Vanguard Group

What s a BA to do with Data? Discover and define standard data elements in business terms. Susan Block, Program Manager The Vanguard Group What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Program Manager The Vanguard Group Discussion Points Discovering Business Data The Data Administration

More information

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &

More information

Leading the Pack - IBM Enterprise Content Management Solutions

Leading the Pack - IBM Enterprise Content Management Solutions IBM Enterprise Content Management Enterprise Content Management in 2015 Rich Howarth Vice President, ECM Products and Strategy Guide Executive Club March 30 2015 2014 IBM Corpora/on ECM is about driving

More information

Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory. Iain Wright Ian Francis, IBM 4 June 2015

Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory. Iain Wright Ian Francis, IBM 4 June 2015 Corporate Challenges in Model Risk Management : Moving Beyond Model Inventory Iain Wright Ian Francis, IBM 4 June 2015 Corporate Challenges in the Development and Implementation of Effective Model Risk

More information

How To Get More Data From Your Computer

How To Get More Data From Your Computer Industry Perspective: Big Data and Big Data Analytics David Barnes Program Director Emerging Internet Technologies IBM Software Group What is Big Data? The Adjacent Possible Inexpensive disk + Increased

More information

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT Getting Real with Policies for Software Defined Infrastructure Manish Dave Principal Engineer, Intel IT Manish Dave, Principal Engineer, Intel IT Network Security Architect @ Intel IT 15+ years of experience

More information

So#ware quality assurance - introduc4on. Dr Ana Magazinius

So#ware quality assurance - introduc4on. Dr Ana Magazinius So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something

More information

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for

More information

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance

IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation

More information

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Business Analysis Center of Excellence The Cornerstone of Business Transformation February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President

More information

Washington State s Use of the IBM Data Governance Unified Process Best Practices

Washington State s Use of the IBM Data Governance Unified Process Best Practices STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,

More information

Cyber Security With Big Data

Cyber Security With Big Data Cyber Security With Big Data Fast. Complete. Cost-Effec1ve. Harry J Foxwell, PhD Principal Consultant Oracle Public Sector Oct 2015 Safe Harbor Statement The following is intended to outline our general

More information

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business

More information

Doing Big Data Projects: What s the Best Team Process Methology?

Doing Big Data Projects: What s the Best Team Process Methology? Doing Big Data Projects: What s the Best Team Process Methology? October 2015 1 Executive Summary What s the Best Team Process Methology? September 2015 2 Executive Summary What s the Best Team Process

More information

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization 1/22 As a part of Qlik Consulting, works with Customers to assist in shaping strategic elements related to analytics to ensure adoption and success throughout their analytics journey. Qlik Advisory 2/22

More information

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ End to End Solution to Accelerate Data Warehouse Optimization Franco Flore Alliance Sales Director - APJ Big Data Is Driving Key Business Initiatives Increase profitability, innovation, customer satisfaction,

More information

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc. Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis

More information

Digital Business Platform for SAP

Digital Business Platform for SAP BUSINESS WHITE PAPER Digital Business Platform for SAP SAP ERP is the foundation on which the enterprise runs. Software AG adds the missing agility component with a digital business platform. CONTENT 1

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv. UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni mariachiara.demar8ni@unipv.it Master in Interna+onal Business and Economics Defini8on Performance

More information

The Evolu*on of Service Management

The Evolu*on of Service Management The Evolu*on of Extending Disciplines Across the Enterprise Michael Jones Regional CTO - Architecture Michael.Jones@servicenow.com 2015 Now All Rights Reserved 1 How work gets done today! Emails Spreadsheets

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Omni Channel in Retail The TIBCO Retail Platform

Omni Channel in Retail The TIBCO Retail Platform Omni Channel in Retail The TIBCO Retail Platform Japinder Singh Head of Global Solution Consulting Fast Data Summit Frankfurt 29 th October 2015 Copyright 2000-2014 TIBCO Software Inc. TIBCO Fast Data

More information

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda Opportunity Solution Challenges Result GE Lake 2 GESoftware.com @GESoftware #IndustrialInternet Big opportunities with Industrial

