Bert Oosterhof

Bert Oosterhof
As Director of Technology EMEA, Bert Oosterhof is responsible for communicating the technology needs and requirements of key EMEA customers to Informatica’s R&D organisation, as well as communicating and evangelizing architectures and benefits of Informatica technology to the EMEA customer community, analysts and press. Bert has held this position since September 2003. Prior to this, he was the Benelux Technical Director, responsible for all technical pre-sales and the post-sales activities within the region. Bert was formerly the Technical Director of a former Informatica distributor, a company which he co-founded in June 1998. Bert has been involved in the IT-sector since 1977. He has previously worked as a systems programmer, consultant, product manager and product marketing manager at companies such as Centraal Beheer, Cullinet, Computer Associates, Ingres (The ASK Group) and Do-IT (the first distributor of Object-Relational Database Technology).

What happens to your data after death?

Google recently announced that it has built a data-after-death tool to allow consumers to decide what happens to their data after they die. The feature applies to Google’s email services, as well as social networking site, Google Plus. Whilst Google claims the new tool will help users to plan their digital afterlife and protect their privacy and security, internet users have expressed concern about what happens to their personal information after their death.

Google’s new tool is essentially the equivalent of a ‘digital will’ – giving an increasingly online population more autonomy to decide what happens to their data after they die. Of course, it’s natural for consumers to be nervous about whose hands their data falls into after they meet their maker. But, in today’s information economy, as we expose more and more personal information across a growing number of places, we have to accept that we’re going to leave a digital footprint behind after we’re gone. It will be up to businesses and consumers to work together in order to ensure this footprint is accessed and protected in an appropriate way.

When it comes to dealing with personal data, Google, as well as any other business that attempts to tackle this issue head on, will need an intelligent approach. As consumers, customers, employees and social networkers, our personal information is spread across various websites and data storage facilities, both in the cloud and on-premise. This data deluge has the potential to overwhelm the businesses that are busy collecting and making sense of it, and that’s why it’s so important they have solid data management and protection policies in place to sift through the masses and derive true data value, whilst ensuring they have the full permission of the consumer.

So if you’re in the business of collecting, managing and storing customer data, what steps would you put in place to ensure that information lives on in the way individuals want it to after they’ve gone?

FacebookTwitterLinkedInEmailPrintShare
Posted in Data Privacy | 1 Comment

How do you Capture the World Wide Web?

It was recently reported that millions of tweets, Facebook status updates and personal information taken from eBay, Tripadvisor and Rightmove are to be preserved for the nation by The British Library and four other “legal deposit libraries”. This means they’ll have the right to collect and store everything that is published online through these means in the UK.

With estimates that this could make up to one billion pages a year available for research, there’s no doubt that this move will add to an ever-increasing mountain of digital information. The legal deposit libraries will have quite a task on their hands when it comes to sifting through, managing, monitoring and storing this data in order to accurately report on historical online events.

Of course, where more personal data is involved, the issue of data privacy comes hand in hand. With more tweets, status updates and personal online musings tracked, stored and preserved the pressure will be on the legal deposit libraries to adequately protect that data. Keeping digital records of historical data long term has never really been an issue before as, according to the British Library’s Richard Gibby, the average web page lasts just 75 days.

Undoubtedly, policies and procedures will be put in place in time to govern the documentation of internet history. This will pave the way for a new era of documenting important historical events, one in which digital information has the potential to take centre stage. However, as always accuracy in reporting will be key and in order to make this documentation project a success, the British Library will need to put in place solid data management policies to ensure it can sift through the masses and create accurate records from a variety of data sources that will stand the test of time.

There’s a lesson to learn here for businesses across every sector – what data management steps are you taking today to ensure that you’re set up to thrive in tomorrow’s world?

FacebookTwitterLinkedInEmailPrintShare
Posted in Big Data, Data Privacy | Leave a comment

Data archiving – time for a spring clean?

The term “big data” has been bandied around so much in recent months that arguably, it’s lost a lot of meaning in the IT industry. Typically, IT teams have heard the phrase, and know they need to be doing something, but that something isn’t being done. As IDC pointed out last year, there is a concerning shortage of trained big data technology experts, and failure to recognise the implications that not managing big data can have on the business is dangerous. In today’s information economy, as increasingly digital consumers, customers, employees and social networkers we’re handing over more and more personal information for businesses and third parties to collate, manage and analyse. On top of the growth in digital data, emerging trends such as cloud computing are having a huge impact on the amount of information businesses are required to handle and store on behalf of their customers. Furthermore, it’s not just the amount of information that’s spiralling out of control: it’s also the way in which it is structured and used. There has been a dramatic rise in the amount of unstructured data, such as photos, videos and social media, which presents businesses with new challenges as to how to collate, handle and analyse it. As a result, information is growing exponentially. Experts now predict a staggering 4300% increase in annual data generation by 2020. Unless businesses put policies in place to manage this wealth of information, it will become worthless, and due to the often extortionate costs to store the data, it will instead end up having a huge impact on the business’ bottom line. Maxed out data centres Many businesses have limited resource to invest in physical servers and storage and so are increasingly looking to data centres to store their information in. As a result, data centres across Europe are quickly filling up. Due to European data retention regulations, which dictate that information is generally stored for longer periods than in other regions such as the US, businesses across Europe have to wait a very long time to archive their data. For instance, under EU law, telecommunications service and network providers are obliged to retain certain categories of data for a specific period of time (typically between six months and two years) and to make that information available to law enforcement where needed. With this in mind, it’s no surprise that investment in high performance storage capacity has become a key priority for many. Time for a clear out So how can organisations deal with these storage issues? They can upgrade or replace their servers, parting with lots of capital expenditure to bring in more power or more memory for Central Processing Units (CPUs). An alternative solution would be to “spring clean” their information. Smart partitioning allows businesses to spend just one tenth of the amount required to purchase new servers and storage capacity, and actually refocus how they’re organising their information. With smart partitioning capabilities, businesses can get all the benefits of archiving the information that’s not necessarily eligible for archiving (due to EU retention regulations). Furthermore, application retirement frees up floor space, drives the modernisation initiative, allows mainframe systems and older platforms to be replaced and legacy data to be migrated to virtual archives. Before IT professionals go out and buy big data systems, they need to spring clean their information and make room for big data. Poor economic conditions across Europe have stifled innovation for a lot of organisations, as they have been forced to focus on staying alive rather than putting investment into R&D to help improve operational efficiencies. They are, therefore, looking for ways to squeeze more out of their already shrinking budgets. The likes of smart partitioning and application retirement offer businesses a real solution to the growing big data conundrum. So maybe it’s time you got your feather duster out, and gave your information a good clean out this spring?

