Loading...
You are here:  Home  >  Articles by admin
Latest

Cyber-Attacks in the News and Data Regulatory Compliance

By   /  August 1, 2012  /  Data Blogs | Information From Enterprise Leaders, Data Education, Enterprise Information Management, Information Management Blogs  /  No Comments

by David Schlesinger CISSP You probably have heard of the “Stuxnet” worm or the “Flame” code that was presumably aimed at machines processing radioactive substances.  (If you haven’t heard of either, you are working far too hard and need to look around at what is happening in the IT world.)  These are specially crafted pieces […]

Read More →
Latest

Data Governance and Corporate Agility are Customer Centric

By   /  July 23, 2012  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  1 Comment

by David Schlesinger CISSP Business is a complex exercise in organization and human nature.  Peter Drucker famously said “the purpose of a business is to create a customer;” yet a lot of things must be done to manage the business that at first glance do not touch the end customer.  This is a false notion; […]

Read More →
Latest

Conversations about Big Data – How Hot is Your Data Center?

By   /  June 18, 2012  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education  /  No Comments

by David Schlesinger CISSP Big Data requires Big Data Centers.  When you build a place to handle Big Data, you have many computers all working together.  This raises considerations regarding using a common ground for all power cables, how much fuel to keep for the back-up generators, the air-conditioning fan duct orientation, proper heights of […]

Read More →
Latest

Why Data Management Should Collaborate with Security

By   /  June 1, 2012  /  Data Blogs | Information From Enterprise Leaders, Data Education, Enterprise Information Management, Information Management Blogs  /  1 Comment

by David Schlesinger CISSP While some people still believe that data protection and information security require different skill sets (and they are correct), they further believe that each discipline does “just fine thank you” when operating in isolation.  This last belief is as wrong as believing that nobody will hack your home computer because it […]

Read More →
Latest

Why Data Governance Should Include Security Posters in the Hall

By   /  May 9, 2012  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

by David Schlesinger CISSP At first glance it may not seem apparent that data governance has much to do with security posters in the halls of your enterprise. At second glance it also is not apparent; which is why I am writing this piece.  They are connected and Data Governance can make it better. First, […]

Read More →
Latest

Conversations about Big Data – Who Can See What?

By   /  April 24, 2012  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education  /  No Comments

by David Schlesinger CISSP Traditional Database Management Systems have ways to make sure that not everybody can see everything.  Thus, the clerks in the sales office cannot see the personal health history of the CEO (if the CEO complains loudly about the cost of Viagra at office parties however, confidentiality in the computer system is […]

Read More →
Latest

Conversations about Big Data – Why Do We Need Big Data?

By   /  March 28, 2012  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education  /  No Comments

by David Schlesinger CISSP With the arrival of the Internet everything changed.  Not just the introduction of email, SPAM and selling ice-cream makers via websites; not even eBay™ and massive multi-player games; no, the thing that changed was that all along the broadband connection there sits a word full of people. Once upon a time […]

Read More →
Latest

The Evolution of Master Data Management at Intel: A case study of finance master data

By   /  April 2, 2011  /  Data Articles | Data Science, Business Intelligence, & More, Data Education, Education Resources For Use & Management of Data  /  No Comments

by Vanitha Srinivasan Master Data and its Management The common master data elements that people think of in the context of master data are customer, supplier or product. Financial master data is equally important, is highly shared across the entire supply chain and is foundational for the operation of any enterprise.   The figure 1 below […]

Read More →
Latest

The Netherlands Ministry of Justice Metadata Workbench: Composing XML Message Schemas from OWL Models

By   /  April 2, 2011  /  Data Articles | Data Science, Business Intelligence, & More, Data Education, Education Resources For Use & Management of Data  /  No Comments

by Harry Biersteker and Ralph Hodgson Exchanging information between government parties requires a consistent, reusable and repeatable approach to specifying data exchanges as structured electronic business documents built from components. At the Ministry of Justice in The Netherlands, hereafter referred to as “The MoJ,” a new approach is underway to construct XML Schemas from OWL Ontology […]

Read More →
Latest

Shockwaves from the Edge: Part 3 in a Series

By   /  April 2, 2011  /  Data Blogs | Information From Enterprise Leaders, Data Education  /  No Comments

by Chunka Mui A mission critical question arises with edge innovations (see parts 1 and 2) that are driven by detailed information about products in customers’ hands and about the customers themselves. Will potential customers embrace it? Or are they too concerned about privacy and security? Consider the current situation. Not too long ago, ABN AMRO […]

Read More →