More information

Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant

Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Presenta(on How Business Intelligence can help to address current NHS challenges Chris Knowles, Oracle Corpora2on, Principal Sales Consultant Challenges Facing the NHS A BI Perspec(ve Challenges Facing

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial

More information

IT Asset Management Best Practices Using RFID. Stephen Schwartz

IT Asset Management Best Practices Using RFID. Stephen Schwartz IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested

More information

Archive I. Metadata. 26. May 2015

Archive I. Metadata. 26. May 2015 Archive I Metadata 26. May 2015 2 Norstore Data Management Plan To successfully execute your research project you want to ensure the following three criteria are met over its entire lifecycle: You are

More information

Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance

Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice

More information

Integrated Social and Enterprise Data = Enhanced Analytics

Integrated Social and Enterprise Data = Enhanced Analytics ORACLE WHITE PAPER, DECEMBER 2013 THE VALUE OF SOCIAL DATA Integrated Social and Enterprise Data = Enhanced Analytics #SocData CONTENTS Executive Summary 3 The Value of Enterprise-Specific Social Data

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

Master Data Management Architecture

Master Data Management Architecture Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes

More information

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom

More information

Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO. Big Data Everywhere Conference, NYC November 2015

Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO. Big Data Everywhere Conference, NYC November 2015 Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO Big Data Everywhere Conference, NYC November 2015 Agenda 1. Challenges with Risk Data Aggregation and Risk Reporting (RDARR) 2. How a

More information

Are You Big Data Ready?

Are You Big Data Ready? ACS 2015 Annual Canberra Conference Are You Big Data Ready? Vladimir Videnovic Business Solutions Director Oracle Big Data and Analytics Introduction Introduction What is Big Data? If you can't explain

More information

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform

Optimized for the Industrial Internet: GE s Industrial Data Lake Platform Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda The Opportunity The Solution The Challenges The Results Solutions for Industrial Internet, deep domain expertise 2 GESoftware.com

More information

The Right BI Tool for the Job in a non- SAP Applica9on Environment

The Right BI Tool for the Job in a non- SAP Applica9on Environment September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps

More information

Ten Mistakes to Avoid

Ten Mistakes to Avoid EXCLUSIVELY FOR TDWI PREMIUM MEMBERS TDWI RESEARCH SECOND QUARTER 2014 Ten Mistakes to Avoid In Big Data Analytics Projects By Fern Halper tdwi.org Ten Mistakes to Avoid In Big Data Analytics Projects

More information

Identity and Access Positioning of Paradgimo

Identity and Access Positioning of Paradgimo 1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values

More information

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Best Practices in Enterprise Data Governance

Best Practices in Enterprise Data Governance Best Practices in Enterprise Data Governance Scott Gidley and Nancy Rausch, SAS WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Data Governance Use Case and Challenges.... 1 Collaboration

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Oracle Solu?ons for Higher Educa?on

Oracle Solu?ons for Higher Educa?on Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement

More information

Introduction to Glossary Business

Introduction to Glossary Business Introduction to Glossary Business B T O Metadata Primer Business Metadata Business rules, Definitions, Terminology, Glossaries, Algorithms and Lineage using business language Audience: Business users Technical

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

Luncheon Webinar Series July 29, 2010

Luncheon Webinar Series July 29, 2010 Luncheon Webinar Series July 29, 2010 Business Glossary & Business Glossary Anywhere Sponsored By: 1 Business Glossary & Business Glossary Anywhere Questions and suggestions regarding presentation topics?

More information

IBM Software Enabling business agility through real-time process visibility

IBM Software Enabling business agility through real-time process visibility IBM Software Enabling business agility through real-time process visibility IBM Business Monitor 2 Enabling business agility through real-time process visibility Highlights Understand the big picture of

More information

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme managed by the Special EU Programmes Body. Web Analy*cs In

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

IBM Big Data in Government

IBM Big Data in Government IBM Big in Government Turning big data into smarter decisions Deepak Mohapatra Sr. Consultant Government IBM Software Group dmohapatra@us.ibm.com The Big Paradigm Shift 2 Big Creates A Challenge And an

More information

SUMMIT. November 2010

SUMMIT. November 2010 SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and

More information