Tag "Enterprise Data Management"

How You Can Solve 5 of the Most Painful Supplier Information Management Challenges

Whether you’re talking to supply chain executives in manufacturing, in distribution, or in retail, the pain points are the same: If they’re sourcing products or services from multiple vendors, they must address some or all of these five challenges to supplier information management.     No trusted view: Supply chain executives struggle to get a... more

Even a Best-case Scenario Requires 60% Data Integration

The question that led to this blog posting is “how much data is moved between applications in a perfect portfolio”. A perfect application portfolio is one that has no functional overlaps and has been optimized to minimize the need for integration by ensuring that tightly-coupled functions are grouped in the same application.  The answer is... more

At St. Joseph Health, Trusted Data Enables Better Patient Care

For St. Joseph Health, improving health and quality of life of the people is the ultimate mission. It requires a number of considerations, or, “dimensions of performance” as it was introduced by the organization at this year’s MDM & Data Governance Summit in San Francisco: Cost of the care – including the current and projected... more

Getting to Your Future State Enterprise Data Architecture

Just exactly how do your move from a “Just a Bunch of Data” (JBOD) architecture to a coherent enterprise data architecture? The white paper, “The Great Rethink: Building a Highly Responsive and Evolving Data Integration Architecture” by Claudia Imhoff and Joe McKendrick provides an interesting view of what such an architecture might look like.  The... more

Architects: How Will You Stay Relevant?

We are way past the point where the architecture needs to be aligned with business goals and value delivery.  That is necessary but no longer sufficient.  We are now at the point where architecture needs to be central to the creation of an organization’s strategy process.  Not to get hyperbolic, but anything less is risky for your... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part II

To determine what is the appropriate sensitive data protection method to use, you should first answer the following questions regarding the requirements: Do you need to protect data at rest (in storage), during transmission, and/or when accessed? Do some privileged users still need the ability to view the original sensitive data or does sensitive data... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part I

I’m often asked to share my thoughts about protecting sensitive data. The questions that typically come up include: Which types of data should be protected? Which data should be classified as “sensitive?” Where is this sensitive data located? Which groups of users should have access to this data? Because these questions come up frequently, it... more

Building a Data Foundation for Execution

I have been re-reading Enterprise Architecture as Strategy from the MIT Center for Information Systems Research (CISR).*  One concept that they talk about that jumped out at me was the idea of a “Foundation for Execution.”  Everybody is working to drive new business initiatives, to digitize their businesses, and to thrive in an era of... more