You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

Five Steps of MDM

By   /  July 24, 2012  /  No Comments

by Angela Guess

Taveesak Saengthong has written an article for Nation Multimedia outlining what he sees as the five steps of Master Data Management. The first step is learning to “play nice” in each other’s sandboxes: “Crossing organizational boundaries means that all parts of the business need to learn to play nice in each other’s domains. Enterprise governance attempts to align skills, knowledge processes, culture and technology. The enterprise approach that drives MDM means that you need to learn to look beyond departmental boundaries. The proliferation of enterprise software systems and business practices have reached beyond the enterprise, through multichannel touch points, complex distribution channels and integrated supply chains. Business process management (BPM) and service-oriented architecture (SOA) ensure that components are shared and reusable, and allow organizations to evolve faster through innovation, flexibility, and integration with technology.”

The second step is to clean up the data: “MDM bridges the gap between the operational world and analytical data worlds. Essential data for the enterprise must be complete, consistent, accurate and able to span both operational and analytical systems. As organizations mature in managing their core data assets, master data is managed in enterprise hubs that span all areas of the business. These enterprise hubs are surrounded by services for global identification, linking and synchronization of heterogeneous data sources. These services are required to support the full life cycle of master data objects that are influenced by long-standing, policy-driven processes and behavior. With proper governance in place, quality data can be applied to cross-functional applications, while the use of analytics will enable real-time, automated decision-making capabilities.”

Read more here.

You might also like...

Keeping Your Critical Data Secure

Read More →