FacebookTwitterLinkedInEmailPrintShare
Posted in Application Retirement, B2B Data Exchange, Data Aggregation, Data Archiving | Tagged , , , , , , , , , , | Leave a comment

The Information Currency – Google’s Transparency Report

Last November saw Google announce the findings of its bi-annual Transparency Report. Interestingly, the findings revealed that government surveillance of online lives is on a sharp incline. In fact, governments around the world made nearly 21,000 requests for access to Google data in the first six months of 2012, a huge leap from the 12,539 requests reported in 2009. The US government was the biggest culprit, making 7,969 requests in the first six months of 2012, while Turkey made the most requests for content to be removed.
Despite the big numbers, this demand for data should come as no surprise. Information is increasingly being accepted as the currency of today, so it fits that demand for Google data would be so high. Data is an undeniably invaluable asset and both the private and the public sector are realising this. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM | Tagged , , , | Leave a comment

Data Privacy Still the Talk of the Town

Recently, the UK’s Parliament and the Internet conference brought together leading figures from Government, Parliament, academia and the industry to discuss and debate the most pressing policy issues facing the Internet.

As expected, data privacy and security was top of the agenda for much of the day, with a number of discussions highlighting the extent to which consumer data is being exposed to security risks and the need for the right legislation and protection to keep it safe. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM, Data Privacy | Tagged , , , | Leave a comment

Me, Myself and Midata

Some interesting news hit UK headlines last year that companies could be made to give the public greater access to their personal transaction data in an electronic, portable and machine-readable format. That’s if the midata project has anything to do with it.

Launched in April 2011 midata is part of the UK Government’s consumer empowerment strategy, Better Choices: Better Deals. Essentially, it’s a partnership between government, consumer groups and major businesses. Its aim is to give consumers access to the data that they produce, from the likes of household utilities, and banking, to internet transactions and high street loyalty cards. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM | Tagged , , | Leave a comment

Application Retirement – Preserving the Value of Data (Part Two)

In my previous blog, I looked at the need among enterprises for application retirement. But, what kind of software solution is best for supporting effective application retirement?

It’s important to realise that retirement projects might start small, with one or two applications, and then quickly blossom into full-fledged rationalisation initiatives where hundreds of dissimilar applications are retired. So relying on individual applications or database vendors for tools and support can easily lead to a fragmented and uneven retirement strategy and archiving environment. In any event, some major application vendors offer little or even no archiving capabilities. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM, Application Retirement, Data Archiving | Tagged , , , , | Leave a comment

Application Retirement – Preserving the Value of Data (Part One)

Whether the result of growth or acquisition, enterprises that have been around a decade or longer typically have large and complex information environments with lots of redundant and obsolete applications. But there’s always the worry that one day there will be a need to access the old applications’ data. So these applications are still managed and maintained even though the data is rarely needed resulting in sizable costs in license fees, maintenance, power, data center space, backups, and precious IT time. In many companies, there are hundreds, even thousands, of obsolete or redundant applications, and the business continues to support them with expensive production level infrastructure and SLAs.

But as we’re facing the longest double dip recession for 50 years, businesses are being forced to think about reclaiming this extraneous spend for more strategic purposes by retiring any outdated application…but without losing access to the data. Keeping data from dormant applications “live” as a safeguard is more than just good common sense. In many cases, keeping the data readily accessible is compulsory due to corporate, industry, and governmental compliance demands. But you needn’t spend full production costs to do so. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM, Application Retirement | Tagged | Leave a comment

Staying on Top of the Data Security Agenda

In recent years, there have been a number of embarrassing, high profile data breach blunders. We all heard about the secret government documents detailing the UK’s policies for fighting global terrorist funding, drugs trafficking and money laundering, which were found on a London-bound train in June 2008. More recently, in 2011, Oliver Letwin faced fierce criticism after dumping documents on terrorism and national security into a bin in St. James Park in London, on no less than five occasions.

Whilst these extreme, high profile cases are rare, there are thousands of companies who have been found to mishandle confidential information relating to their customers. Indeed nearly half of the 500+ senior IT professionals surveyed for some recent research into data security admitted they had experienced a data breach. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Application ILM, Data masking, Data Privacy | Tagged , , , | Leave a comment

The Value of Consumer Data

We live in an increasingly digital world. Everyday activity and interaction is syndicated online, whether it be shopping, socialising or dating. This online activity is leaving a data footprint behind every consumer and smart businesses are collecting and using this to improve the customer experience they offer.

Data has the power to boost customer satisfaction and, ultimately, better your business. However, data isn’t just a money-maker, it’s an asset that needs to be protected. After all, it can provide organisations with an unprecedented opportunity to improve customer experience, through highly personalised and targeted communications. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Data Privacy | Tagged , , , , | 1 Comment